:

Business

Former Apple researchers launch startup focused on protecting iOS devices

Two former Apple employees who worked for the company as cybersecurity researchers are now launching their own startup. Called DoubleYou, the startup is focused on helping creators of cybersecurity products protect iOS devices and Macs. more…

Attackers spread backdoor via eScan antivirus software update process

Avast discovered and analyzed GuptiMiner, a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers.

My Dinner with [Marc] Andreessen

Billionaires I have known: Part One of a three-part series

Deliberative Consensus Protocols

Introduction: Scalable Group Decision-Making A deliberative consensus protocol is a process that online groups can use to make decisions. It’s designed to produce good decisions that are fair and manifest the collective intelligence of the group.

The dangers of "decentralized" ID systems

Many decentralized identity protocols are being developed, which claim to increase users’ privacy, enable interoperability and convenient...

Bountysource Stole at Least $17,000 from Open Source Developers

This is why people say the open source ecosystem sucks.

Why there will never be another Bitcoin

On October 31, 2008, an unknown coder named Satoshi Nakamoto published a paper that laid the foundation for an entirely new monetary system – 15 years later, the world is only just catching on to its true value and potential.

Enough With Saving the Honeybees

For years, people have understood them to be at imminent risk of extinction, despite evidence to the contrary. Why?

Class Consciousness for Billionaires

Benjamin Wallace-Wells reviews “As Gods Among Men: A History of the Rich in the West,” by Guido Alfani.