<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Blog on see the changes</title>
    <link>https://www.whatsupup.com/blog/</link>
    <description>Recent content in Blog on see the changes</description>
    
    <language>en-us</language>
    <lastBuildDate>Sun, 22 May 2022 12:47:17 +0000</lastBuildDate><atom:link href="https://www.whatsupup.com/blog/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220522-124718/</link>
      <pubDate>Sun, 22 May 2022 12:47:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220522-124718/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/category/games/&amp;#34;&amp;gt;Games&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220522-082801/</link>
      <pubDate>Sun, 22 May 2022 08:28:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220522-082801/</guid>
      <description>Games&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220521-203350/</link>
      <pubDate>Sat, 21 May 2022 20:33:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220521-203350/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/category/av1/&amp;#34;&amp;gt;AV1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220521-165249/</link>
      <pubDate>Sat, 21 May 2022 16:52:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220521-165249/</guid>
      <description>AV1&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220521-040453/</link>
      <pubDate>Sat, 21 May 2022 04:04:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220521-040453/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/our-response-to-the-tragedy-in-buffalo&amp;#34;&amp;gt;Our Response to the Tragedy in Buffalo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220521-003733/</link>
      <pubDate>Sat, 21 May 2022 00:37:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220521-003733/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pearls&amp;#34;&amp;gt;pearls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#relocatability&amp;#34;&amp;gt;relocatability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
My paper &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2020/p1144r5.html&amp;#34;&amp;gt;P1144 “Object relocation in terms of move plus destroy”&amp;lt;/a&amp;gt; is still on R5 as of this writing, but I hope to publish P1144R6 Real Soon Now.
I recently updated my Clang fork on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://p1144.godbolt.org/z/T7ozTx34d&amp;#34;&amp;gt;p1144.godbolt.org&amp;lt;/a&amp;gt; to reflect the changes in R6.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220520-204149/</link>
      <pubDate>Fri, 20 May 2022 20:41:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220520-204149/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/category/web-of-things/&amp;#34;&amp;gt;Web of Things&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20220520-203839/</link>
      <pubDate>Fri, 20 May 2022 20:38:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20220520-203839/</guid>
      <description>The basic feature set of howm is very simple, and can be condensed
into the mantra “write fragmentarily and read collectively”.
Essentially, howm provides an Emacs minor mode for marking text to
trigger certain searches.  Since it is a minor mode, you can use
whatever major mode you like to use for your writing (e.g., I currently use markdown-mode ).&amp;lt;br&amp;gt;
There are two essential kinds of markup howm cares about:
note titles and links.  By default, titles are marked up
by putting a ‘ = ’ at the beginning of the line, but this can be configured
(and must be done so before loading howm-mode (!)).
The benefit of adding a title to a note is that you can have
the summary buffer show titles instead of matching lines,
which can be helpful to get a better overview of search results.
(The creator of howm is sceptical of titling all notes, I think it
very much depends the average length of your notes.
There is no requirement to use titles.)&amp;lt;br&amp;gt;
Pressing return on this line when howm-mode is enabled will show a
list of all occurences of the word howm in your notes directory.&amp;lt;br&amp;gt;
And this will cause the word howm in any howm-mode buffer to be
underlined and trigger a search where the buffer with &amp;amp;lt;&amp;amp;lt;&amp;amp;lt; howm will appear first.&amp;lt;br&amp;gt;
It is straightforward to implement something like #tags or WikiWords using these features, if you wish to do so.&amp;lt;br&amp;gt;
Additionally, howm provides an inline link syntax [[&amp;amp;hellip;]] that works
like &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; but can appear within a line.  I make a suggestion below how to turn
it into a direct link to the first page with the given title; but for
now I decided not to use this very much.&amp;lt;br&amp;gt;
The line-based nature of the &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; syntax prevents usage for “inline”
links.  After giving it some thought, I consider it a strength for a
note-taking system to make forward links related to a paragraph and
not part of a sentence.  Additionally, it also makes the plain text
easier to read as the link target is not interleaved into the text.
(Compare with the use of reference-style links in Markdown.)&amp;lt;br&amp;gt;
An aside: howm actually supports multiple notes per file by having
multiple title lines in a file.  The search summary will always show
the title directly before the matching line.  You can use C-c , C to
create a new note in the current buffer.  I don’t use this much, but I
think it could be useful for glossary files that contain many short
notes.  Some people also use this for keeping multiple daily notes in
a single file.&amp;lt;br&amp;gt;
Howm provides two main features to access notes: the menu and the
summary buffer.  The howm menu (shown with C-c , , ) provides a very
customizable view into your howm notes.  By default it shows your
schedule, recent notes, and random notes.  You can access many howm
features with a single keypress from the menu.  Since I don’t use the
scheduling feature, I mostly access howm from the summary buffer
instead.&amp;lt;br&amp;gt;
The howm summary buffer shows the result of a search ( C-c , g ), a
list of recent notes ( C-c , l ), or an overview of all notes ( C-c , a ).
It is very convenient to see the matches and you get a preview
of the note when you move the cursor to a search result.  Typing RET
will open the note for editing.  Typing T will toggle between
displaying matching lines or the titles of notes with matches.&amp;lt;br&amp;gt;
In the summary buffer, you can also type @ and read all matching
notes in a concatenated way, so you get the full context of all notes
at once.&amp;lt;br&amp;gt;
Here, we decide that ~/prj/howm is the base directory for our howm
notes, and we also put the two auxiliary files howm uses there.
Additionally, we change the default name format to end with .md (which also turns on markdown-mode by default).&amp;lt;br&amp;gt;
The next addition is interactive search with ripgrep ( C-c , r ).
This is the most useful feature I added to howm myself.
I think it provides a great way to interact with your notes, as you get
instant feedback from your search terms, and can stop searching as
soon as you found what you were looking for.
I used counsel-rg as an inspiration for this, and we turn the ripgrep matches
into a regular howm summary buffer for further consumption.&amp;lt;br&amp;gt;
A great usability enhancement is buffer renaming: since howm file names
are a bit unwieldy (like ~/prj/howm/2022/03/2022-03-25-162227.md )
you can use these two lines to rename note buffers according to their
title, which makes switching between multiple notes more convenient.&amp;lt;br&amp;gt;
My configuration ends with three definitions of action-lock , the howm
mechanism for marking text active and do something on RET.  Two of
them are related to the reference management software &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.zotero.org/&amp;#34;&amp;gt;Zotero&amp;lt;/a&amp;gt; , which I use for organizing papers,
and enable me to link to articles in my Zotero database by URL
or BibTeX identifier:&amp;lt;br&amp;gt;
Finally, as mentioned above, this is how to make [[&amp;amp;hellip;]] wiki-links directly point to the first page with that title, skipping
the summary buffer:&amp;lt;br&amp;gt;
One thing I want to implement but didn’t yet get around to is support
for searching notes using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/Genivia/ugrep&amp;#34;&amp;gt;ugrep&amp;lt;/a&amp;gt; ,
which has a nifty boolean search mode that applies to whole files, so
you can do searches that are not limited to a line context
(e.g. hoge|fuga -piyo finds all notes that mention hoge or fuga, but
don’t contain piyo).&amp;lt;br&amp;gt;
A dozen years ago, the Unix textbook answer to this would have been:
well, if its process id (pid) is 1, then it is init by definition.&amp;lt;br&amp;gt;
These days, things are not that simple anymore.  Containerization
creates situations where pid is 1, but the process runs, well, in a
container.  In Linux, this is realized by using a feature called “pid
namespaces”.  The clone(2) syscall can take the flag CLONE_NEWPID (“since Linux 2.6.24”), which puts the new process into a new pid
namespace.  This means that this process will have pid 1 inside the
pid namespace, but outside (i.e. in the parent pid namespace), the
process has a regular pid.  Various Linux API transparently translate
pids between these namespaces.&amp;lt;br&amp;gt;
We can try to find some evidence that we’re a freshly booted init , but
none of it is really conclusive:&amp;lt;br&amp;gt;
$TERM should be linux ; trivial to override.&amp;lt;br&amp;gt;
$BOOT_IMAGE is set, but this depends on the boot loader.&amp;lt;br&amp;gt;
System uptime is “low”, but it takes the initrd boot time into account.
Our non-root init could be spawned in a container at boot time.&amp;lt;br&amp;gt;
There are also some indicators the process runs in a container using
one of the popular solutions such as docker or podman :&amp;lt;br&amp;gt;
If we were put inside a cgroup, reading /proc/1/cgroup will indicate it.&amp;lt;br&amp;gt;
The file /.dockerenv exists.&amp;lt;br&amp;gt;
But there are still situations, such as the unshare call above,
where all of these things may not be true.&amp;lt;br&amp;gt;
I started to research this and quickly found the ioctl(2) NS_GET_PARENT which seemed to be useful: “Returns a file descriptor
that refers to the parent namespace of the namespace referred to by
fd.”  However, it is useless for this purpose:&amp;lt;br&amp;gt;
So, we need to bring out bigger guns in.  I searched the kernel source for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/A/ident/init_pid_ns&amp;#34;&amp;gt;occurrences of&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/A/ident/init_pid_ns&amp;#34;&amp;gt;init_pid_ns&amp;lt;/a&amp;gt; ,
as this namespace is called in the Linux source code.  There are not
too many occurrences we can rely on.  The taskstats module limits the TASKSTATS_CMD_ATTR_REGISTER_CPUMASK command to the initial pid
namespace only, but to use this requires speaking the netlink
interface, which is terrible.
Also, the behavior could change in future versions.&amp;lt;br&amp;gt;
One interesting, and viable approach, is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/source/kernel/pid_namespace.c#L300&amp;#34;&amp;gt;this limitation&amp;lt;/a&amp;gt; of the reboot(2) syscall: only some LINUX_REBOOT_CMD_* commands are allowed
to be sent inside a nested pid namespace.  Now, we need to find a
“harmless” command to call reboot(2) with to test this!  (Obviously,
only being able to suspend the machine from the initial pid namespace
is not a very useful check…)  There are two commands that do
not do much harm: LINUX_REBOOT_CMD_CAD_{ON,OFF} will toggle the action
that Ctrl-Alt-Delete performs.  Unfortunately, it is impossible to
read the state of this flag, making this test a destructive operation
still. (But if you are pid 1, you may want to set it anyway, so you get
pid namespace detection for free.)&amp;lt;br&amp;gt;
So I kept looking for other ways until I realized there’s a quite
natural property to check for, and that is to find out if there are kernel threads in the pid namespace.  Kernel threads are spawned by
the kernel in the initial pid namespace and help perform certain
asynchronous actions the kernel has to do, subject to process
scheduling.  As far as I know, kernel threads never occur in a nested
pid namespace, and at least the parent process of kernel threads, kthreadd , will always exist.  Conveniently, it also always has pid 2.&amp;lt;br&amp;gt;
/proc/PID/cmdline is empty (not a good indicator, user space processes
can clear it too).&amp;lt;br&amp;gt;
kernel threads have parent pid 0 (requires parsing /proc/PID/stat ,
which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://unix.stackexchange.com/a/409493&amp;#34;&amp;gt;everyone gets wrong&amp;lt;/a&amp;gt; the first time, or /proc/PID/status ).&amp;lt;br&amp;gt;
kernel threads have no Vm* data in /proc/PID/status .&amp;lt;br&amp;gt;
kernel threads have the flag PF_KTHREAD set (requires parsing /proc/PID/stat again).&amp;lt;br&amp;gt;
kernel threads have an empty symlink for /proc/PID/exe .&amp;lt;br&amp;gt;
On a regular file system, using lstat(2) would have filled st_size with the length of the symlink.  But on a procfs , lstat is not to be
trusted, and even non-empty symlinks have st_size equal to 0.
We thus really need to use the readlink(2) syscall to read the link.
After doing this, you will notice that it returns ENOENT … exactly
the same as if pid 2 did not exist!&amp;lt;br&amp;gt;
We therefore need another check, to verify that pid 2 does exist. Luckily, here a lstat on /proc/2/exe file is fine.  It must return zero.&amp;lt;br&amp;gt;
Note that you need to do these operations in exactly this order , else
you are subject to race conditions again: the only reason this works
is that if pid 2 is kthreadd , it will not have terminated before the
lstat check (because it cannot terminate).&amp;lt;br&amp;gt;
Therefore, readlink(2) failing with ENOENT and lstat(2) succeeding
is exactly the combination required to check pid 2 is kthreadd ,
which implies there are kernel threads in our pid namespace, which
implies that we are in the initial namespace.&amp;lt;br&amp;gt;
We subtract the ASCII lines from the character 0 to get numerical
rows.  The …</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220520-200623/</link>
      <pubDate>Fri, 20 May 2022 20:06:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220520-200623/</guid>
      <description>&amp;lt;p&amp;gt;This is yet another followup to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;std::swap&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;two-step?”&amp;lt;/a&amp;gt; (2020-07-11)
and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2022/04/14/another-reason-for-the-poison-pill/&amp;#34;&amp;gt;“PSA: ADL requires that unqualified lookup has found a function”&amp;lt;/a&amp;gt; (2022-04-14),
as my mental model continues to evolve. (Mainly due to pressure from Jody Hagins. :))&amp;lt;br&amp;gt;
As seen on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;cpplang Slack&amp;lt;/a&amp;gt; (hat tip to Jody Hagins).
Recall my post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;std::swap&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;two-step?”&amp;lt;/a&amp;gt; (2020-07-11), where I said:&amp;lt;br&amp;gt;
A qualified call like base::frotz(t) indicates, “I’m sure I know how to frotz whatever this thing may be.
No type T will ever know better than me how to frotz .”&amp;lt;br&amp;gt;
An unqualified call using the two-step, like using my::xyzzy; xyzzy(t) , indicates,
“I know one way to xyzzy whatever this thing may be, but T itself might know a better way.
If T has an opinion, you should trust T over me.”&amp;lt;br&amp;gt;
An unqualified call not using the two-step, like plugh(t) , indicates, “Not only should you trust T over me, but I myself have no idea how to plugh anything. Type T must come up with a solution;
I offer no guidance here.”&amp;lt;br&amp;gt;
TIL: nullopt_t is not equality-comparable, but monostate is&amp;lt;br&amp;gt;
On &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;Slack&amp;lt;/a&amp;gt; ,
Kilian Henneberger asked for some STL types that are copyable but not
equality-comparable. One example is std::function&amp;amp;lt;int()&amp;amp;gt; ; see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;“On&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;function_ref&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;string_view&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;”&amp;lt;/a&amp;gt; (2019-05-10).
The simplest example is struct S {}; — for compatibility with C, C&#43;&#43;98 provided
every class type with a copy constructor, but none of them with comparison operators.&amp;lt;br&amp;gt;
What if vector&amp;amp;lt;T&amp;amp;gt;::iterator were just T* ?&amp;lt;br&amp;gt;
Every major C&#43;&#43; standard library vendor defines wrappers for their
contiguous iterator types — vector&amp;amp;lt;T&amp;amp;gt;::iterator and so on. You might
think that they should just define these iterators as aliases for T* instead.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;Multiple book authors pushing the idea that Scott Meyers’ original
phrase “universal reference” (for T&amp;amp;amp;&amp;amp;amp; ) is actually preferable to the now-Standard term “forwarding reference.”&amp;lt;br&amp;gt;
volatile means it really happens&amp;lt;br&amp;gt;
During my CppCon 2020 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/F6Ipn7gCOsY&amp;#34;&amp;gt;“Back to Basics: Concurrency,”&amp;lt;/a&amp;gt; someone asked, “Do we ever need to use volatile ?” To which I said, “No. Please don’t
use volatile for anything ever.” This was perhaps a bit overstated, but at least in the context of basic concurrency it was accurate. To describe the role of volatile in C and C&#43;&#43;, I often use the following slogan:&amp;lt;br&amp;gt;
Marking a variable as volatile means that reads and writes to that variable really happen.&amp;lt;br&amp;gt;
If you don’t know what this means, then you shouldn’t use volatile .&amp;lt;br&amp;gt;
const all the things?&amp;lt;br&amp;gt;
Now we have a team member who has jumped on the “everything is const” bandwagon.
