:

Business

Former Apple researchers launch startup focused on protecting iOS devices

Two former Apple employees who worked for the company as cybersecurity researchers are now launching their own startup. Called DoubleYou, the startup is focused on helping creators of cybersecurity products protect iOS devices and Macs. more…

No longer possible to hide the blue badge of shame on X [U]

Ah, the saga of X’s blue checkmarks! Originally a sign that someone was who they claimed to be, and later sold so that cryptocurrency scammers could see their posts boosted, the company is now coming full circle with some journalists. Update: After a n

FTX customers to get their money back in full (with asterisk) [U]

Update: A court filing has confirmed that the company now has more than enough money to repay customers. In recognition of the lost gains, creditors owed $50k or less will receive around 118% of their deposit value at the time of the Chapter 11 filing.

Attackers spread backdoor via eScan antivirus software update process

Avast discovered and analyzed GuptiMiner, a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers.

Kevin Kelly: Daddy Issues

Web3’s fetish for the Whole Earth Review isn’t just a complex, it’s a love affair.

My Dinner with [Marc] Andreessen

Billionaires I have known: Part One of a three-part series

Deliberative Consensus Protocols

Introduction: Scalable Group Decision-Making A deliberative consensus protocol is a process that online groups can use to make decisions. It’s designed to produce good decisions that are fair and manifest the collective intelligence of the group.

The dangers of "decentralized" ID systems

Many decentralized identity protocols are being developed, which claim to increase users’ privacy, enable interoperability and convenient...

Bountysource Stole at Least $17,000 from Open Source Developers

This is why people say the open source ecosystem sucks.