How Hackers Hijacked a Bank’s Entire Online Operation
When your ideology fetishizes women's success as unambiguously and inherently good, it's harder to explain why a particular successful woman doesn't count.
The gig economy in particular provides plenty of late-capitalist fodder, with investors showering cash on platforms to create cheap services for the rich and lazy and no-benefit jobs for the eager and poor.
Read this, and be sure to follow up with Malcolm Harris's article, "Where Should A Good Millennial Live?"
“We try to leverage the power we have as influencers in the social-media world to bring light to companies that are doing good in the world, that are creating products we believe in,” King explained. “We see every dollar as a vote.”
Disturbing and dangerous. The FBI is making it unsafe for me to do my job.
of course she’s the one who notices that something is amiss. It’s not because girls are smarter than boys, or more pragmatic or less brave. It’s because women know that it’s their responsibility to prevent harm from coming to them.
Isolation may be the beginning of terror,” she wrote in her 1953 essay, “Ideology and Terror”(which she later added as the last chapter of Origins.) “It certainly is its most fertile ground; it always is its result.”
"How can journalism hold the new nodes of power accountable when they are dependent on them for distribution, audience, and money?"
"The unprompted inline modal window is the biggest setback in Web usability since the pop-up window ad."
"What would a privacy-minded conversation about privacy-breaching software look like?"
What's the connection?
"Since building end-to-end encryption into WhatsApp, we have reduced spam and malicious content by more than 75%."
"the Pentagon released a video showing a man building bombs which it said had been discovered in the raid. Within hours it was removed from the Pentagon’s website’s after people pointed out the same video had been published online in 2007."
" Just as you can bribe an accountant to say that the books are clean, so too can you bribe a computer scientist. Moreover, you’re putting your trust in whatever filters you applied to select that computer scientist. (University or professional qualifications? A network of friends? The testimonials of satisfied customers – which is to say, the same method by which people selected Bernie Madoff as their financial advisor.)"
"We turn to nature documentaries not to understand nature, but to see our own behavior reflected back at us."
Glad to see Lorenzo getting the credit he deserves
this is all the more important now
They anticipated the conclusion to which macroeconomists are now reluctantly coming, that an economy dominated by large corporations must eventually undergo a system-wide stagnation.
I edited this video about a group of young men convicted of trying to join ISIS. The FBI used a paid informant AND an undercover agent to get their conviction, and the community feels the men were entrapped.
A lot of people on the internet seem to approach the problem [with the attitude of] ‘I’m just going to walk naked outside of my house and hope that nobody looks at me.’ From a security perspective, is that a good way to go about thinking? No, horrible … There are good ways to be more secure on the internet. But do most people use Tor? No. Do most people use Signal? No. Do most people use insecure things that most people can hack? Yes.
see Graeber's Debt for more on this
Those who benefit from the death of privacy attempt to frame our subjugation in terms of freedom, just like early factory owners talked about the sanctity of contract law. They insisted that a worker should have the right to agree to anything, from sixteen-hour days to unsafe working conditions, as if factory owners and workers were on an equal footing.