Every code review includes dozens of lines of local function variables now declared const that litter the review.&amp;lt;br&amp;gt;
TLDR: I’m not putting const on all the things, either.&amp;lt;br&amp;gt;
Here’s a C&#43;&#43; riddle for you: When does std::invoke not invoke?&amp;lt;br&amp;gt;
Given this code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/4rsf98rqM&amp;#34;&amp;gt;Godbolt&amp;lt;/a&amp;gt; ),
libc&#43;&#43; and Microsoft accept the call to invoke , but libstdc&#43;&#43;
rejects with a spew of errors:&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20220520-163853/</link>
      <pubDate>Fri, 20 May 2022 16:38:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20220520-163853/</guid>
      <description>I’ve decided that in light of the current atrocities happening across Afghanistan, I need to write this informal blog to get some things off my chest about the American Experience … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;#34;&amp;gt;[Guest Writer] My Thoughts On Afghanistan As A Member Of The US Military&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
America’s Frontline Doctors. This viral video has been circulating over the last day or so and I’ve been replying to some on their posts, but I figured since so many … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;#34;&amp;gt;STOP POLITICIZING MEDICINE: Facts vs. Myths of the Frontline Doctors Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I am not a religious person. I would consider myself “Agnostic” if I had to put myself in a category. However, for the sake of my narrative, let’s assume that … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;#34;&amp;gt;Facebook is a disease.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Follow&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Joseph Menn | Reuters</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220520-163807/</link>
      <pubDate>Fri, 20 May 2022 16:38:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220520-163807/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/no-lights-no-heat-no-money-thats-life-ukraine-during-cyber-warfare-2022-01-14/&amp;#34;&amp;gt;No lights, no heat, no money - that&amp;#39;s life in Ukraine during cyber warfare&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/no-lights-no-heat-no-money-thats-life-ukraine-during-cyber-warfare-2022-01-14/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; January 14, 2022&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/major-tech-companies-struggle-plug-holes-logging-software-2021-12-16/&amp;#34;&amp;gt;Major tech companies struggle to plug holes in logging software&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/major-tech-companies-struggle-plug-holes-logging-software-2021-12-16/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; December 16, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;U.S. lawmakers call for sanctions against Israel&amp;#39;s NSO, other spyware firms&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/&amp;#34;&amp;gt;U.S. Markets&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/us-cybersecurity-officials-see-mainly-low-impact-attacks-logging-flaw-so-far-2021-12-15/&amp;#34;&amp;gt;U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/us-cybersecurity-officials-see-mainly-low-impact-attacks-logging-flaw-so-far-2021-12-15/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-2021-12-13/&amp;#34;&amp;gt;Widely used software with key vulnerability sends cyber defenders scrambling&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-2021-12-13/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; December 13, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/ransomware-attack-australian-utility-claimed-by-russian-speaking-criminals-2021-12-08/&amp;#34;&amp;gt;Ransomware attack on Australian utility claimed by Russian-speaking criminals&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/ransomware-attack-australian-utility-claimed-by-russian-speaking-criminals-2021-12-08/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; December 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/&amp;#34;&amp;gt;U.S. State Department phones hacked with Israeli company spyware - sources&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; December 4, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/us-seizes-6-mln-ransom-payments-charge-ukrainian-over-cyberattack-cnn-2021-11-08/&amp;#34;&amp;gt;U.S. charges Ukrainian and Russian in major ransomware spree, seizes $6 mln&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/us-seizes-6-mln-ransom-payments-charge-ukrainian-over-cyberattack-cnn-2021-11-08/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; November 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;EXCLUSIVE Governments turn tables on ransomware gang REvil by pushing it offline&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; October 21, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-2021-10-19/&amp;#34;&amp;gt;China-linked hacking group accessing calling records worldwide, CrowdStrike says&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-2021-10-19/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; October 19, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/&amp;#34;&amp;gt;Legal&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/us-authorities-disclose-ransomware-attacks-against-water-facilities-2021-10-14/&amp;#34;&amp;gt;U.S. authorities disclose ransomware attacks against water facilities&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/us-authorities-disclose-ransomware-attacks-against-water-facilities-2021-10-14/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; October 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/&amp;#34;&amp;gt;Hackers of SolarWinds stole data on U.S. sanctions policy, intelligence probes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; October 8, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/expressvpn-employees-complain-about-ex-spys-top-role-company-2021-09-23/&amp;#34;&amp;gt;ExpressVPN employees complain about ex-spy&amp;#39;s top role at company&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/expressvpn-employees-complain-about-ex-spys-top-role-company-2021-09-23/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; September 23, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-2021-09-13/&amp;#34;&amp;gt;Cyber arms dealer exploits new iPhone software vulnerability, affecting most versions, say researchers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-2021-09-13/&amp;#34;&amp;gt;, article with video&amp;lt;/a&amp;gt; September 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/&amp;#34;&amp;gt;Exclusive: Wide-ranging SolarWinds probe sparks fear in Corporate America&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; September 10, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/pro-china-social-media-campaign-expands-new-countries-blames-us-covid-2021-09-08/&amp;#34;&amp;gt;Pro-China social media campaign hits new countries, blames U.S. for COVID&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/pro-china-social-media-campaign-expands-new-countries-blames-us-covid-2021-09-08/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/microsoft-warns-azure-customers-flaw-that-could-have-permitted-hackers-access-2021-09-08/&amp;#34;&amp;gt;Microsoft warns Azure customers of flaw that could have permitted hackers access to data&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/microsoft-warns-azure-customers-flaw-that-could-have-permitted-hackers-access-2021-09-08/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/researchers-cybersecurity-agency-urge-action-by-microsoft-cloud-database-users-2021-08-28/&amp;#34;&amp;gt;Researchers, cybersecurity agency urge action by Microsoft cloud database users&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/researchers-cybersecurity-agency-urge-action-by-microsoft-cloud-database-users-2021-08-28/&amp;#34;&amp;gt;, article with image&amp;lt;/a&amp;gt; August 30, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/&amp;#34;&amp;gt;EXCLUSIVE Microsoft warns thousands of cloud customers of exposed databases&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/&amp;#34;&amp;gt;, article with video&amp;lt;/a&amp;gt; August 27, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-policy-groups-ask-apple-drop-plans-inspect-imessages-scan-abuse-images-2021-08-19/&amp;#34;&amp;gt;Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-policy-groups-ask-apple-drop-plans-inspect-imessages-scan-abuse-images-2021-08-19/&amp;#34;&amp;gt;, article with gallery&amp;lt;/a&amp;gt; August 19, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20220520-163721/</link>
      <pubDate>Fri, 20 May 2022 16:37:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20220520-163721/</guid>
      <description>USENIX/LISA 2012 slides on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.brendangregg.com/blog/2012-12-13/usenix-lisa-2012-performance-analysis-methodology.html&amp;#34;&amp;gt;Performance Analysis Methodology&amp;lt;/a&amp;gt; , summarizing ten methods and anti-methods ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/lisa12-methodologies&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.brendangregg.com/Slides/LISA2012_methodologies.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=abLan0aXJkw&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Chris Zacharias</title>
      <link>https://www.whatsupup.com/blog/gigabit/polenta/20220520-163553/</link>
      <pubDate>Fri, 20 May 2022 16:35:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gigabit/polenta/20220520-163553/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;Nowadays, you can take out your phone, open a user-friendly app, capture a shockingly high-quality picture, make any corrections you need, and then send that picture to your grandma, who can see it seconds later. Consumer photography is a largely solved problem. However, the same innovations that have benefited consumers - access to high quality cameras, ease of use, rapid distribution of photos - have created a multitude of complexities for businesses who are now forced to deal with both a more discerning user and a more complicated visual landscape. Delivering the highest quality, lowest latency image to your users is getting progressively harder over time as more and more factors play a role in what delivering the “perfect” image means.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;Nobody should have to become an imaging scientist to achieve the most with their images. We built imgix to solve this.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;By providing a simple URL API&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/a-conspiracy-to-kill-ie6&amp;#34;&amp;gt;The bittersweet consequence of YouTube’s incredible growth is that so many stories will be lost underneath all of the layers of new paint. This is why I wanted to tell the story of how, ten years ago, a small team of web developers conspired to kill IE6 from inside YouTube and got away with it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/a-conspiracy-to-kill-ie6&amp;#34;&amp;gt;I do not recall the exact triggering event that led to our web development team laying out plans to kill IE6 over lunch in the YouTube cafeteria. Perhaps it was the time I pushed out a CSS stylesheet that included an attribute selector on a semi-supported HTML element. Any reasonable web developer would expect this to be ignored by browsers not up to the task. This was not the case with older flavors of IE. Under very specific conditions, an attribute selector on an unsupported HTML element in IE would create an internal recursion that would at best, cause the browser to crash and at worst...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imaging-and-the-internet&amp;#34;&amp;gt;Consider what taking a simple photograph meant 25 years ago. You had film cameras, negatives, dark rooms, emulsions, and paper. It would take days to produce a picture you could show to someone. Now consider what taking a photograph means today. With a smartphone that fits in our pocket, we can capture a photo, edit it, view it, and show it to anyone, all in as a little as a few seconds. These fantastic devices are simultaneously capable of capturing high resolution visuals, displaying them, and immediately distributing them to a billion other devices similarly capable of the exact same things. It is now actually perceivable that a photo you take one moment could be seen by over half of the entire human population a moment later. This power in visual expression has never existed before.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imaging-and-the-internet&amp;#34;&amp;gt;We can create and express visual media so incredibly fast that it is causing new behavioral patterns...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/multiplane-camera&amp;#34;&amp;gt;During a recent trip to the Disney Museum in San Francisco, I became immediately fascinated by the multiplane camera that was on display there. The gigantic machine represents so much of what I find inspiring in graphics and technology. It is fun to get lost in thought, imagining what the modern equivalent of the multiplane camera might be and how to foster the intersection of art and technology from which the multiplane camera emerged.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/multiplane-camera&amp;#34;&amp;gt;The multiplane camera was invented in 1933 by famous Disney animator/director Ub Iwerks. It worked by enabling animators to position their layers of acetate animation cels at varying distances and offsets in a vertical column. They could then shoot a camera downward to compose the cels into a single frame. While animators had been using acetate celluloid frames composited over painted mattes for decades prior, the technical effects that the multiplane...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/page-weight-matters&amp;#34;&amp;gt;Three years ago, while I was a web developer at YouTube, one of the senior engineers began a rant about the page weight of the video watch page being far too large. The page had ballooned to as high as 1.2MB and dozens of requests. This engineer openly vented that “if they can write an entire Quake clone in under 100KB, we have no excuse for this!” Given that I agreed with him and I was excited to find a new project, I decided to champion the cause of getting the YouTube watch page to weigh in under 100KB. On the shuttle home from San Bruno that night, I coded up a prototype. I decided to limit the functionality to just a basic masthead, the video player, five related videos, a sharing button, a flagging tool, and ten comments loaded in via AJAX. I code-named the project “Feather”.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/page-weight-matters&amp;#34;&amp;gt;Even with such a limited set of features, the page was weighing in at 250KB. I dug into the code and...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;When I was going through YCombinator in the summer of 2011, I felt like I was the only person in the entire class who knew nothing about taking investment. I remember distinctly when Jessica Livingston announced the $150K we would be getting from SV Angel and Start Fund. When she told us the terms, the room erupted in shouting and applause. I sat there Googling nervously, trying to understand what had just been said and wondering if I really belonged in YC at all.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;Being surrounded by such a select group of founders, each in varying stages of building their companies, you pick up the knowledge you need very quickly. This is the most valuable part of the 3-month YCombinator session. One piece of knowledge you learn very early on is that investors tend to have a herd mentality. What I would later realize through observation was that founders tend to as well.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;I remember getting the...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/cruise-ships&amp;#34;&amp;gt;In July of 2010, I made the decision to leave YouTube. The first thoughts I had were “How am I going to explain this to anyone? How will I tell mom?” To my family, I had the greatest job in the world and the amount of money I was making was unfathomable. They were certainly not wrong in thinking this. Google is absolutely the best place in the world to work and they do pay very well. It certainly was not an easy decision on my part.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/cruise-ships&amp;#34;&amp;gt;About 4 months before, I was backpacking through Europe, stopping off in major cities to present our latest HTML5 work at the local Google offices. It was my first time really exploring a different part of the world. I met fascinating people and experienced many random adventures. I was trapped in Stockholm for 9 days due to the Icelandic ash cloud. I was a successful stowaway on a train from Copenhagen to Hamburg. I had a girlfriend break up with me during...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>SIGPIPE 13</title>
      <link>https://www.whatsupup.com/blog/alveolar/cozey/20220520-163549/</link>
      <pubDate>Fri, 20 May 2022 16:35:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alveolar/cozey/20220520-163549/</guid>
      <description>As a general solution I created the every command &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gist.github.com/sorbits/5c0cb7292de091253f8e&amp;#34;&amp;gt;available here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This will run command every number time it’s invoked. For example to send an email the third, sixth, ninth, etc. time we call it, use:&amp;lt;br&amp;gt;
The command uses a guard file written to $XDG_DATA_HOME/every . If XDG_DATA_HOME is unset then it defaults to $HOME/.local/share .&amp;lt;br&amp;gt;
The name of the guard file is derived from the arguments passed to every (using sha1) and the content of the guard file is a counter to keep track of how many times we have been called. As a convenience we also write the command to the guard file.&amp;lt;br&amp;gt;
Once the counter reaches the value given via -n then every will remove the guard file and exec your command.&amp;lt;br&amp;gt;
If the external guard file is undesired or readability is not a concern, then an alternative approach is to use modular arithmetic with the UNIX epoch returned by date &#43;%s . For an example see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://coderwall.com/p/yzzu5a&amp;#34;&amp;gt;this post&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
If you upgraded to Mountain Lion and often want to cd into ~/Library/Application Support you might be a little annoyed by the new Application Scripts directory that makes the normal ~/Library/Ap⇥ stop at ~/Library/Application S‸ to have you disambiguate the path.&amp;lt;br&amp;gt;
To avoid this you can set the FIGNORE variable. From man bash :&amp;lt;br&amp;gt;
Some other useful variables you can set in ~/.inputrc that (IMHO) improve the default behavior of filename completion:&amp;lt;br&amp;gt;
The ignore case allows you to type ~/l⇥ and still get ~/Library/ .&amp;lt;br&amp;gt;
Marking symlinked directories is useful for /tmp , /etc , and /var .&amp;lt;br&amp;gt;
The binary installed is named g&#43;&#43;-mp-4.5 and you must use the -std=c&#43;&#43;0x argument to enable the new features.&amp;lt;br&amp;gt;
This was executed on a 2 × 2.8 GHz Quad Core Mac Pro where PBZip2 (correctly) auto-detected 8 cores.&amp;lt;br&amp;gt;
I am running PBZip2 version 1.1.0 from MacPorts ( sudo port install pbzip2 ).&amp;lt;br&amp;gt;
Update: Added test with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.nongnu.org/lzip/lzip.html&amp;#34;&amp;gt;LZip&amp;lt;/a&amp;gt; (an LZMA based compresser). There is a multi-threaded implementation of this ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.nongnu.org/lzip/plzip.html&amp;#34;&amp;gt;plzip&amp;lt;/a&amp;gt; ) but a quick ./configure &amp;amp;amp;&amp;amp;amp; make did not cut it.&amp;lt;br&amp;gt;
I just learned this neat thing about the cd shell command:&amp;lt;br&amp;gt;
The variable CDPATH defines the search path for the directory containing «dir» . Alternative directory names in CDPATH are separated by a colon ( : ). A null directory name is the same as the current directory. If «dir» begins with a slash ( / ), then CDPATH is not used.&amp;lt;br&amp;gt;
This works with tab completion (using bash 4.1.2) so regardless of the current directory, I can generally do cd Av⇥↩ to reach ~/Source/Avian .&amp;lt;br&amp;gt;
This is part 2 of what I think will end up as four parts. This might be a bit of a rehash of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://sigpipe.macromates.com/2010/01/15/build-automation-part-1/&amp;#34;&amp;gt;first part&amp;lt;/a&amp;gt; , but I skimmed lightly over why it actually is that I am so fond of make compared to most other build systems, so I will elaborate with some examples.&amp;lt;br&amp;gt;
This post is a “getting started with make ”. I plan to follow up with a part 2 about how to handle auto-generated self-updating Makefiles.&amp;lt;br&amp;gt;
I host two blogs, a wiki, and a ticket system, all targets for spam, so I have since generalized the system by using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://httpd.apache.org/docs/2.2/mod/mod_rewrite.html&amp;#34;&amp;gt;mod_rewrite&amp;lt;/a&amp;gt; to redirect all POSTs without a cookie to a page which uses JavaScript to set this cookie and resubmit the request (which is then no longer catched by mod_rewrite due to the cookie being set). This means “blocking” spam doesn’t require a plug-in written specifically for the particular web application.&amp;lt;br&amp;gt;
It is sometimes useful to have a script check the OS version, for example the way to get the user’s full name was previously done using niutil but Apple removed that command in Leopard (it can now be done using dscl ).&amp;lt;br&amp;gt;
One of my path functions is normalize . It removes (redundant) slashes and references to directory meta entries (current and parent directory).&amp;lt;br&amp;gt;
A lot of other path functions use or rely on normalize , for example my version of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;x-man-page://3/dirname&amp;#34;&amp;gt;dirname()&amp;lt;/a&amp;gt; is simply: return normalize(path &#43; &amp;amp;quot;/..&amp;amp;quot;); .&amp;lt;br&amp;gt;
I was recently tasked with rewriting normalize to be more efficient and it proved to be a bit of a challenge, so I’ll share what I came up with.&amp;lt;br&amp;gt;
Each time you add a rectangle you get back an identifier for this rectangle which can’t be stored in an NSArray as-is since it is of the primitive type NSTrackingRectTag (an integer).&amp;lt;br&amp;gt;
If you use Objective-C&#43;&#43; then you can use a std::vector&amp;amp;lt;NSTrackingRectTag&amp;amp;gt; to avoid having to box/unbox your identifiers but if you have tried to put non-POD in the interface declaration of your Objective-C class you have probably seen that gcc does not like that.&amp;lt;br&amp;gt;
Well, starting with 10.4 (so actually, some time ago) Apple added a switch to gcc which allows C&#43;&#43; objects as part of the instance data, and it will call both constructor and destructor for your C&#43;&#43; objects when allocating/deallocating the Objective-C object.&amp;lt;br&amp;gt;
The flag you need to set is -fobjc-call-cxx-cdtors .&amp;lt;br&amp;gt;
Occasionally it is convenient to pass a C&#43;&#43; object to an Objective-C method. For example I have an NSString initializer that takes a std::string as argument.&amp;lt;br&amp;gt;
This works as long as you pass the object as a reference (i.e. pass a pointer), but you can use the “reference of” operator in the method signature rather than at the call-site. By using a const reference it will work for temporary/implicit objects.&amp;lt;br&amp;gt;
Two very nice shell commands that Apple has given us are the pbcopy and pbpaste commands. These allow stdin to go to the clipboard and the clipboard to be written to stdout.&amp;lt;br&amp;gt;
There’s just one source, it compiles to a command which works as pbcopy , when called under that name, otherwise pbpaste .&amp;lt;br&amp;gt;
What I’ve done is place the command in ~/bin and added a symbolic link from pbpaste to pbcopy , like this:&amp;lt;br&amp;gt;
And in addition ensured that my PATH contains ~/bin before anything else, i.e. by placing the following in my ~/.bash_profile (well, actually ~/.zshrc ):&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>/var/blog | blogging data from aditya mukerjee</title>
      <link>https://www.whatsupup.com/blog/nuncle/haw/20220520-163523/</link>
