Google's Tensor inside of Pixel 6, Pixel 6 Pro: A look into performance and efficiency google android Article 3622 words 6 votes
The lonely work of moderating Hacker News social media Article 6300 words, published Aug 8 2019 13 votes
A battle among homeowners in Colorado shows how license plate scanners are reshaping American neighborhoods Article 3085 words, published Oct 22 2021 10 votes
The lost history of the electric car – and what it tells us about the future of transport Article 4037 words, published Aug 3 2021 6 votes
Amazon copied products and rigged search results to promote its own brands, documents show amazon.basics Article 4368 words 20 votes
Peter Thiel's origin story: His ideology dominates Silicon Valley. It began to form when he was an angry young man. Article 4396 words 11 votes
Billed as the most secure phone on the planet, An0m became a viral sensation in the underworld. There was just one problem for anyone using it for criminal means: it was run by the police security privacy Article 4002 words 14 votes
Why lying about storage products is bad: An IBM DeskStar story Article 3606 words, published Aug 26 2021 12 votes
Regulators and reality: The FTC's case against Facebook social media facebook Article 3025 words 5 votes
Little-known Federal software can trigger revocation of citizenship amazon Article 3260 words 9 votes
How tech loses out over at companies, countries and continents Article 6192 words, published Jan 16 2021 8 votes
History of the Segway - Dean Kamen's literary agent revisits the story twenty years later to reflect on his contribution to the invention's hype and failure Article 9978 words, published Aug 1 2021 3 votes
Sophie Zhang risked everything to expose how Facebook enables global political manipulation. Now she’s telling her story. facebook social media Article 3493 words 14 votes
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab apple security.cyber Article 7008 words 24 votes
The privacy war raging within the World Wide Web Consortium (W3C), where normally-secretive tech companies are wrangling over the future of your data — and their own power — in plain sight privacy Article 4991 words, published Jul 13 2021 14 votes
Why Google Play’s APK replacement is scaring some security experts security google.play Article 4480 words 15 votes
Heat List - Chicago PD automated policing program got this man shot twice Article 5235 words 10 votes
Censorship, surveillance, and profits: A hard bargain for Apple in China apple privacy Article 4036 words 4 votes
China’s ruling Communist Party has opened a new front in its long, ambitious war to shape global public opinion: Western social media social media facebook Article 3237 words 13 votes
EFF Surveillance Self-Defense - Privacy breakdown of mobile phones privacy security Article 5234 words, published Feb 27 2021 18 votes
They told their therapists everything. Hackers leaked it all. privacy security Article 4390 words 15 votes
What3Words - The algorithm used to generate its geocodes, and issues with it that result in ambiguous locations being common Article 3504 words 11 votes
A community of 3D graphics hobbyists are making and selling avatars of real people in order to fulfill their sexual fantasies, and there's little anyone can do to stop them Article 3345 words, published Nov 19 2019 11 votes
Nothing breaks like AI heart - An interactive essay about artificial intelligence, emotional intelligence, and finding an ending Link 8 votes
A "worst nightmare" cyberattack: The story of the SolarWinds hack security.cyber Article 5802 words 7 votes
I called off my wedding. The internet will never forget privacy social media internet Article 5366 words 24 votes
Employees at law enforcement agencies across the US ran thousands of Clearview AI facial recognition searches — often without the knowledge of the public or even their own departments privacy Article 5855 words 9 votes
I now own the Coinhive domain. Here's how I'm fighting cryptojacking and doing good things with content security policies. security.cyber Article 3498 words 15 votes
Urban fish ponds: Low-tech sewage treatment for towns and cities Article 3563 words, published Mar 27 2021 7 votes
Inside a viral website - An account of running istheshipstillstuck.com internet Article 3049 words 10 votes
What does your gaze reveal about you? On the privacy implications of eye tracking privacy Article 3401 words, published Mar 6 2020 10 votes
A comparative analysis of security, privacy, and censorship issues in TikTok and Douyin, both developed by ByteDance privacy security social media Link 5 votes
How Facebook got addicted to spreading misinformation facebook social media Article 6951 words 10 votes