In a grief-filled year, brands from Etsy to Pandora let you skip Mother's Day emails ~life.women Article 3159 words 6 votes
They told their therapists everything. Hackers leaked it all. ~tech privacy security Article 4390 words 15 votes
Madhouse at the End of the Earth: A brief history of people losing their minds in Antarctica ~health.mental Article 3354 words 5 votes
Have you ever tried to sell a diamond? ~finance business Article 9965 words, published Feb 1 1982 8 votes
The plan to kill Osama bin Laden—from the spycraft to the assault to its bizarre political backdrop—as told by the people in the room ~humanities.history Article 16 894 words, published Apr 30 2021 11 votes
What3Words - The algorithm used to generate its geocodes, and issues with it that result in ambiguous locations being common ~tech Article 3504 words 11 votes
Unlocking history through automated virtual unfolding of sealed documents imaged by X-ray microtomography ~science Article 4818 words, published Mar 2 2021 7 votes
Master criminal Rédoine Faïd loved the movies, and his greatest crimes were laced with tributes. When he landed in a maximum-security prison, cinema provided inspiration for his escape. ~life Article 7224 words 9 votes
Book review: Are We Smart Enough To Know How Smart Animals Are? ~science biology Article 3631 words 4 votes
In the tales told by sewage, public health and privacy collide ~science Article 5702 words, published Apr 21 2021 5 votes
A community of 3D graphics hobbyists are making and selling avatars of real people in order to fulfill their sexual fantasies, and there's little anyone can do to stop them ~tech Article 3345 words, published Nov 19 2019 11 votes
A summary of the book "Why Nuclear Power Has Been a Flop" by Jack Devanney ~enviro energy Article 4779 words 16 votes
‘It’s going to end up like Boeing’: How freight rail is courting catastrophe ~transport Article 3318 words 11 votes
The Polish doctors who used science to outwit the Nazis ~humanities.history Article 7684 words, published Aug 14 2017 8 votes
Nothing breaks like AI heart - An interactive essay about artificial intelligence, emotional intelligence, and finding an ending ~tech Link 8 votes
Relative student ability is remarkably static and predictable from pre-K to college and beyond ~humanities education Article 17 votes
I called off my wedding. The internet will never forget ~tech privacy social media internet Article 5366 words 24 votes
Employees at law enforcement agencies across the US ran thousands of Clearview AI facial recognition searches — often without the knowledge of the public or even their own departments ~tech privacy Article 5855 words 9 votes
How Star Wars' biggest fan wiki found itself in a fight over trans identity ~lgbt transgender Article 3354 words 14 votes
Two women gave birth on the same day in a place called Come By Chance. They didn’t know each other, and never would. Half a century later, their children made a shocking discovery ~life parenting family Link 10 votes
The collapse of Puerto Rico’s iconic telescope - The uncertain future of the Arecibo Observatory, and the end of an era in space science ~space astronomy.radio Article 4123 words 8 votes
I now own the Coinhive domain. Here's how I'm fighting cryptojacking and doing good things with content security policies. ~tech security.cyber Article 3498 words 15 votes
Inside a viral website - An account of running istheshipstillstuck.com ~tech internet Article 3049 words 10 votes
The trillion-dollar woman - A conversation with the economist Stephanie Kelton about the "deficit myth," Modern Monetary Theory for dummies, and why the age of capital may finally be ending ~finance economics Article 3545 words 18 votes
What does your gaze reveal about you? On the privacy implications of eye tracking ~tech privacy Article 3401 words, published Mar 6 2020 10 votes
Mask up! How to choose and maintain the best masks for use against COVID-19. ~health Article 6799 words 11 votes
A comparative analysis of security, privacy, and censorship issues in TikTok and Douyin, both developed by ByteDance ~tech privacy security social media Link 5 votes