      <pubDate>Fri, 20 May 2022 16:35:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nuncle/haw/20220520-163523/</guid>
      <description>For a long time, I used the built-in microphone for my laptop (along with headphones and an external webcam). Getting an all-in-one headset made a huge difference, both for me and my teammates. Between the latency and the (lack of) noise correction, using the built-in microphone meant a lot of slightly awkward pauses, or accidentally interrupting because the other person had started speaking, but I couldn’t hear it yet. With an all-in-one headset, the microphone is much closer to the source (your voice) and it doesn’t pick up the sound from your headset speakers the way your laptop microphone does when you use it without headphones. This makes the noise correction works much better, giving the illusion of lower latency, and so it feels a lot more like having a natural conversation. (I have the Jabra UC Voice ), but I think any dedicated computer headset will work better than the built-in laptop microphone and speakers).&amp;lt;br&amp;gt;
If you really can’t break the habit of logging errors, you can at least add a hook to log.error that sends the error (and a complete stacktrace) to an error reporting tool like Sentry.&amp;lt;br&amp;gt;
Logging can be useful for some purposes. However, it’s rare that they’re the only tool for monitoring your code. And it’s even rarer that they’re the best tool. When writing software that scales, you need to be able to deal with aggregate information – the firehose is too unwieldy to parse mentally. Logs that can be aggregated are better than logs that can’t. In those cases, it’s best to keep logging, but when you need to diagnose a problem, you’ll be interested in reading aggregate queries across your logs, rather than viewing raw, unaggregated logs in chronological order. The former is a powerful way to absorb a lot of information about your systems quickly. The latter is a glorified tail -f | grep .&amp;lt;br&amp;gt;
dig gave me the following output:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20220520-163458/</link>
      <pubDate>Fri, 20 May 2022 16:34:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20220520-163458/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&amp;#34;&amp;gt;Pixel Hunt&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&amp;#34;&amp;gt;Applied for Student Aid Online? Facebook Saw You&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&amp;#34;&amp;gt;The FAFSA form included code that sent personal information back to Facebook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&amp;#34;&amp;gt;April 28, 2022 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&amp;#34;&amp;gt;Show Your Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&amp;#34;&amp;gt;Pixel Hunt&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&amp;#34;&amp;gt;How We Built a Meta Pixel Inspector&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&amp;#34;&amp;gt;The first large-scale, crowdsourced study that monitors how Meta tracks people across the internet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/11/18/how-we-investigated-facebooks-most-popular-content&amp;#34;&amp;gt;Show Your Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/11/18/how-we-investigated-facebooks-most-popular-content&amp;#34;&amp;gt;Citizen Browser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/11/18/how-we-investigated-facebooks-most-popular-content&amp;#34;&amp;gt;How We Investigated Facebook’s Most  Popular Content&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/11/18/how-we-investigated-facebooks-most-popular-content&amp;#34;&amp;gt;We found that Facebook&amp;amp;#39;s popularity metric obscures how well ultra-conservative content does on the platform&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/11/18/facebook-isnt-telling-you-how-popular-right-wing-content-is-on-the-platform&amp;#34;&amp;gt;Citizen Browser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/11/18/facebook-isnt-telling-you-how-popular-right-wing-content-is-on-the-platform&amp;#34;&amp;gt;Facebook Isn’t Telling You How Popular Right-Wing Content Is on the Platform&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/11/18/facebook-isnt-telling-you-how-popular-right-wing-content-is-on-the-platform&amp;#34;&amp;gt;Facebook insists that mainstream news sites perform the best on its platform. But by other measures, sensationalist, partisan content reigns&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/22/germanys-far-right-political-party-the-afd-is-dominating-facebook-this-election&amp;#34;&amp;gt;Germany’s Far-Right Political Party, the AfD, Is Dominating Facebook This Election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/22/germanys-far-right-political-party-the-afd-is-dominating-facebook-this-election&amp;#34;&amp;gt;Ahead of a national vote this month, Citizen Browser data shows that posts promoting the AfD party appeared more than three times as often as rivals&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/21/facebook-rolls-out-news-feed-change-that-blocks-watchdogs-from-gathering-data&amp;#34;&amp;gt;Facebook Rolls Out News Feed Change That Blocks Watchdogs from Gathering Data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/21/facebook-rolls-out-news-feed-change-that-blocks-watchdogs-from-gathering-data&amp;#34;&amp;gt;The tweak, which targets the code in accessibility features for visually impaired users, drew ire from researchers and those who monitor the platform&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/08/10/how-the-daily-wire-uses-facebooks-targeted-advertising-to-build-its-brand&amp;#34;&amp;gt;How The Daily Wire Uses Facebook’s Targeted Advertising  to Build Its Brand&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/08/10/how-the-daily-wire-uses-facebooks-targeted-advertising-to-build-its-brand&amp;#34;&amp;gt;The social media giant&amp;amp;#39;s powerful targeting tools appear to be part of Ben Shapiro’s success in growing his audience on the platform&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/07/09/facebook-got-rid-of-racial-ad-categories-or-did-it&amp;#34;&amp;gt;Facebook Got Rid of Racial Ad Categories. Or Did It?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/07/09/facebook-got-rid-of-racial-ad-categories-or-did-it&amp;#34;&amp;gt;Our Citizen Browser project found an array of proxies through which advertisers can target Black Facebook users, among other demographics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/06/24/after-repeatedly-promising-not-to-facebook-keeps-recommending-political-groups-to-its-users&amp;#34;&amp;gt;After Repeatedly Promising Not to, Facebook Keeps Recommending Political Groups to Its Users&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/06/24/after-repeatedly-promising-not-to-facebook-keeps-recommending-political-groups-to-its-users&amp;#34;&amp;gt;The company announced the policy as a way to stop spreading divisive content&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/05/20/facebook-said-it-would-stop-recommending-anti-vaccine-groups-it-didnt&amp;#34;&amp;gt;Facebook Said It Would Stop Recommending Anti-Vaccine Groups. It Didn’t&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/05/20/facebook-said-it-would-stop-recommending-anti-vaccine-groups-it-didnt&amp;#34;&amp;gt;As COVID-19 surged, the social media company pointed users to all sorts of anti-vaccine and anti-mask groups&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/people/julia-angwin/page/0&amp;#34;&amp;gt;Newer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/people/julia-angwin/page/2&amp;#34;&amp;gt;Older&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220520-163432/</link>
      <pubDate>Fri, 20 May 2022 16:34:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220520-163432/</guid>
      <description>Jeff Huang Brown University &amp;lt;a href=&amp;#34;mailto:home@jeffhuang.com&amp;#34;&amp;gt;home@jeffhuang.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ramblings from Jessie: Home</title>
      <link>https://www.whatsupup.com/blog/conservatorship/reemphasize/20220520-163343/</link>
      <pubDate>Fri, 20 May 2022 16:33:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/conservatorship/reemphasize/20220520-163343/</guid>
      <description>Okay so lets begin with: sudo rm -rf / &amp;amp;amp;&amp;amp;amp; sudo kill -9 1 .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&amp;&gt; /dev/null</title>
      <link>https://www.whatsupup.com/blog/airbrush/misogynic/20220520-161239/</link>
      <pubDate>Fri, 20 May 2022 16:12:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/airbrush/misogynic/20220520-161239/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/01/the-wave-particle-duality-of-git-commits/&amp;#34;&amp;gt;The Wave/Particle Duality of Git Commits&amp;lt;/a&amp;gt; Jan 20, 2020 Yet another way to think of git rebase&amp;lt;br&amp;gt;
«&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220520-161125/</link>
      <pubDate>Fri, 20 May 2022 16:11:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220520-161125/</guid>
      <description>New Top Discussion&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220520-155353/</link>
      <pubDate>Fri, 20 May 2022 15:53:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220520-155353/</guid>
      <description>Web of Things&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20220520-155331/</link>
      <pubDate>Fri, 20 May 2022 15:53:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20220520-155331/</guid>
      <description>&amp;lt;p&amp;gt;So, we need to bring out bigger guns in.  I searched the kernel source for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/A/ident/init_pid_ns&amp;#34;&amp;gt;occurrences of&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/A/ident/init_pid_ns&amp;#34;&amp;gt;init_pid_ns&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
,
as this namespace is called in the Linux source code.  There are not
too many occurrences we can rely on.  The taskstats module limits the&amp;lt;br&amp;gt;
tool
directly influenced the user interface of my&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/leahneukirchen/nq&amp;#34;&amp;gt;nq&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
tool,
and reading about&amp;lt;br&amp;gt;
inspired my&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/leahneukirchen/lr&amp;#34;&amp;gt;lr&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
.
His&amp;lt;br&amp;gt;
lives on as my&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/dotfiles/bin/mend&amp;#34;&amp;gt;mend&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220520-154512/</link>
      <pubDate>Fri, 20 May 2022 15:45:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220520-154512/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;Even Among Corporate Raiders, Elon Musk Is a Pirate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;The world of deal making has always been rough and tumble. But Mr. Musk blows any predecessors away.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;New Majority Gives F.T.C. a Chance to Push an Aggressive Agenda&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;The confirmation of a third Democrat creates an opportunity for Lina Khan, the Federal Trade Commission’s chair, to advance efforts to rein in corporate power.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;David McCabe&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;With Deal for Twitter, Musk Lands a Prize and Pledges Fewer Limits&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;The world’s richest man succeeded in a bid to acquire the influential social networking service, which he has said he wants to take private.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;Mike Isaac&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;News Analysis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;As Europe Approves New Tech Laws, the U.S. Falls Further Behind&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;Federal privacy bills, security legislation and antitrust laws to address the power of the tech giants have all failed to advance in Congress, despite hand wringing and shows of bipartisan support.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;Barack Obama Takes On a New Role: Fighting Disinformation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;The former president has embarked on a campaign to warn that the scourge of online falsehoods has eroded the foundations of democracy.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;Steven Lee Myers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/18/technology/zuckerberg-meta-privacy-lawsuit.html&amp;#34;&amp;gt;A judge throws out D.C.’s attempt to name Zuckerberg in a privacy lawsuit.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/18/technology/zuckerberg-meta-privacy-lawsuit.html&amp;#34;&amp;gt;D.C.’s attorney general had waited too long to add Mark Zuckerberg as a defendant in the suit against Meta, the judge said.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/business/rt-america-russian-tv.html&amp;#34;&amp;gt;What It Was Like to Work for Russian State Television&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/business/rt-america-russian-tv.html&amp;#34;&amp;gt;Until RT America ended abruptly, life as a journalist there was “actually so normal.”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;A House panel calls for a criminal investigation into Amazon.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;Members of the Judiciary Committee accused Amazon of obstructing its inquiry into how the company treats third-party sellers.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;Cecilia Kang&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/02/technology/tiktok-states-investigation.html&amp;#34;&amp;gt;A coalition of state attorneys general opens an investigation into TikTok.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/02/technology/tiktok-states-investigation.html&amp;#34;&amp;gt;The group is looking into the Chinese-owned video site for the harms it may pose to younger users.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/28/technology/whole-foods-amazon-automation.html&amp;#34;&amp;gt;Here Comes the Full Amazonification of Whole Foods&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/28/technology/whole-foods-amazon-automation.html&amp;#34;&amp;gt;A newly revamped store in Washington shows how thoroughly Amazon has woven itself into the grocery shopping experience.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ceciliakang&amp;#34;&amp;gt;ceciliakang&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ceciliakang&amp;#34;&amp;gt;twitter&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ceciliakang&amp;#34;&amp;gt;page for&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ceciliakang&amp;#34;&amp;gt;ceciliakang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220520-154306/</link>
      <pubDate>Fri, 20 May 2022 15:43:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220520-154306/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/company&amp;#34;&amp;gt;Discord HQ&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;Product &amp;amp;amp; Features&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/safety&amp;#34;&amp;gt;Policy &amp;amp;amp; Safety&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/engineering&amp;#34;&amp;gt;Engineering &amp;amp;amp; Design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cutlefish - Product Nerdery | @johncutlefish&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/flea/unthought/20220520-154218/</link>
      <pubDate>Fri, 20 May 2022 15:42:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/flea/unthought/20220520-154218/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pandemic-and-health&amp;#34;&amp;gt;Pandemic, Teams, Health, and Self-Care&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pandemic-and-health&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pandemic-and-health&amp;#34;&amp;gt;June 29, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pandemic-and-health&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/50-product-lessons&amp;#34;&amp;gt;50 Short Product Lessons&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/50-product-lessons&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/50-product-lessons&amp;#34;&amp;gt;June 29, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/50-product-lessons&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-tweets&amp;#34;&amp;gt;Book Pre-Order&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-tweets&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-tweets&amp;#34;&amp;gt;May 16, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-tweets&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/mvp-and-experiment-tips&amp;#34;&amp;gt;Some MVP and Experiment Tips&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/mvp-and-experiment-tips&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/mvp-and-experiment-tips&amp;#34;&amp;gt;February 25, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/mvp-and-experiment-tips&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/breaking-the-rules&amp;#34;&amp;gt;Great Teams Break the &amp;amp;quot;Rules&amp;amp;quot; All the Time&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/breaking-the-rules&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/breaking-the-rules&amp;#34;&amp;gt;December 17, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/breaking-the-rules&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/promises-kept&amp;#34;&amp;gt;Small Promises Regularly Kept&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/promises-kept&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/promises-kept&amp;#34;&amp;gt;December 16, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/promises-kept&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/shape-up-review&amp;#34;&amp;gt;Review Notes: Shape Up&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/shape-up-review&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/shape-up-review&amp;#34;&amp;gt;December 13, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/shape-up-review&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-product-managers-lose-trust&amp;#34;&amp;gt;How Product Managers Lose Trust&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-product-managers-lose-trust&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-product-managers-lose-trust&amp;#34;&amp;gt;September 14, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-product-managers-lose-trust&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/what-is-an-mvp&amp;#34;&amp;gt;What Is an MVP?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/what-is-an-mvp&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/what-is-an-mvp&amp;#34;&amp;gt;September 07, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/what-is-an-mvp&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-you-want-to-fix-something&amp;#34;&amp;gt;So You Want to Fix Something?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-you-want-to-fix-something&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-you-want-to-fix-something&amp;#34;&amp;gt;August 19, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-you-want-to-fix-something&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measure-to-learn-not-to-control&amp;#34;&amp;gt;Measuring to Control vs. Measuring to Learn and Improve&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measure-to-learn-not-to-control&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measure-to-learn-not-to-control&amp;#34;&amp;gt;August 16, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measure-to-learn-not-to-control&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/small-teams-may-not-fix-the-mess&amp;#34;&amp;gt;Small Teams May Not Fix The Mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/small-teams-may-not-fix-the-mess&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/small-teams-may-not-fix-the-mess&amp;#34;&amp;gt;July 06, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/small-teams-may-not-fix-the-mess&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-system-bites-back&amp;#34;&amp;gt;The System Bites Back&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-system-bites-back&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-system-bites-back&amp;#34;&amp;gt;June 18, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-system-bites-back&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/making-okrs-easier&amp;#34;&amp;gt;Making OKRs Easier…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/making-okrs-easier&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/making-okrs-easier&amp;#34;&amp;gt;June 16, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/making-okrs-easier&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-fast-and-slow&amp;#34;&amp;gt;Working Fast and Slow&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-fast-and-slow&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-fast-and-slow&amp;#34;&amp;gt;June 11, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-fast-and-slow&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/meta-advocacy&amp;#34;&amp;gt;“Meta” Advocacy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/meta-advocacy&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/meta-advocacy&amp;#34;&amp;gt;June 10, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/meta-advocacy&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-youre-hiring-a-product-manager&amp;#34;&amp;gt;So You’re Hiring a Product Manager?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-youre-hiring-a-product-manager&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-youre-hiring-a-product-manager&amp;#34;&amp;gt;May 04, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-youre-hiring-a-product-manager&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/by-default-ship-nothing&amp;#34;&amp;gt;By Default, Ship Nothing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/by-default-ship-nothing&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/by-default-ship-nothing&amp;#34;&amp;gt;April 28, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/by-default-ship-nothing&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-messy-shift-to-starting-together&amp;#34;&amp;gt;The (Messy) Shift to Starting Together&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-messy-shift-to-starting-together&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-messy-shift-to-starting-together&amp;#34;&amp;gt;April 17, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-messy-shift-to-starting-together&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hot-mess&amp;#34;&amp;gt;Hot Mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hot-mess&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hot-mess&amp;#34;&amp;gt;April 03, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hot-mess&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-product-development-for-startups&amp;#34;&amp;gt;Scaling Product Development (for Startups)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-product-development-for-startups&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-product-development-for-startups&amp;#34;&amp;gt;March 20, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-product-development-for-startups&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-big-leaps&amp;#34;&amp;gt;The Big Leaps&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-big-leaps&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-big-leaps&amp;#34;&amp;gt;March 18, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-big-leaps&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-without-level-of-effort&amp;#34;&amp;gt;Prioritizing Without Level of Effort?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-without-level-of-effort&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-without-level-of-effort&amp;#34;&amp;gt;March 15, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-without-level-of-effort&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/should-we-have-deadlines&amp;#34;&amp;gt;Should We Have Deadlines?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/should-we-have-deadlines&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/should-we-have-deadlines&amp;#34;&amp;gt;March 13, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/should-we-have-deadlines&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now-8-ways-to-focus-your-product-team-on-impact-not-features&amp;#34;&amp;gt;Do This Now: 8 Ways to Focus your Product Team on Impact, Not Features&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now-8-ways-to-focus-your-product-team-on-impact-not-features&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now-8-ways-to-focus-your-product-team-on-impact-not-features&amp;#34;&amp;gt;February 16, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now-8-ways-to-focus-your-product-team-on-impact-not-features&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spirit-of-sprints&amp;#34;&amp;gt;(The Spirit Of…) Sprints&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spirit-of-sprints&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spirit-of-sprints&amp;#34;&amp;gt;February 09, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spirit-of-sprints&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-the-time-if-it-is-important&amp;#34;&amp;gt;Make the Time (If It Is Important)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-the-time-if-it-is-important&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-the-time-if-it-is-important&amp;#34;&amp;gt;February 02, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-the-time-if-it-is-important&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-things-you-should-know-about-product-managers&amp;#34;&amp;gt;15 Things You Should Know About Product Managers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-things-you-should-know-about-product-managers&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-things-you-should-know-about-product-managers&amp;#34;&amp;gt;January 27, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-things-you-should-know-about-product-managers&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/visualize-flow-at-a-higher-level&amp;#34;&amp;gt;Visualize Flow at a Higher Level&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/visualize-flow-at-a-higher-level&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/visualize-flow-at-a-higher-level&amp;#34;&amp;gt;January 22, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/visualize-flow-at-a-higher-level&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/organizational-debt&amp;#34;&amp;gt;Organizational Debt&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/organizational-debt&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/organizational-debt&amp;#34;&amp;gt;January 14, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/organizational-debt&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/going-agile&amp;#34;&amp;gt;“Going Agile”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/going-agile&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/going-agile&amp;#34;&amp;gt;January 12, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/going-agile&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-models&amp;#34;&amp;gt;Continuous Improvement Models&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-models&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-models&amp;#34;&amp;gt;January 04, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-models&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hybrid-boards-for-roadmapping&amp;#34;&amp;gt;Hybrid Boards For Roadmapping&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hybrid-boards-for-roadmapping&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hybrid-boards-for-roadmapping&amp;#34;&amp;gt;January 03, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hybrid-boards-for-roadmapping&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-product-development-traps&amp;#34;&amp;gt;10 Product Development Traps&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-product-development-traps&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-product-development-traps&amp;#34;&amp;gt;January 02, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-product-development-traps&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/resilience-the-fork-in-the-road&amp;#34;&amp;gt;Resilience: The Fork in the Road&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/resilience-the-fork-in-the-road&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/resilience-the-fork-in-the-road&amp;#34;&amp;gt;December 30, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/resilience-the-fork-in-the-road&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/learning-or-just-delivering&amp;#34;&amp;gt;Learning? Or Just Delivering?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/learning-or-just-delivering&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/learning-or-just-delivering&amp;#34;&amp;gt;December 24, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/learning-or-just-delivering&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-about-change-agency-and-continuous-improvement&amp;#34;&amp;gt;15 Posts About Change Agency and Continuous Improvement&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-about-change-agency-and-continuous-improvement&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-about-change-agency-and-continuous-improvement&amp;#34;&amp;gt;December 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-about-change-agency-and-continuous-improvement&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-on-roadmaps-prioritization-and-visualizing-the-work&amp;#34;&amp;gt;15 Posts on Roadmaps, Prioritization, and Visualizing The Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-on-roadmaps-prioritization-and-visualizing-the-work&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-on-roadmaps-prioritization-and-visualizing-the-work&amp;#34;&amp;gt;December 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-on-roadmaps-prioritization-and-visualizing-the-work&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now&amp;#34;&amp;gt;Do This Now!&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now&amp;#34;&amp;gt;December 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-outcomes-over-outputs&amp;#34;&amp;gt;Why Outcomes Over Outputs?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-outcomes-over-outputs&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-outcomes-over-outputs&amp;#34;&amp;gt;December 18, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-outcomes-over-outputs&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/decision-quality-decision-velocity&amp;#34;&amp;gt;Decision Quality. Decision Velocity.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/decision-quality-decision-velocity&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/decision-quality-decision-velocity&amp;#34;&amp;gt;December 11, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/decision-quality-decision-velocity&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-cold-start-problem&amp;#34;&amp;gt;The Cold Start Problem&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-cold-start-problem&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-cold-start-problem&amp;#34;&amp;gt;December 11, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-cold-start-problem&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/great-one-pagers&amp;#34;&amp;gt;Great One-Pagers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/great-one-pagers&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/great-one-pagers&amp;#34;&amp;gt;December 10, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/great-one-pagers&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/certainty-theater&amp;#34;&amp;gt;Certainty Theater&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/certainty-theater&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/certainty-theater&amp;#34;&amp;gt;December 09, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/certainty-theater&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-experiment&amp;#34;&amp;gt;Why Experiment?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-experiment&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-experiment&amp;#34;&amp;gt;December 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-experiment&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/from-decision-maker-to-decision-supporter&amp;#34;&amp;gt;From Decision Maker to Decision Supporter&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/from-decision-maker-to-decision-supporter&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/from-decision-maker-to-decision-supporter&amp;#34;&amp;gt;December 01, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/from-decision-maker-to-decision-supporter&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/16-individual-warning-signals&amp;#34;&amp;gt;16 Individual Warning Signals&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/16-individual-warning-signals&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/16-individual-warning-signals&amp;#34;&amp;gt;November 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/16-individual-warning-signals&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-tribe&amp;#34;&amp;gt;The [?] Tribe&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-tribe&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-tribe&amp;#34;&amp;gt;November 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-tribe&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-dont-they-trust-us&amp;#34;&amp;gt;Why Don’t They Trust Us?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-dont-they-trust-us&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-dont-they-trust-us&amp;#34;&amp;gt;November 16, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-dont-they-trust-us&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/self-inflicted-chaos&amp;#34;&amp;gt;Self-Inflicted Chaos&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/self-inflicted-chaos&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/self-inflicted-chaos&amp;#34;&amp;gt;November 13, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/self-inflicted-chaos&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/practice-best-practices&amp;#34;&amp;gt;Practice &amp;amp;gt; Best Practices&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/practice-best-practices&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/practice-best-practices&amp;#34;&amp;gt;November 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/practice-best-practices&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-do-we-do-ux-with-agile&amp;#34;&amp;gt;How Do We Do UX With Agile?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-do-we-do-ux-with-agile&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-do-we-do-ux-with-agile&amp;#34;&amp;gt;October 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-do-we-do-ux-with-agile&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-drift-into-technical-bankruptcy&amp;#34;&amp;gt;The Drift Into Technical Bankruptcy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-drift-into-technical-bankruptcy&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-drift-into-technical-bankruptcy&amp;#34;&amp;gt;October 04, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-drift-into-technical-bankruptcy&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-person-assigned-to-each-story&amp;#34;&amp;gt;One Person Assigned To Each Story?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-person-assigned-to-each-story&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-person-assigned-to-each-story&amp;#34;&amp;gt;September 28, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-person-assigned-to-each-story&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-tools-vs-project-management-tools&amp;#34;&amp;gt;Continuous Improvement Tools vs. Project Management Tools&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-tools-vs-project-management-tools&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-tools-vs-project-management-tools&amp;#34;&amp;gt;September 24, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-tools-vs-project-management-tools&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-mvp-bait-and-switch&amp;#34;&amp;gt;The MVP Bait-and-Switch&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-mvp-bait-and-switch&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-mvp-bait-and-switch&amp;#34;&amp;gt;September 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-mvp-bait-and-switch&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-is-real-work&amp;#34;&amp;gt;Continuous Improvement is Real Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-is-real-work&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-is-real-work&amp;#34;&amp;gt;September 17, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-is-real-work&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/messy-middle&amp;#34;&amp;gt;Messy Middle&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/messy-middle&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/messy-middle&amp;#34;&amp;gt;September 13, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/messy-middle&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/amplitude&amp;#34;&amp;gt;Amplitude&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/amplitude&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/amplitude&amp;#34;&amp;gt;September 05, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/amplitude&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-herding-more-doing&amp;#34;&amp;gt;Less Herding. More Doing.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-herding-more-doing&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-herding-more-doing&amp;#34;&amp;gt;August 30, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-herding-more-doing&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/thatll-never-work-here-heretics-head-noddies-and-the-drift-into-mediocrity&amp;#34;&amp;gt;That’ll Never Work Here: Heretics, Head Noddies, and the Drift Into Mediocrity&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/thatll-never-work-here-heretics-head-noddies-and-the-drift-into-mediocrity&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/thatll-never-work-here-heretics-head-noddies-and-the-drift-into-mediocrity&amp;#34;&amp;gt;August 28, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/thatll-never-work-here-heretics-head-noddies-and-the-drift-into-mediocrity&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pm-tip-30-seconds-answers-to-common-questions&amp;#34;&amp;gt;PM Tip: 30 Seconds Answers (to Common Questions)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pm-tip-30-seconds-answers-to-common-questions&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pm-tip-30-seconds-answers-to-common-questions&amp;#34;&amp;gt;August 26, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pm-tip-30-seconds-answers-to-common-questions&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-quarterly-okrs&amp;#34;&amp;gt;Why Quarterly OKRs?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-quarterly-okrs&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-quarterly-okrs&amp;#34;&amp;gt;August 24, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-quarterly-okrs&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/4-prioritization-lessons-using-cost-of-delay-and-cd3&amp;#34;&amp;gt;4 Prioritization Lessons (using Cost of Delay and CD3)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/4-prioritization-lessons-using-cost-of-delay-and-cd3&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/4-prioritization-lessons-using-cost-of-delay-and-cd3&amp;#34;&amp;gt;August 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/4-prioritization-lessons-using-cost-of-delay-and-cd3&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/not-leadership-material&amp;#34;&amp;gt;Not Leadership “Material”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/not-leadership-material&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/not-leadership-material&amp;#34;&amp;gt;August 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/not-leadership-material&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/70-books-and-other-resources-for-internal-change-agents&amp;#34;&amp;gt;70 Books (and Other Resources) for Internal Change Agents&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/70-books-and-other-resources-for-internal-change-agents&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/70-books-and-other-resources-for-internal-change-agents&amp;#34;&amp;gt;August 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/70-books-and-other-resources-for-internal-change-agents&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/feels-like-faster-vs-is-actually-faster&amp;#34;&amp;gt;Feels Like Faster vs. Is Actually Faster&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/feels-like-faster-vs-is-actually-faster&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/feels-like-faster-vs-is-actually-faster&amp;#34;&amp;gt;August 18, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/feels-like-faster-vs-is-actually-faster&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-scrum-scrumptious&amp;#34;&amp;gt;Make Scrum Scrumptious!&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-scrum-scrumptious&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-scrum-scrumptious&amp;#34;&amp;gt;August 13, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-scrum-scrumptious&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-patient-change-agent&amp;#34;&amp;gt;The Patient Change Agent&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-patient-change-agent&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-patient-change-agent&amp;#34;&amp;gt;August 12, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-patient-change-agent&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-manager-and-the-change-agent&amp;#34;&amp;gt;The Manager and the Change Agent&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-manager-and-the-change-agent&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-manager-and-the-change-agent&amp;#34;&amp;gt;August 07, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-manager-and-the-change-agent&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/your-org-problems-are-not-unique&amp;#34;&amp;gt;Your Org Problems Are Not Unique&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/your-org-problems-are-not-unique&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/your-org-problems-are-not-unique&amp;#34;&amp;gt;August 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/your-org-problems-are-not-unique&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/is-agile-the-enemy-of-good-design&amp;#34;&amp;gt;Is Agile the Enemy (of Good Design)?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/is-agile-the-enemy-of-good-design&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/is-agile-the-enemy-of-good-design&amp;#34;&amp;gt;July 28, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/is-agile-the-enemy-of-good-design&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/whyestimates&amp;#34;&amp;gt;#WhyEstimates&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/whyestimates&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/whyestimates&amp;#34;&amp;gt;July 26, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/whyestimates&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ripple-effects-no-and-chips-on-shoulders&amp;#34;&amp;gt;Ripple Effects, No, and Chips On Shoulders…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ripple-effects-no-and-chips-on-shoulders&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ripple-effects-no-and-chips-on-shoulders&amp;#34;&amp;gt;July 25, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ripple-effects-no-and-chips-on-shoulders&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-outcomes-less-drag&amp;#34;&amp;gt;Better Outcomes. Less Drag&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-outcomes-less-drag&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-outcomes-less-drag&amp;#34;&amp;gt;July 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-outcomes-less-drag&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-canary-dies&amp;#34;&amp;gt;The Canary Dies&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-canary-dies&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-canary-dies&amp;#34;&amp;gt;July 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-canary-dies&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-some-tool&amp;#34;&amp;gt;#Why[Some Tool]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-some-tool&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-some-tool&amp;#34;&amp;gt;July 15, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-some-tool&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/slack-vs-blocked&amp;#34;&amp;gt;Slack vs. Blocked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/slack-vs-blocked&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/slack-vs-blocked&amp;#34;&amp;gt;July 13, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/slack-vs-blocked&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/invest-energy-and-focus-not-time&amp;#34;&amp;gt;Invest Energy and Focus, Not Time&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/invest-energy-and-focus-not-time&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/invest-energy-and-focus-not-time&amp;#34;&amp;gt;July 10, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/invest-energy-and-focus-not-time&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/team-why-cant-we-go-faster&amp;#34;&amp;gt;Team! Why Can’t We Go Faster?!&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/team-why-cant-we-go-faster&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/team-why-cant-we-go-faster&amp;#34;&amp;gt;July 09, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/team-why-cant-we-go-faster&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/instant-results-guaranteed&amp;#34;&amp;gt;Instant Results! Guaranteed!&amp;lt;em&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/instant-results-guaranteed&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/instant-results-guaranteed&amp;#34;&amp;gt;July 08, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/instant-results-guaranteed&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/just-one-more-sprint&amp;#34;&amp;gt;Just One More Sprint!?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/just-one-more-sprint&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/just-one-more-sprint&amp;#34;&amp;gt;July 07, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/just-one-more-sprint&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/quick-meeting-tips&amp;#34;&amp;gt;Quick Meeting Tips&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/quick-meeting-tips&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/quick-meeting-tips&amp;#34;&amp;gt;July 06, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/quick-meeting-tips&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pms-share-outcomes-with-your-team&amp;#34;&amp;gt;PMs: Share Outcomes With Your Team&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pms-share-outcomes-with-your-team&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pms-share-outcomes-with-your-team&amp;#34;&amp;gt;July 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pms-share-outcomes-with-your-team&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/opportunity-vs-intervention&amp;#34;&amp;gt;Opportunity vs. Intervention&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/opportunity-vs-intervention&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/opportunity-vs-intervention&amp;#34;&amp;gt;June 29, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/opportunity-vs-intervention&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-makes-no-sense&amp;#34;&amp;gt;Agile Makes No Sense&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-makes-no-sense&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-makes-no-sense&amp;#34;&amp;gt;June 28, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-makes-no-sense&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-with-naive-pragmatism&amp;#34;&amp;gt;Start With Naive Pragmatism&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-with-naive-pragmatism&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-with-naive-pragmatism&amp;#34;&amp;gt;June 26, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-with-naive-pragmatism&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/its-products-fault-right&amp;#34;&amp;gt;It’s Product’s Fault! Right?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/its-products-fault-right&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/its-products-fault-right&amp;#34;&amp;gt;June 25, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/its-products-fault-right&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/a-single-prioritized-list-a-story&amp;#34;&amp;gt;A Single Prioritized List (a Story)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/a-single-prioritized-list-a-story&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/a-single-prioritized-list-a-story&amp;#34;&amp;gt;June 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/a-single-prioritized-list-a-story&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/focused-advocacy-and-improvement&amp;#34;&amp;gt;Focused Advocacy and Improvement&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/focused-advocacy-and-improvement&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/focused-advocacy-and-improvement&amp;#34;&amp;gt;June 21, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/focused-advocacy-and-improvement&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/when-you-hear-pay-attention&amp;#34;&amp;gt;When You Hear _______, Pay Attention&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/when-you-hear-pay-attention&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/when-you-hear-pay-attention&amp;#34;&amp;gt;June 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/when-you-hear-pay-attention&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/before-adding-process&amp;#34;&amp;gt;Before Adding Process&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/before-adding-process&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/before-adding-process&amp;#34;&amp;gt;June 17, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/before-adding-process&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/platitudes-and-brass-tacks&amp;#34;&amp;gt;Platitudes and Brass Tacks&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/platitudes-and-brass-tacks&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/platitudes-and-brass-tacks&amp;#34;&amp;gt;June 15, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/platitudes-and-brass-tacks&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-random-ticket-game&amp;#34;&amp;gt;The Random Ticket Game&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-random-ticket-game&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-random-ticket-game&amp;#34;&amp;gt;June 12, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-random-ticket-game&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/value-and-sequencing&amp;#34;&amp;gt;Value and Sequencing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/value-and-sequencing&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/value-and-sequencing&amp;#34;&amp;gt;June 07, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/value-and-sequencing&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spokesperson-trap&amp;#34;&amp;gt;The Spokesperson Trap&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spokesperson-trap&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spokesperson-trap&amp;#34;&amp;gt;June 05, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spokesperson-trap&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-non-feature-work-and-continuous-improvement&amp;#34;&amp;gt;Prioritizing “Non-Feature” Work and Continuous Improvement&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-non-feature-work-and-continuous-improvement&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-non-feature-work-and-continuous-improvement&amp;#34;&amp;gt;June 04, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-non-feature-work-and-continuous-improvement&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-quick-wins&amp;#34;&amp;gt;We Need Quick Wins…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-quick-wins&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-quick-wins&amp;#34;&amp;gt;June 04, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-quick-wins&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unsuck-days&amp;#34;&amp;gt;Unsuck Days&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unsuck-days&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unsuck-days&amp;#34;&amp;gt;June 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unsuck-days&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/they-just-want-to-code-or-design-all-day&amp;#34;&amp;gt;“They Just Want To Code (or Design) All Day”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/they-just-want-to-code-or-design-all-day&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/they-just-want-to-code-or-design-all-day&amp;#34;&amp;gt;May 30, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/they-just-want-to-code-or-design-all-day&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/three-deep-breaths&amp;#34;&amp;gt;Three Deep Breaths&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/three-deep-breaths&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/three-deep-breaths&amp;#34;&amp;gt;May 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/three-deep-breaths&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/systems-and-people-behaving-badly&amp;#34;&amp;gt;Systems and People Behaving Badly&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/systems-and-people-behaving-badly&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/systems-and-people-behaving-badly&amp;#34;&amp;gt;May 17, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/systems-and-people-behaving-badly&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/good-process-vs-bad-process&amp;#34;&amp;gt;Good Process vs. Bad Process&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/good-process-vs-bad-process&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/good-process-vs-bad-process&amp;#34;&amp;gt;May 16, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/good-process-vs-bad-process&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/show-dont-tell&amp;#34;&amp;gt;Show Don’t Tell&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/show-dont-tell&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/show-dont-tell&amp;#34;&amp;gt;May 15, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/show-dont-tell&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-does-your-company-approach-continuous-improvement&amp;#34;&amp;gt;How Does Your Company Approach Continuous Improvement?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-does-your-company-approach-continuous-improvement&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-does-your-company-approach-continuous-improvement&amp;#34;&amp;gt;May 12, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-does-your-company-approach-continuous-improvement&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-all-care-about-congruence-right&amp;#34;&amp;gt;We All Care About Congruence. Right?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-all-care-about-congruence-right&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-all-care-about-congruence-right&amp;#34;&amp;gt;May 10, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-all-care-about-congruence-right&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-outcomes-over-outputs&amp;#34;&amp;gt;Beyond “Outcomes Over Outputs”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-outcomes-over-outputs&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-outcomes-over-outputs&amp;#34;&amp;gt;May 08, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-outcomes-over-outputs&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-decisions-by-forecasting-cycle-time-as-a-team&amp;#34;&amp;gt;Better Decisions (By Forecasting Cycle Time as a Team)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-decisions-by-forecasting-cycle-time-as-a-team&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-decisions-by-forecasting-cycle-time-as-a-team&amp;#34;&amp;gt;May 05, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-decisions-by-forecasting-cycle-time-as-a-team&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/problem-vs-solution&amp;#34;&amp;gt;Problem vs. Solution&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/problem-vs-solution&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/problem-vs-solution&amp;#34;&amp;gt;April 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/problem-vs-solution&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-with-software-developers-9-tips-for-product-managers&amp;#34;&amp;gt;Working With Software Developers (9 Tips for Product Managers)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-with-software-developers-9-tips-for-product-managers&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-with-software-developers-9-tips-for-product-managers&amp;#34;&amp;gt;April 15, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-with-software-developers-9-tips-for-product-managers&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/cost-per-reasonable-decision-cprd&amp;#34;&amp;gt;Cost Per Reasonable Decision (CPRD)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/cost-per-reasonable-decision-cprd&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/cost-per-reasonable-decision-cprd&amp;#34;&amp;gt;April 01, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/cost-per-reasonable-decision-cprd&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/task-story-bigger-story-bets-foundational-beliefs-drawing&amp;#34;&amp;gt;Task, Story, Bigger Story, Bets, Foundational Beliefs (Drawing)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/task-story-bigger-story-bets-foundational-beliefs-drawing&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/task-story-bigger-story-bets-foundational-beliefs-drawing&amp;#34;&amp;gt;March 27, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/task-story-bigger-story-bets-foundational-beliefs-drawing&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/starting-without-a-solution&amp;#34;&amp;gt;Starting Without A Solution&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/starting-without-a-solution&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/starting-without-a-solution&amp;#34;&amp;gt;March 16, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/starting-without-a-solution&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/40-roadmap-item-questions&amp;#34;&amp;gt;40 Roadmap Item Questions&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/40-roadmap-item-questions&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/40-roadmap-item-questions&amp;#34;&amp;gt;March 02, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/40-roadmap-item-questions&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-that-prioritization-spreadsheet&amp;#34;&amp;gt;So That Prioritization Spreadsheet…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-that-prioritization-spreadsheet&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-that-prioritization-spreadsheet&amp;#34;&amp;gt;February 25, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-that-prioritization-spreadsheet&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/look-before-leaping&amp;#34;&amp;gt;Look Before Leaping&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/look-before-leaping&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/look-before-leaping&amp;#34;&amp;gt;February 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/look-before-leaping&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/yes-but&amp;#34;&amp;gt;Yes, But…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/yes-but&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/yes-but&amp;#34;&amp;gt;February 19, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/yes-but&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/wip-it-real-good&amp;#34;&amp;gt;WIP It Real Good&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/wip-it-real-good&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/wip-it-real-good&amp;#34;&amp;gt;February 14, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/wip-it-real-good&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/round-and-round&amp;#34;&amp;gt;Round and Round&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/round-and-round&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/round-and-round&amp;#34;&amp;gt;February 12, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/round-and-round&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/awesome-meh-awesome-but&amp;#34;&amp;gt;Awesome, Meh, Awesome But…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/awesome-meh-awesome-but&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/awesome-meh-awesome-but&amp;#34;&amp;gt;February 03, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/awesome-meh-awesome-but&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-together-finish-together&amp;#34;&amp;gt;Start Together. Finish Together&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-together-finish-together&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-together-finish-together&amp;#34;&amp;gt;January 31, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-together-finish-together&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-fewer-product-managers&amp;#34;&amp;gt;We Need Fewer Product Managers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-fewer-product-managers&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-fewer-product-managers&amp;#34;&amp;gt;January 29, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-fewer-product-managers&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/lets-run-an-experiment&amp;#34;&amp;gt;“Let’s Run an Experiment!”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/lets-run-an-experiment&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/lets-run-an-experiment&amp;#34;&amp;gt;January 28, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/lets-run-an-experiment&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-cant-do-that-in-one-sprint&amp;#34;&amp;gt;We Can’t Do That In One Sprint&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-cant-do-that-in-one-sprint&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-cant-do-that-in-one-sprint&amp;#34;&amp;gt;January 24, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-cant-do-that-in-one-sprint&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/my-idea-ism&amp;#34;&amp;gt;My-idea-ism&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/my-idea-ism&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/my-idea-ism&amp;#34;&amp;gt;January 23, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/my-idea-ism&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measurement-malpractice&amp;#34;&amp;gt;Measurement Malpractice&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measurement-malpractice&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measurement-malpractice&amp;#34;&amp;gt;January 22, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measurement-malpractice&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/give-and-take&amp;#34;&amp;gt;Give and Take&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/give-and-take&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/give-and-take&amp;#34;&amp;gt;January 21, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/give-and-take&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-done-right-is-continuous-design&amp;#34;&amp;gt;Agile (Done Right) Is Continuous Design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-done-right-is-continuous-design&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-done-right-is-continuous-design&amp;#34;&amp;gt;January 13, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-done-right-is-continuous-design&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/customer-facing-product-thinking-multi-product-and-other-shenanigans&amp;#34;&amp;gt;Customer-Facing, Product Thinking, “Multi-Product”, and Other Shenanigans&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/customer-facing-product-thinking-multi-product-and-other-shenanigans&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/customer-facing-product-thinking-multi-product-and-other-shenanigans&amp;#34;&amp;gt;January 11, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/customer-facing-product-thinking-multi-product-and-other-shenanigans&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/inventory-and-integration&amp;#34;&amp;gt;Inventory and Integration&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/inventory-and-integration&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/inventory-and-integration&amp;#34;&amp;gt;January 11, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/inventory-and-integration&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-hard-thing-about-not-so-hard-things&amp;#34;&amp;gt;The Hard Thing About (Not So) Hard Things&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-hard-thing-about-not-so-hard-things&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-hard-thing-about-not-so-hard-things&amp;#34;&amp;gt;January 10, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-hard-thing-about-not-so-hard-things&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/story-epilogues&amp;#34;&amp;gt;Story Epilogues&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/story-epilogues&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/story-epilogues&amp;#34;&amp;gt;January 06, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/story-epilogues&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-story-per-sprint&amp;#34;&amp;gt;One Story Per “Sprint”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-story-per-sprint&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-story-per-sprint&amp;#34;&amp;gt;January 05, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-story-per-sprint&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/of-course-psychological-safety-but-how&amp;#34;&amp;gt;Of Course Psychological Safety…But How?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/of-course-psychological-safety-but-how&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/of-course-psychological-safety-but-how&amp;#34;&amp;gt;January 04, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/of-course-psychological-safety-but-how&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-totally-cliche-career-advice&amp;#34;&amp;gt;Some Totally Cliche Career Advice…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-totally-cliche-career-advice&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-totally-cliche-career-advice&amp;#34;&amp;gt;January 03, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-totally-cliche-career-advice&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/our-intuition-says-instead-try&amp;#34;&amp;gt;Our Intuition Says… Instead, Try…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/our-intuition-says-instead-try&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/our-intuition-says-instead-try&amp;#34;&amp;gt;December 23, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/our-intuition-says-instead-try&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/flow-decoupling-cadences-and-fixed-length-sprints&amp;#34;&amp;gt;Flow, Decoupling Cadences, and Fixed-Length Sprints&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/flow-decoupling-cadences-and-fixed-length-sprints&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/flow-decoupling-cadences-and-fixed-length-sprints&amp;#34;&amp;gt;December 21, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/flow-decoupling-cadences-and-fixed-length-sprints&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/trying-something&amp;#34;&amp;gt;“Trying Something”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/trying-something&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/trying-something&amp;#34;&amp;gt;December 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/trying-something&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-is-the-best-thing-in-the-whole-wide-world&amp;#34;&amp;gt;Scrum is the Best Thing in the Whole Wide World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-is-the-best-thing-in-the-whole-wide-world&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-is-the-best-thing-in-the-whole-wide-world&amp;#34;&amp;gt;December 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-is-the-best-thing-in-the-whole-wide-world&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/100-wikipedia-articles-on-software-product-development-and-related-disciplines&amp;#34;&amp;gt;100 Wikipedia Articles on Software Product Development (and Related Disciplines)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/100-wikipedia-articles-on-software-product-development-and-related-disciplines&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/100-wikipedia-articles-on-software-product-development-and-related-disciplines&amp;#34;&amp;gt;December 17, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/100-wikipedia-articles-on-software-product-development-and-related-disciplines&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agiles-three-leaps-of-faith&amp;#34;&amp;gt;Agile’s Three Leaps of Faith&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agiles-three-leaps-of-faith&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agiles-three-leaps-of-faith&amp;#34;&amp;gt;December 16, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agiles-three-leaps-of-faith&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/fixed-length-sprints&amp;#34;&amp;gt;Fixed-Length Sprints&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/fixed-length-sprints&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/fixed-length-sprints&amp;#34;&amp;gt;December 12, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/fixed-length-sprints&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-playing-tetris-with-teams-sprints-projects-and-individuals&amp;#34;&amp;gt;Stop Playing Tetris (With Teams, Sprints, Projects, and Individuals)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-playing-tetris-with-teams-sprints-projects-and-individuals&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-playing-tetris-with-teams-sprints-projects-and-individuals&amp;#34;&amp;gt;December 10, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-playing-tetris-with-teams-sprints-projects-and-individuals&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-ways-the-c-suite-can-support-agility&amp;#34;&amp;gt;10 Ways the C-Suite Can Support Agility&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-ways-the-c-suite-can-support-agility&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-ways-the-c-suite-can-support-agility&amp;#34;&amp;gt;December 08, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-ways-the-c-suite-can-support-agility&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unlearning-and-relearning-agile&amp;#34;&amp;gt;Unlearning and Relearning Agile&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unlearning-and-relearning-agile&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unlearning-and-relearning-agile&amp;#34;&amp;gt;December 07, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unlearning-and-relearning-agile&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/18-things-your-okrs-shouldnt-do&amp;#34;&amp;gt;18 Things Your OKRs Shouldn’t Do…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/18-things-your-okrs-shouldnt-do&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/18-things-your-okrs-shouldnt-do&amp;#34;&amp;gt;December 06, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/18-things-your-okrs-shouldnt-do&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/responding-to-a-failed-sprint&amp;#34;&amp;gt;Responding to a “Failed” Sprint&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/responding-to-a-failed-sprint&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/responding-to-a-failed-sprint&amp;#34;&amp;gt;December 05, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/responding-to-a-failed-sprint&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-way-of-ways&amp;#34;&amp;gt;The Way of Ways&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-way-of-ways&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-way-of-ways&amp;#34;&amp;gt;December 04, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-way-of-ways&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/work-smaller-even-if-it-makes-no-sense&amp;#34;&amp;gt;Work Smaller (Even If It Makes No Sense)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/work-smaller-even-if-it-makes-no-sense&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/work-smaller-even-if-it-makes-no-sense&amp;#34;&amp;gt;December 04, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/work-smaller-even-if-it-makes-no-sense&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/sensor-responder-or-in-between&amp;#34;&amp;gt;Sensor? Responder? Or In Between?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/sensor-responder-or-in-between&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/sensor-responder-or-in-between&amp;#34;&amp;gt;December 03, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/sensor-responder-or-in-between&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-prerequisites-from-the-scrum-guide&amp;#34;&amp;gt;Scrum Prerequisites (From the Scrum Guide)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-prerequisites-from-the-scrum-guide&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-prerequisites-from-the-scrum-guide&amp;#34;&amp;gt;December 02, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-prerequisites-from-the-scrum-guide&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-obsessing-over-the-teams&amp;#34;&amp;gt;Stop Obsessing Over “The Teams”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-obsessing-over-the-teams&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-obsessing-over-the-teams&amp;#34;&amp;gt;November 29, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-obsessing-over-the-teams&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/product-nerding-with-annie-dunham&amp;#34;&amp;gt;Product Nerding with Annie Dunham&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/product-nerding-with-annie-dunham&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/product-nerding-with-annie-dunham&amp;#34;&amp;gt;November 28, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/product-nerding-with-annie-dunham&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/25-hints-youre-working-on-a-high-performing-team&amp;#34;&amp;gt;25 Hints You’re Working on a High Performing Team&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/25-hints-youre-working-on-a-high-performing-team&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/25-hints-youre-working-on-a-high-performing-team&amp;#34;&amp;gt;November 26, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/25-hints-youre-working-on-a-high-performing-team&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/respect-expertise-and-work-together-dont-institutionalize-handoffs&amp;#34;&amp;gt;Respect Expertise and Work Together — Don’t Institutionalize Handoffs&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/respect-expertise-and-work-together-dont-institutionalize-handoffs&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/respect-expertise-and-work-together-dont-institutionalize-handoffs&amp;#34;&amp;gt;November 26, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/respect-expertise-and-work-together-dont-institutionalize-handoffs&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-boards-are-a-design-challenge&amp;#34;&amp;gt;Kanban Boards are a Design Challenge&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-boards-are-a-design-challenge&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-boards-are-a-design-challenge&amp;#34;&amp;gt;November 25, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-boards-are-a-design-challenge&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beat-the-feature-factory-video&amp;#34;&amp;gt;Beat the Feature Factory (Video)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beat-the-feature-factory-video&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beat-the-feature-factory-video&amp;#34;&amp;gt;November 23, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beat-the-feature-factory-video&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/experiment-together-improve-together-win-together&amp;#34;&amp;gt;Experiment Together. Improve Together. Win Together&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/experiment-together-improve-together-win-together&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/experiment-together-improve-together-win-together&amp;#34;&amp;gt;November 23, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/experiment-together-improve-together-win-together&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/for-meaningful-change-look-beyond-front-line-teams&amp;#34;&amp;gt;For Meaningful Change…Look Beyond Front-Line Teams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/for-meaningful-change-look-beyond-front-line-teams&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/for-meaningful-change-look-beyond-front-line-teams&amp;#34;&amp;gt;November 23, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/for-meaningful-change-look-beyond-front-line-teams&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/interview-jared-spool-on-center-centre-real-projects-and-the-future-of-ux-education&amp;#34;&amp;gt;Interview: Jared Spool on Center Centre, Real Projects, and the Future of UX Education&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/interview-jared-spool-on-center-centre-real-projects-and-the-future-of-ux-education&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/interview-jared-spool-on-center-centre-real-projects-and-the-future-of-ux-education&amp;#34;&amp;gt;November 22, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/interview-jared-spool-on-center-centre-real-projects-and-the-future-of-ux-education&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-modern-agile-is-worth-checking-out&amp;#34;&amp;gt;Why Modern Agile is Worth Checking Out&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-modern-agile-is-worth-checking-out&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-modern-agile-is-worth-checking-out&amp;#34;&amp;gt;November 21, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-modern-agile-is-worth-checking-out&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/an-apple-a-day&amp;#34;&amp;gt;An Apple a Day&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/an-apple-a-day&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/an-apple-a-day&amp;#34;&amp;gt;November 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/an-apple-a-day&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/maker-angst-job-flippers-and-do-gooders&amp;#34;&amp;gt;Maker Angst — Job Flippers and Do Gooders&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/maker-angst-job-flippers-and-do-gooders&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/maker-angst-job-flippers-and-do-gooders&amp;#34;&amp;gt;November 18, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/maker-angst-job-flippers-and-do-gooders&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ask-alexa-to-better-understand-your-users&amp;#34;&amp;gt;Ask Alexa (To Better Understand Your Users)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ask-alexa-to-better-understand-your-users&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ask-alexa-to-better-understand-your-users&amp;#34;&amp;gt;November 17, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ask-alexa-to-better-understand-your-users&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/backlog-roadmap-hygiene-tips&amp;#34;&amp;gt;Backlog/Roadmap Hygiene Tips&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/backlog-roadmap-hygiene-tips&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/backlog-roadmap-hygiene-tips&amp;#34;&amp;gt;November 17, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/backlog-roadmap-hygiene-tips&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-trouble-with-scrum&amp;#34;&amp;gt;The Trouble With Scrum&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-trouble-with-scrum&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-trouble-with-scrum&amp;#34;&amp;gt;November 16, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-trouble-with-scrum&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/30-thoughts-on-change-org-health-and-change-agency&amp;#34;&amp;gt;30 Thoughts On Change, Org Health, and Change Agency&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/30-thoughts-on-change-org-health-and-change-agency&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/30-thoughts-on-change-org-health-and-change-agency&amp;#34;&amp;gt;November 14, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/30-thoughts-on-change-org-health-and-change-agency&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/let-teams-figure-it-out&amp;#34;&amp;gt;Let Teams Figure It Out&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/let-teams-figure-it-out&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/let-teams-figure-it-out&amp;#34;&amp;gt;November 11, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/let-teams-figure-it-out&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-product-system&amp;#34;&amp;gt;The Product “System”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-product-system&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-product-system&amp;#34;&amp;gt;November 09, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-product-system&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-battle-for-change&amp;#34;&amp;gt;The Battle For Change&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-battle-for-change&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-battle-for-change&amp;#34;&amp;gt;November 02, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-battle-for-change&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/question-given-this-scenario-what-does-the-product-manager-do&amp;#34;&amp;gt;Question: Given This Scenario, What Does The Product Manager Do?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/question-given-this-scenario-what-does-the-product-manager-do&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/question-given-this-scenario-what-does-the-product-manager-do&amp;#34;&amp;gt;October 30, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/question-given-this-scenario-what-does-the-product-manager-do&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-one-week-product-management-challenge&amp;#34;&amp;gt;The One Week Product Management Challenge&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-one-week-product-management-challenge&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-one-week-product-management-challenge&amp;#34;&amp;gt;October 30, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-one-week-product-management-challenge&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ways&amp;#34;&amp;gt;Ways&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ways&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ways&amp;#34;&amp;gt;October 29, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ways&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/faster-faster-faster&amp;#34;&amp;gt;Faster. Faster. Faster.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/faster-faster-faster&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/faster-faster-faster&amp;#34;&amp;gt;October 27, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/faster-faster-faster&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-work-is-never-done&amp;#34;&amp;gt;The Work Is Never Done&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-work-is-never-done&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-work-is-never-done&amp;#34;&amp;gt;October 21, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-work-is-never-done&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-backlog-aka-wishing-well&amp;#34;&amp;gt;The Backlog (aka Wishing Well)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-backlog-aka-wishing-well&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-backlog-aka-wishing-well&amp;#34;&amp;gt;October 20, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-backlog-aka-wishing-well&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/now-that-would-be-bad&amp;#34;&amp;gt;Now That Would Be Bad…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/now-that-would-be-bad&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/now-that-would-be-bad&amp;#34;&amp;gt;October 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/now-that-would-be-bad&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-psychological-safety-dance&amp;#34;&amp;gt;The (Psychological) Safety Dance&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-psychological-safety-dance&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-psychological-safety-dance&amp;#34;&amp;gt;October 18, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-psychological-safety-dance&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-isnt-agile-working&amp;#34;&amp;gt;Why Isn’t Agile Working?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-isnt-agile-working&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-isnt-agile-working&amp;#34;&amp;gt;October 05, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-isnt-agile-working&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-without-imploding&amp;#34;&amp;gt;Scaling Without Imploding&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-without-imploding&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-without-imploding&amp;#34;&amp;gt;October 03, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-without-imploding&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-features-and-projects-it-arena-2017-lviv-ukraine&amp;#34;&amp;gt;Beyond Features and Projects (IT Arena 2017— Lviv, Ukraine)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-features-and-projects-it-arena-2017-lviv-ukraine&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-features-and-projects-it-arena-2017-lviv-ukraine&amp;#34;&amp;gt;September 30, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-features-and-projects-it-arena-2017-lviv-ukraine&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-day-sprints&amp;#34;&amp;gt;One Day Sprints&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-day-sprints&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-day-sprints&amp;#34;&amp;gt;September 25, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-day-sprints&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/play-it-again-sam&amp;#34;&amp;gt;Play It Again Sam!&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/play-it-again-sam&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/play-it-again-sam&amp;#34;&amp;gt;September 25, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/play-it-again-sam&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/forcing-functions-and-continuous-improvement&amp;#34;&amp;gt;Forcing Functions and Continuous Improvement&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/forcing-functions-and-continuous-improvement&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/forcing-functions-and-continuous-improvement&amp;#34;&amp;gt;September 24, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/forcing-functions-and-continuous-improvement&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-cantban-and-risky-visualizations&amp;#34;&amp;gt;Kanban, Can’tban, and Risky Visualizations&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-cantban-and-risky-visualizations&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-cantban-and-risky-visualizations&amp;#34;&amp;gt;September 22, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-cantban-and-risky-visualizations&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/competition-fitness-change-and-front-line-angst&amp;#34;&amp;gt;Competition, Fitness, Change, and Front-Line Angst&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/competition-fitness-change-and-front-line-angst&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/competition-fitness-change-and-front-line-angst&amp;#34;&amp;gt;September 21, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/competition-fitness-change-and-front-line-angst&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-mature-teams&amp;#34;&amp;gt;“Less Mature” Teams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-mature-teams&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-mature-teams&amp;#34;&amp;gt;September 20, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-mature-teams&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-is-the-loneliest-number&amp;#34;&amp;gt;One Is the Loneliest Number…&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-is-the-loneliest-number&amp;#34;&amp;gt;(&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-is-the-loneliest-number&amp;#34;&amp;gt;September 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-is-the-loneliest-number&amp;#34;&amp;gt;)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-product-manager-four-teams&amp;#34;&amp;gt;One Product Manager, Four Teams?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-product-manager-four-teams&amp;#34;&amp;gt;( …&amp;lt;/a&amp;gt;</description>
    </item>
    
    <item>
      <title>Deprocrastination Blog - Guides and digital tools on how to stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220520-154057/</link>
      <pubDate>Fri, 20 May 2022 15:40:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220520-154057/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/create-a-visual-tracker-to-become-motivated&amp;#34;&amp;gt;Create a visual tracker to become motivated&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-boost-your-attention-span&amp;#34;&amp;gt;How to boost your attention span: 6 tips and tricks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-not-to-get-overwhelmed-by-tasks&amp;#34;&amp;gt;How not to get overwhelmed by tasks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-increase-your-attention-span-5-key-strategies&amp;#34;&amp;gt;How to increase your attention span: 5 key strategies&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/learn-to-tolerate-discomfort-or-suffer-escaping-from-it&amp;#34;&amp;gt;Learn to tolerate discomfort or suffer escaping from it&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;amp;#39;t scrolling or watching&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Slate Star Codex</title>
      <link>https://www.whatsupup.com/blog/kyat/underwrite/20220520-153850/</link>
      <pubDate>Fri, 20 May 2022 15:38:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kyat/underwrite/20220520-153850/</guid>
      <description>A few books and papers take a completely different tack and argue that buspirone just does the same thing SSRIs do – desensitize the presynaptic autoreceptors until the cells ignore them – and then has its antianxiety action through stimulating postsynaptic receptors. But if it’s doing the same thing as SSRIs, how come it has the opposite effect on sex drive? And how come there are some studies suggesting that it’s helpful to add buspirone onto SSRIs? Why isn’t that just doubling up on the same thing?&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/page/2/&amp;#34;&amp;gt;←&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/page/2/&amp;#34;&amp;gt;Older posts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20220520-153724/</link>
      <pubDate>Fri, 20 May 2022 15:37:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20220520-153724/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2018/09/06/cheezball-rising-resounding-failure/&amp;#34;&amp;gt;failure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2018/09/06/cheezball-rising-resounding-failure/&amp;#34;&amp;gt;success?&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220520-153406/</link>
      <pubDate>Fri, 20 May 2022 15:34:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220520-153406/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;Out There&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;The Milky Way’s Black Hole Comes to Light&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;The Event Horizon Telescope has once again caught sight of the “unseeable.”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/07/science/space/astronomy-black-hole-sound.html&amp;#34;&amp;gt;Hear the Weird Sounds of a Black Hole Singing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/07/science/space/astronomy-black-hole-sound.html&amp;#34;&amp;gt;As part of an effort to “sonify” the cosmos, researchers have converted the pressure waves from a black hole into an audible … something.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/science/scheinert-kwan-film-multiverse.html&amp;#34;&amp;gt;Tripping Through the Universes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/science/scheinert-kwan-film-multiverse.html&amp;#34;&amp;gt;A new cosmic kung fu film explores the meaning of existence in alternate realities.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/07/science/astronomers-distant-galaxy.html&amp;#34;&amp;gt;Astronomers Find What Might Be the Most Distant Galaxy Yet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/07/science/astronomers-distant-galaxy.html&amp;#34;&amp;gt;Is the object a galaxy of primordial stars or a black hole knocking on the door of time? The Webb space telescope may help answer that question.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/science/physics-cern-russia.html&amp;#34;&amp;gt;Russian Scientists Face Isolation Following Invasion of Ukraine&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/science/physics-cern-russia.html&amp;#34;&amp;gt;International collaborations are unraveling as researchers, including many in Russia, speak out against the invasion of Ukraine.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/11/science/webb-telescope-selfie-pictures.html&amp;#34;&amp;gt;James Webb Telescope Sends Home a Selfie and 18 Images of Starlight&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/11/science/webb-telescope-selfie-pictures.html&amp;#34;&amp;gt;The spacecraft recorded a series of images of a target star that will be used to help its mirrors prepare for scientific research.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/31/science/milky-way.html&amp;#34;&amp;gt;An Electrifying View of the Heart of the Milky Way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/31/science/milky-way.html&amp;#34;&amp;gt;A new radio-wave image of the center of our galaxy reveals all the forms of frenzy that a hundred million or so stars can get up to.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/27/science/james-webb-space-telescope.html&amp;#34;&amp;gt;The James Webb Space Telescope and a Quest Every Human Shares&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/27/science/james-webb-space-telescope.html&amp;#34;&amp;gt;Building, launching and deploying the giant observatory required the best of what our species has to offer the cosmos.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/science/milky-way-local-bubble-stars.html&amp;#34;&amp;gt;A New Map of the Sun’s Local Bubble&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/science/milky-way-local-bubble-stars.html&amp;#34;&amp;gt;At the edge of a vast region devoid of gas and dust, scientists find an explanation for “how all nearby star formation began.”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;A Giant Telescope Grows in Space&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;Everything is going great for the James Webb Space Telescope. So far.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;Dennis Overbye&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;Joey Roulette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/overbye&amp;#34;&amp;gt;overbye&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/overbye&amp;#34;&amp;gt;twitter&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/overbye&amp;#34;&amp;gt;page for&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/overbye&amp;#34;&amp;gt;overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220520-153216/</link>
      <pubDate>Fri, 20 May 2022 15:32:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220520-153216/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;std::swap&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;two-step?”&amp;lt;/a&amp;gt; (2020-07-11)
and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2022/04/14/another-reason-for-the-poison-pill/&amp;#34;&amp;gt;“PSA: ADL requires that unqualified lookup has found a function”&amp;lt;/a&amp;gt; (2022-04-14),
as my mental model continues to evolve. (Mainly due to pressure from Jody Hagins. :))&amp;lt;br&amp;gt;
As seen on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;cpplang Slack&amp;lt;/a&amp;gt; (hat tip to Jody Hagins).
Recall my post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;two-step?”&amp;lt;/a&amp;gt; (2020-07-11), where I said:&amp;lt;br&amp;gt;
; see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;“On&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;function_ref&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;string_view&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;”&amp;lt;/a&amp;gt; (2019-05-10).
The simplest example is&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220520-153215/</link>
      <pubDate>Fri, 20 May 2022 15:32:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220520-153215/</guid>
      <description>“Within days, the company edited the numerous blog posts and white papers on its website that previously stated the company did not use one-to-many to reflect the truth,” the letter alleges. “According to media reports, the company’s decision to correct its prior misleading statements came after mounting internal pressure from its employees.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/senators-urge-ftc-to-probe-id-me-over-selfie-data/#more-59891&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/senators-urge-ftc-to-probe-id-me-over-selfie-data/#more-59891&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“Actually, it’s not carrying any virus as you can trust us, if you have our reader on hand, please just ignore it and continue the installation steps,” the message continued. “When driver installed, this message will vanish out of sight. Don’t worry.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/when-your-smart-id-card-reader-comes-with-malware/#more-59840&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/when-your-smart-id-card-reader-comes-with-malware/#more-59840&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/dea-investigating-breach-of-law-enforcement-data-portal/#more-59758&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/dea-investigating-breach-of-law-enforcement-data-portal/#more-59758&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“CVE-2021-36942 was so bad it made CISA’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&amp;#34;&amp;gt;catalog of Known Exploited Vulnerabilities&amp;lt;/a&amp;gt; ,” Wiseman said. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/microsoft-patch-tuesday-may-2022-edition/#more-59789&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/microsoft-patch-tuesday-may-2022-edition/#more-59789&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“I worry about people who can’t afford an extra device, or can’t easily replace a broken or stolen device,” Bellovin said. “I worry about forgotten password recovery for cloud accounts.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/your-phone-may-soon-replace-many-of-your-passwords/#more-59727&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/your-phone-may-soon-replace-many-of-your-passwords/#more-59727&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
According to Russian media site Lenta.ru, since March 21 nearly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lenta.ru/news/2022/04/04/vaccc/&amp;#34;&amp;gt;95,000 vacancies in IT have remained unfilled in Russia&amp;lt;/a&amp;gt; . Lenta says the number unfilled job slots actually shrank 25 percent from the previous month, officially because “many Russian companies are currently reviewing their plans and budgets, and some projects have been postponed.” The story fails to even mention the recent economic sanctions that are currently affecting many Russian companies thanks to Russia’s invasion of Ukraine in late February. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/russia-to-rent-tech-savvy-prisoners-to-corporate-it/#more-59685&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/russia-to-rent-tech-savvy-prisoners-to-corporate-it/#more-59685&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
BriansClub has long abused my name and likeness to pimp its wares on the hacking forums. Its homepage includes a copy of my credit report, Social Security card, phone bill, and a fake but otherwise official looking government ID card. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/you-can-now-ask-google-to-remove-your-phone-number-email-or-address-from-search-results/#more-59639&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/you-can-now-ask-google-to-remove-your-phone-number-email-or-address-from-search-results/#more-59639&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Fake EDRs have become such a reliable method in the cybercrime underground for obtaining information about account holders that several cybercriminals have started offering services that will submit these fraudulent EDRs on behalf of paying clients to a number of top social media and technology firms. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/#more-59232&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/#more-59232&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
On March 19, 2022, the logs and accompanying screenshots show LAPSUS$ had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/hasatlas1.png&amp;#34;&amp;gt;gained access to&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/hasatlas1.png&amp;#34;&amp;gt;Atlas&amp;lt;/a&amp;gt; , a powerful internal T-Mobile tool for managing customer accounts.&amp;lt;br&amp;gt;
Perhaps to mollify his furious teammates, White changed the subject and told them he’d gained access to T-Mobile’s Slack and Bitbucket accounts. He said he’d figured out how to upload files to the virtual machine he had access to at T-Mobile. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/#more-59472&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/#more-59472&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“Hospitals reported revenue losses due to Ryuk infections of nearly $100 million from data I obtained through interviews with hospital staff, public statements, and media articles,” Weiss wrote. “The Ryuk attacks also caused an estimated $500 million in costs to respond to the attacks – costs that include ransomware payments, digital forensic services, security improvements and upgrading impacted systems plus other expenses.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/#more-59446&amp;#34;&amp;gt;Continue reading&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/#more-59446&amp;#34;&amp;gt;→&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220520-153140/</link>
      <pubDate>Fri, 20 May 2022 15:31:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220520-153140/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.patreon.com/ciechanowski&amp;#34;&amp;gt;Patreon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/bciechanowski&amp;#34;&amp;gt;Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.instagram.com/bartoszciechanowski/&amp;#34;&amp;gt;Instagram&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:bartosz@ciechanow.ski&amp;#34;&amp;gt;e-mail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/atom.xml&amp;#34;&amp;gt;rss&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Let’s look at the entirety of what we’ve built so far one last time. I’m now running the mechanism at its normal speed:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20220520-152837/</link>
      <pubDate>Fri, 20 May 2022 15:28:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20220520-152837/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;How I accidentally built a Podcast API business&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;Dec. 20, 2021&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;· In this article, I’ll share with you the journey of building this API business, the technology behind it, and hopefully you can learn one thing or two and build your own API business in the future.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-evaluate-a-3rd-party-restful-api-47/&amp;#34;&amp;gt;How to evaluate a 3rd party RESTful API?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-evaluate-a-3rd-party-restful-api-47/&amp;#34;&amp;gt;Nov. 26, 2021&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-evaluate-a-3rd-party-restful-api-47/&amp;#34;&amp;gt;· 1, To build or to buy? 2, Can this API provide features you need? 3, Is this API both stable and scalable? 4, How easily can you talk to a real human employee of the API vendor?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;Why Podcasts Are My New Wikipedia —the  Perfect Informal Learning Resource&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;Sept. 9, 2021&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;· In this article, I explain why podcasts replaced a lot of my Wikipedia usage for informal learning. I also talk about how I listen to five-plus hours of podcasts every day!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/what-is-listen-notes-why-does-listen-notes-need-45/&amp;#34;&amp;gt;What is Listen Notes? Why does Listen Notes need to make money?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/what-is-listen-notes-why-does-listen-notes-need-45/&amp;#34;&amp;gt;Oct. 2, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/what-is-listen-notes-why-does-listen-notes-need-45/&amp;#34;&amp;gt;· Essentially, Listen Notes is an independent podcast database that has three UIs (User Interface) to access the data.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/numbers-of-tech-companies-when-they-were-small-42/&amp;#34;&amp;gt;Numbers of tech companies when they were small&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/numbers-of-tech-companies-when-they-were-small-42/&amp;#34;&amp;gt;May 8, 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/numbers-of-tech-companies-when-they-were-small-42/&amp;#34;&amp;gt;· This is a blog post that I wish it existed when I started my startup journey. I like collecting numbers (e.g., website traffic, domain name price, revenue…) of tech companies when they were small.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-for-chrome-28/&amp;#34;&amp;gt;Dec. 1, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-for-chrome-28/&amp;#34;&amp;gt;· We just launched a Chrome extension! You can search podcasts / episodes right from your Chrome browser without opening ListenNotes.com.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/introducing-llamacorn-33/&amp;#34;&amp;gt;Introducing Llamacorn!!!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/introducing-llamacorn-33/&amp;#34;&amp;gt;Sept. 21, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/introducing-llamacorn-33/&amp;#34;&amp;gt;· I went to Peru last month and saw Llama… After I came back, I decided to make Llama the mascot of Listen Notes.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/some-api-improvements-34/&amp;#34;&amp;gt;Some API improvements&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/some-api-improvements-34/&amp;#34;&amp;gt;May 20, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/some-api-improvements-34/&amp;#34;&amp;gt;· Better documentation. Better performance. Bigger thumbnail images.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-submit-a-new-podcast-to-listen-notes-38/&amp;#34;&amp;gt;How to submit a new podcast to Listen Notes database&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-submit-a-new-podcast-to-listen-notes-38/&amp;#34;&amp;gt;April 9, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-submit-a-new-podcast-to-listen-notes-38/&amp;#34;&amp;gt;· If you are a podcaster or you are a podcast hosting service, you may want to submit new podcasts to Listen Notes database.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-api-v2-simple-pricing-same-endpoints-39/&amp;#34;&amp;gt;Listen API v2: simple pricing &amp;amp;amp; same endpoints&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-api-v2-simple-pricing-same-endpoints-39/&amp;#34;&amp;gt;March 27, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-api-v2-simple-pricing-same-endpoints-39/&amp;#34;&amp;gt;· We just launched a new(-ish) version of Listen API. We call it “Listen API v2”.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/good-enough-engineering-to-start-an-internet-27/&amp;#34;&amp;gt;Good enough engineering to start an Internet company&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/good-enough-engineering-to-start-an-internet-27/&amp;#34;&amp;gt;March 11, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/good-enough-engineering-to-start-an-internet-27/&amp;#34;&amp;gt;· I gave a guest lecture in an undergraduate software engineering class (CSCE431) at Texas A&amp;amp;amp;M University a few days ago. Now I’ve turned this lecture into a blog post here, and hopefully some people on the Internet will find this useful.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-explorer-get-similar-podcasts-40/&amp;#34;&amp;gt;Listen Explorer: Get similar podcasts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-explorer-get-similar-podcasts-40/&amp;#34;&amp;gt;Jan. 22, 2019&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-explorer-get-similar-podcasts-40/&amp;#34;&amp;gt;· The idea is simple: You pick a few podcasts, and you’ll get recommendations for similar podcasts.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-real-time-like-google-analytics-real-time-37/&amp;#34;&amp;gt;Listen Real-Time: Like Google Analytics Real-Time, but for podcast episodes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-real-time-like-google-analytics-real-time-37/&amp;#34;&amp;gt;Dec. 30, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-real-time-like-google-analytics-real-time-37/&amp;#34;&amp;gt;· Everyone’s saying “podcast discovery is broken”. Okay, here’s another way to discover podcasts — Check out what other people are listening to right now.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/just-listentm-a-simple-podcast-app-for-the-99-36/&amp;#34;&amp;gt;Just Listen™: A simple podcast app for the 99%&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/just-listentm-a-simple-podcast-app-for-the-99-36/&amp;#34;&amp;gt;Dec. 20, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/just-listentm-a-simple-podcast-app-for-the-99-36/&amp;#34;&amp;gt;· A very simple &amp;amp;amp; very opinionated podcast app from Listen Notes: Just Listen™!!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-import-opml-to-a-podcast-app-on-ios-android-35/&amp;#34;&amp;gt;How to import OPML to a podcast app on iOS / Android?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-import-opml-to-a-podcast-app-on-ios-android-35/&amp;#34;&amp;gt;Sept. 14, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-import-opml-to-a-podcast-app-on-ios-android-35/&amp;#34;&amp;gt;· An OPML file allows you to transfer your podcast subscriptions between podcast apps without manually subscribing to each podcast.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-a-standalone-podcast-search-engine-website-32/&amp;#34;&amp;gt;Why a standalone podcast search engine website?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-a-standalone-podcast-search-engine-website-32/&amp;#34;&amp;gt;June 29, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-a-standalone-podcast-search-engine-website-32/&amp;#34;&amp;gt;· Why Listen Notes is a podcast search engine website? Not an app? Not a podcast player?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-listen-notes-doesnt-allow-users-to-review-31/&amp;#34;&amp;gt;Why Listen Notes doesn’t allow users to review podcasts?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-listen-notes-doesnt-allow-users-to-review-31/&amp;#34;&amp;gt;May 14, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-listen-notes-doesnt-allow-users-to-review-31/&amp;#34;&amp;gt;· There are ideas that sound wonderful, on paper. Allowing users to review podcasts is such an idea.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/postmortem-on-apr-22-2018-outage-30/&amp;#34;&amp;gt;Postmortem on Apr 22, 2018 outage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/postmortem-on-apr-22-2018-outage-30/&amp;#34;&amp;gt;April 26, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/postmortem-on-apr-22-2018-outage-30/&amp;#34;&amp;gt;· On Apr 22, 2018, Listen Notes website was down for ~4 hours and I lost 10 hours production data. This is the biggest outage since I launched Listen Notes as a side project last year.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/the-boring-technology-behind-a-one-person-23/&amp;#34;&amp;gt;The boring technology behind a one-person Internet company&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/the-boring-technology-behind-a-one-person-23/&amp;#34;&amp;gt;Jan. 24, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/the-boring-technology-behind-a-one-person-23/&amp;#34;&amp;gt;· The tech stack of Listen Notes, the best podcast search engine and database.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/my-y-combinator-interview-experience-w18-22/&amp;#34;&amp;gt;My Y Combinator interview experience (W18)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/my-y-combinator-interview-experience-w18-22/&amp;#34;&amp;gt;Jan. 12, 2018&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/my-y-combinator-interview-experience-w18-22/&amp;#34;&amp;gt;· I want to be transparent on the process of building Listen Notes, as a product and as a company. If eventually I declare failure of this startup thing, these written documents may still benefit people who come from Google search :)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-later-tm-is-like-instapaper-or-pocket-but-29/&amp;#34;&amp;gt;Listen Later ™ is like Instapaper or Pocket, but for podcasts!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-later-tm-is-like-instapaper-or-pocket-but-29/&amp;#34;&amp;gt;Dec. 19, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-later-tm-is-like-instapaper-or-pocket-but-29/&amp;#34;&amp;gt;· I just built a simple feature, called Listen Later. You can tell what it is from the name :) Yes, it’s like “Watch Later” on YouTube or “Read Later” on Pocket.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-do-people-use-listen-notes-26/&amp;#34;&amp;gt;How do people use Listen Notes?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-do-people-use-listen-notes-26/&amp;#34;&amp;gt;Nov. 12, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-do-people-use-listen-notes-26/&amp;#34;&amp;gt;· I’ve got a bunch of emails from Listen Notes users. Now I have a better understanding what people use Listen Notes for.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/migrating-listen-notes-servers-to-aws-25/&amp;#34;&amp;gt;Migrating Listen Notes servers to AWS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/migrating-listen-notes-servers-to-aws-25/&amp;#34;&amp;gt;Oct. 28, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/migrating-listen-notes-servers-to-aws-25/&amp;#34;&amp;gt;· Well, Listen Notes was a side project of mine. I run all my side projects on Digital Ocean, because it’s cheap &amp;amp;amp; convenient to set up. I decided to migrate the whole backend infrastructure to AWS.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/podcast-in-2017-is-just-like-web-in-1997-24/&amp;#34;&amp;gt;Podcast in 2017 is just like Web in 1997&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/podcast-in-2017-is-just-like-web-in-1997-24/&amp;#34;&amp;gt;Oct. 9, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/podcast-in-2017-is-just-like-web-in-1997-24/&amp;#34;&amp;gt;· Podcast in 2017 &amp;amp;amp; web in 1997 are similar in three aspects: number of users, ad spendings, and contents.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-use-listen-notes-from-chrome-address-bar-21/&amp;#34;&amp;gt;How to use Listen Notes from Chrome address bar?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-use-listen-notes-from-chrome-address-bar-21/&amp;#34;&amp;gt;Oct. 3, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-use-listen-notes-from-chrome-address-bar-21/&amp;#34;&amp;gt;· Click “Add” in the “Other search engines” section. Fill these three things.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-20-laying-the-foundation-of-future-20/&amp;#34;&amp;gt;Listen Notes 2.0: laying the foundation of future fast iteration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-20-laying-the-foundation-of-future-20/&amp;#34;&amp;gt;Sept. 27, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-20-laying-the-foundation-of-future-20/&amp;#34;&amp;gt;· Last week was the first time that I got a chance to work on my projects full-time. It was a very productive week. So, here comes Listen Notes 2.0.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/whats-next-for-listen-notes-19/&amp;#34;&amp;gt;What’s next for Listen Notes?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/whats-next-for-listen-notes-19/&amp;#34;&amp;gt;Sept. 20, 2017&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/whats-next-for-listen-notes-19/&amp;#34;&amp;gt;· The very first official Listen Notes blog post! We used to have a mini-roadmap :)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220520-152822/</link>
      <pubDate>Fri, 20 May 2022 15:28:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220520-152822/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;Even Among Corporate Raiders, Elon Musk Is a Pirate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;The world of deal making has always been rough and tumble. But Mr. Musk blows any predecessors away.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/20/business/elon-musk-twitter-takeover.html&amp;#34;&amp;gt;Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/19/technology/whatsapp-meta-commercial-services.html&amp;#34;&amp;gt;WhatsApp introduces commercial services as Meta, its parent, seeks fresh revenue.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/19/technology/whatsapp-meta-commercial-services.html&amp;#34;&amp;gt;For a fee, the app will allow businesses to build a custom dashboard so they can chat with customers and offer customer services more easily.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/19/technology/whatsapp-meta-commercial-services.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/19/technology/whatsapp-meta-commercial-services.html&amp;#34;&amp;gt;Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Elon Musk says Twitter deal ‘cannot move forward’ without more information.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Mr. Musk called on Twitter to provide more data about the number of spam and fake accounts on the social media site.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Lauren Hirsch, Kate Conger&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/16/technology/elon-musk-twitter-price.html&amp;#34;&amp;gt;Elon Musk says a lower price for Twitter is ‘not out of the question.’&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/16/technology/elon-musk-twitter-price.html&amp;#34;&amp;gt;Mr. Musk has been creating confusion around whether the Twitter deal will close, causing the social media company’s share price to fall.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/technology/twitter-elon-musk.html&amp;#34;&amp;gt;Twitter fires two executives and freezes most hiring after Musk’s deal to buy the company.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/technology/twitter-elon-musk.html&amp;#34;&amp;gt;An internal memo shared with employees said the platform’s general manager and general manager for revenue would be departing.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/10/technology/elon-musk-donald-trump-twitter-ban.html&amp;#34;&amp;gt;Elon Musk says he would ‘reverse the permanent ban’ of Donald Trump on Twitter.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/10/technology/elon-musk-donald-trump-twitter-ban.html&amp;#34;&amp;gt;Mr. Musk has said he wants Twitter to be a forum for debate, and he called the barring of Mr. Trump “morally wrong.” The former president has said he would not rejoin the platform.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;Inside Elon Musk’s Big Plans for Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;Here’s what Mr. Musk is projecting for Twitter’s finances over the next few years, according to a pitch deck he presented to investors.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;Mike Isaac, Lauren Hirsch&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;Anupreeta Das&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;Elon Musk has brought in new investors to fund his Twitter deal, a filing shows.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;The filing lists a number of investment firms and other backers who will contribute $7 billion to the deal.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;Lauren Hirsch, Anupreeta Das, Erin Griffith&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;How Twitter’s Board Went From Fighting Elon Musk to Accepting Him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;It’s highly unusual to move from a “poison pill” to a $44 billion deal in under two weeks. But Twitter’s board ran out of options.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;Lauren Hirsch&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;Twitter reports growth in revenue and users as Elon Musk prepares to take over.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;The social media company reported a 16 percent jump in daily active users from a year ago.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;By&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;Mike Isaac&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;and&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MikeIsaac&amp;#34;&amp;gt;MikeIsaac&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MikeIsaac&amp;#34;&amp;gt;twitter&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MikeIsaac&amp;#34;&amp;gt;page for&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MikeIsaac&amp;#34;&amp;gt;MikeIsaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/mikejisaac&amp;#34;&amp;gt;mikejisaac&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/mikejisaac&amp;#34;&amp;gt;facebook&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/mikejisaac&amp;#34;&amp;gt;page for&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/mikejisaac&amp;#34;&amp;gt;mikejisaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220520-040154/</link>
      <pubDate>Fri, 20 May 2022 04:01:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220520-040154/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitters-frankenstein-moment&amp;#34;&amp;gt;Twitter’s Frankenstein Moment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitters-frankenstein-moment&amp;#34;&amp;gt;Twitter finally proved its cultural influence was more valuable than the market thought. But perhaps not as planned.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220519-172908/</link>
      <pubDate>Thu, 19 May 2022 17:29:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220519-172908/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/19/technology/whatsapp-commercial-services-revenue.html&amp;#34;&amp;gt;WhatsApp introduces commercial services as Meta, its parent, seeks fresh revenue. For a fee, the app will allow businesses to build a custom dashboard so they can chat with customers and offer customer services more easily. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220519-042016/</link>
      <pubDate>Thu, 19 May 2022 04:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220519-042016/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Readability_TOCHI22.pdf&amp;#34;&amp;gt;Towards Individuated Reading Experiences: Different Fonts Increase Reading Speed for Different Individuals&amp;lt;/a&amp;gt; Shaun Wallace, Zoya Bylinskii, Jonathan Dobres, Bernard Kerr, Sam Berlow, Rick Treitman, Nirmal Kumawat, Kathleen Arpin, Dave B. Miller, Jeff Huang, Ben D. Sawyer TOCHI (Transactions on Computer-Human Interaction), 29(4), 2022&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220519-005943/</link>
      <pubDate>Thu, 19 May 2022 00:59:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220519-005943/</guid>
      <description>Some of more tech-savvy Democrats in the U.S. Senate are asking the Federal Trade Commission (FTC) to investigate identity-proofing company ID.me for “deceptive statements” the company and its founder allegedly made over how they handle facial recognition data collected on behalf of the Internal Revenue Service , which until recently required anyone seeking a new IRS account online to provide a live video selfie to ID.me.&amp;lt;br&amp;gt;
In a letter to FTC Chair Lina Khan , the Senators charge that ID.me’s CEO Blake Hall has offered conflicting statements about how his company uses the facial scan data it collects on behalf of the federal government and many states that use the ID proofing technology to screen applicants for unemployment insurance.&amp;lt;br&amp;gt;
The lawmakers say that in public statements and blog posts, ID.me has frequently emphasized the difference between two types of facial recognition: One-to-one, and one-to-many. In the one-to-one approach, a live video selfie is compared to the image on a driver’s license, for example. One-to-many facial recognition involves comparing a face against a database of other faces to find any potential matches.&amp;lt;br&amp;gt;
Americans have particular reason to be concerned about the difference between these two types of facial recognition, says the letter to the FTC, signed by Sens. Cory Booker (D-N.J.), Edward Markey (D-Mass.), Alex Padilla (D-Calif.), and Ron Wyden (D-Ore.):&amp;lt;br&amp;gt;
“While one-to-one recognition involves a one-time comparison of two images in order to confirm an applicant’s identity, the use of one-to-many recognition means that millions of innocent people will have their photographs endlessly queried as part of a digital ‘line up.’ Not only does this violate individuals’ privacy, but the inevitable false matches associated with one-to-many recognition can result in applicants being wrongly denied desperately-needed services for weeks or even months as they try to get their case reviewed.”&amp;lt;br&amp;gt;
“This risk is especially acute for people of color: NIST’s Facial Recognition Vendor Test found that many facial recognition algorithms have rates of false matches that are as much as 100 times higher for individuals from countries in West Africa, East Africa and East Asia than for individuals from Eastern European countries. This means Black and Asian Americans could be disproportionately likely to be denied benefits due to a false match in a one-to-many facial recognition system.”&amp;lt;br&amp;gt;
The lawmakers say that throughout the latter half of 2021, ID.me published statements and blog posts stating it did not use one-to-many facial recognition and that the approach was “problematic” and “tied to surveillance operations.” But several days after &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/irs-will-soon-require-selfies-for-online-access/&amp;#34;&amp;gt;a Jan. 16, 2022 post here about the IRS’s new facial ID requirement&amp;lt;/a&amp;gt; went viral and prompted a public backlash, Hall &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/feed/update/urn:li:activity:6892131524746326016/&amp;#34;&amp;gt;acknowledged in a LinkedIn posting&amp;lt;/a&amp;gt; that ID.me does use one-to-many facial recognition.&amp;lt;br&amp;gt;
“Within days, the company edited the numerous blog posts and white papers on its website that previously stated the company did not use one-to-many to reflect the truth,” the letter alleges. “According to media reports, the company’s decision to correct its prior misleading statements came after mounting internal pressure from its employees.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/senators-urge-ftc-to-probe-id-me-over-selfie-data/#more-59891&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/senators-urge-ftc-to-probe-id-me-over-selfie-data/&amp;#34;&amp;gt;Senators Urge FTC to Probe ID.me Over Selfie Data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20220519-001755/</link>
      <pubDate>Thu, 19 May 2022 00:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20220519-001755/</guid>
      <description>Update : Someone on Twitter (Thomas Duboucher, perhaps? Sorry, I lost the tweet!) pointed out that the 1- and 3-step ordering give the same results in many cases. Having thought about it, that&amp;#39;s correct! As long as you don&amp;#39;t use maps, arrays, or tagged values as map keys, I believe they coincide. For something like CTAP2, where map keys are always ints or strings, they work out the same. So perhaps things aren&amp;#39;t so bad. (Or perhaps a really subtle difference is worse! Time will tell.)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220518-204946/</link>
      <pubDate>Wed, 18 May 2022 20:49:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220518-204946/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-ai-hammer-search-nail&amp;#34;&amp;gt;Podcast Episode - An AI Hammer in Search of a Nail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220518-204539/</link>
      <pubDate>Wed, 18 May 2022 20:45:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220518-204539/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-ai-hammer-search-nail&amp;#34;&amp;gt;Podcast Episode - An AI Hammer in Search of a Nail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220518-164916/</link>
      <pubDate>Wed, 18 May 2022 16:49:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220518-164916/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Elon Musk says Twitter deal ‘cannot move forward’ without more information. Mr. Musk called on Twitter to provide more data about the number of spam and fake accounts on the social media site. By Lauren Hirsch, Kate Conger and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220518-164741/</link>
      <pubDate>Wed, 18 May 2022 16:47:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220518-164741/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sites.google.com/brown.edu/brandonwoodard/&amp;#34;&amp;gt;Brandon Woodard&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220518-162214/</link>
      <pubDate>Wed, 18 May 2022 16:22:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220518-162214/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/05/privileged-pod-escalations-in.html&amp;#34;&amp;gt;Privileged pod escalations in Kubernetes and GKE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by GKE and Anthos Platform Security Teams&amp;lt;br&amp;gt;
At the KubeCon EU 2022 conference in Valencia, security researchers from Palo Alto Networks presented research findings on “trampoline pods”—pods with an elevated set of privileges required to do their job, but that could conceivably be used as a jumping off point to gain escalated privileges. The research mentions GKE, including how developers should look at the privileged pod problem today, what the GKE team is doing to minimize the use of privileged pods, and actions GKE users can take to protect their clusters.&amp;lt;br&amp;gt;
Privileged pods within the context of GKE security While privileged pods can pose a security issue, it’s important to look at them within the overall context of GKE security. To use a privileged pod as a “trampoline” in GKE, there is a major prerequisite – the attacker has to first execute a successful application compromise and container breakout attack. Because the use of privileged pods in an attack requires a first step such as a container breakout to be effective, let’s look at two areas:&amp;lt;br&amp;gt;
features of GKE you can use to reduce the likelihood of a container breakout&amp;lt;br&amp;gt;
steps the GKE team is taking to minimize the use of privileged pods and the privileges needed in them.&amp;lt;br&amp;gt;
Reducing container breakouts There are a number of features in GKE along with some best practices that you can use to reduce the likelihood of a container breakout:&amp;lt;br&amp;gt;
Use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/sandbox-pods&amp;#34;&amp;gt;GKE Sandbox&amp;lt;/a&amp;gt; to strengthen the container security boundary. Over the last few months, GKE Sandbox has protected containers running it against several newly discovered &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins&amp;#34;&amp;gt;Linux kernel breakout CVEs&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Adopt &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/autopilot-overview&amp;#34;&amp;gt;GKE Autopilot&amp;lt;/a&amp;gt; for new clusters. Autopilot clusters have default policies that prevent host access through mechanisms like host path volumes and host network. The container runtime default seccomp profile is also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/autopilot-overview#security-limitations&amp;#34;&amp;gt;enabled by default on Autopilot&amp;lt;/a&amp;gt; which has prevented &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-006&amp;#34;&amp;gt;several&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2022-002&amp;#34;&amp;gt;breakouts&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Subscribe to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/release-channels&amp;#34;&amp;gt;GKE Release Channels&amp;lt;/a&amp;gt; and use autoupgrade to keep nodes patched automatically against kernel vulnerabilities.&amp;lt;br&amp;gt;
Run &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/node-images#cos&amp;#34;&amp;gt;Google’s Container Optimized OS&amp;lt;/a&amp;gt; , the minimal and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/container-optimized-os/docs/concepts/security&amp;#34;&amp;gt;hardened&amp;lt;/a&amp;gt; container optimized OS that makes much of the disk read-only.&amp;lt;br&amp;gt;
Incorporate &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/binary-authorization&amp;#34;&amp;gt;binary authorization&amp;lt;/a&amp;gt; into your SDLC to require that containers admitted into the cluster are from trusted build systems and up-to-date on patching.&amp;lt;br&amp;gt;
Use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/security-command-center/docs/concepts-container-threat-detection-overview&amp;#34;&amp;gt;Secure Command Center’s Container Threat Detection&amp;lt;/a&amp;gt; or supported third-party tools to detect the most common runtime attacks.&amp;lt;br&amp;gt;
More information can be found in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster&amp;#34;&amp;gt;GKE Hardening Guide&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
How GKE is reducing the use of privileged pods. While it’s not uncommon for customers to install privileged pods into their clusters, GKE works to minimize the privilege levels held by our system components, especially those that are enabled by default. However, there are limits as to how many privileges can be removed from certain features. For example, Anthos Config Management requires permissions to modify most Kubernetes objects to be able to create and manage those objects. Some other privileges are baked into the system, such as those held by Kubelet. Previously, we worked with the Kubernetes community to build the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#noderestriction&amp;#34;&amp;gt;Node Restriction&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/docs/reference/access-authn-authz/node/&amp;#34;&amp;gt;Node Authorizer&amp;lt;/a&amp;gt; features to limit Kubelet&amp;amp;#39;s access to highly sensitive objects, such as secrets, adding protection against an attacker with access to the Kubelet credentials. More recently, we have taken steps to reduce the number of privileged pods across GKE and have added additional documentation on privileges used in system pods as well as information on how to improve pod isolation. Below are the steps we’ve taken:&amp;lt;br&amp;gt;
We have added &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster#restrict_self_modify&amp;#34;&amp;gt;an admission controller to GKE Autopilot and GKE Standard (on by default) and GKE/Anthos (opt-in)&amp;lt;/a&amp;gt; that stops attempts to run as a more privileged service account, which blocks a method of escalating privileges using privileged pods.&amp;lt;br&amp;gt;
We created a permission scanning tool that identifies pods that have privileges that could be used for escalation, and we used that tool to perform an audit across GKE and Anthos.&amp;lt;br&amp;gt;
The permission scanning tool is now integrated into our standard code review and testing processes to reduce the risk of introducing privileged pods into the system. As mentioned earlier, some features require privileges to perform their function.&amp;lt;br&amp;gt;
We are using the audit results to reduce permissions available to pods. For example, we removed “update nodes and pods” permissions from anetd in GKE.&amp;lt;br&amp;gt;
Where privileged pods are required for the operation of a feature, we’ve added additional documentation to illustrate that fact.&amp;lt;br&amp;gt;
We added &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/how-to/isolate-workloads-dedicated-nodes&amp;#34;&amp;gt;documentation&amp;lt;/a&amp;gt; that outlines how to isolate GKE-managed workloads in dedicated node pools when you’re unable to use GKE Sandbox to reduce the risk of privilege escalation attacks.&amp;lt;br&amp;gt;
In addition to the measures above, we recommend users take advantage of tools that can scan RBAC settings to detect overprivileged pods used in their applications. As part of their presentation, the Palo Alto researchers announced an open source tool, called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/PaloAltoNetworks/rbac-police&amp;#34;&amp;gt;rbac-police&amp;lt;/a&amp;gt; , that can be used for the task. So, while it only takes a single overprivileged workload to trampoline to the cluster, there are a number of actions you can take to minimize the likelihood of the prerequisite container breakout and the number of privileges used by a pod.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220518-160033/</link>
      <pubDate>Wed, 18 May 2022 16:00:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220518-160033/</guid>
      <description>Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. But many government employees aren’t issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online. What could go wrong? Here’s one example.&amp;lt;br&amp;gt;
A sample Common Access Card (CAC). Image: Cac.mil.&amp;lt;br&amp;gt;
KrebsOnSecurity recently heard from a reader — we’ll call him “Mark” because he wasn’t authorized to speak to the press — who works in IT for a major government defense contractor and was issued a Personal Identity Verification (PIV) government smart card designed for civilian employees. Not having a smart card reader at home and lacking any obvious guidance from his co-workers on how to get one, Mark opted to purchase a $15 reader from Amazon that said it was made to handle U.S. government smart cards.&amp;lt;br&amp;gt;
The USB-based device Mark settled on is the first result that currently comes up one when searches on Amazon.com for “PIV card reader.” The card reader Mark bought was sold by a company called Saicoo , whose sponsored Amazon listing advertises a “DOD Military USB Common Access Card (CAC) Reader” and has more than 11,700 mostly positive ratings.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cac.mil/common-access-card/&amp;#34;&amp;gt;Common Access Card&amp;lt;/a&amp;gt; (CAC) is the standard identification for active duty uniformed service personnel, selected reserve, DoD civilian employees, and eligible contractor personnel. It is the principal card used to enable physical access to buildings and controlled spaces, and provides access to DoD computer networks and systems.&amp;lt;br&amp;gt;
Mark said when he received the reader and plugged it into his Windows 10 PC, the operating system complained that the device’s hardware drivers weren’t functioning properly. Windows suggested consulting the vendor’s website for newer drivers.&amp;lt;br&amp;gt;
The Saicoo smart card reader that Mark purchased. Image: Amazon.com&amp;lt;br&amp;gt;
So Mark went to the website mentioned on Saicoo’s packaging and found a ZIP file containing drivers for Linux, Mac OS and Windows:&amp;lt;br&amp;gt;
Image: Saicoo&amp;lt;br&amp;gt;
Out of an abundance of caution, Mark submitted Saicoo’s drivers file to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.virustotal.com&amp;#34;&amp;gt;Virustotal.com&amp;lt;/a&amp;gt; , which simultaneously scans any shared files with more than five dozen antivirus and security products. Virustotal reported that some 43 different security tools detected the Saicoo drivers as malicious. The consensus seems to be that the ZIP file currently harbors a malware threat known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.ramnit.a&amp;#34;&amp;gt;Ramnit&amp;lt;/a&amp;gt; , a fairly common but dangerous trojan horse that spreads by appending itself to other files.&amp;lt;br&amp;gt;
Image: Virustotal.com&amp;lt;br&amp;gt;
Ramnit is a well-known and older threat — first surfacing more than a decade ago — but it has evolved over the years and is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cybereason.com/blog/research/banking-trojan-delivered-by-lolbins-ramnit-trojan&amp;#34;&amp;gt;still employed in more sophisticated data exfiltration attacks&amp;lt;/a&amp;gt; . Amazon said in a written statement that it was investigating the reports.&amp;lt;br&amp;gt;
“Seems like a potentially significant national security risk, considering that many end users might have elevated clearance levels who are using PIV cards for secure access,” Mark said.&amp;lt;br&amp;gt;
Mark said he contacted Saicoo about their website serving up malware, and received a response saying the company’s newest hardware did not require any additional drivers. He said Saicoo did not address his concern that the driver package on its website was bundled with malware.&amp;lt;br&amp;gt;
In response to KrebsOnSecurity’s request for comment, Saicoo sent a somewhat less reassuring reply.&amp;lt;br&amp;gt;
“From the details you offered, issue may probably caused by your computer security defense system as it seems not recognized our rarely used driver &amp;amp;amp; detected it as malicious or a virus,” Saicoo’s support team wrote in an email.&amp;lt;br&amp;gt;
“Actually, it’s not carrying any virus as you can trust us, if you have our reader on hand, please just ignore it and continue the installation steps,” the message continued. “When driver installed, this message will vanish out of sight. Don’t worry.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/when-your-smart-id-card-reader-comes-with-malware/#more-59840&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/when-your-smart-id-card-reader-comes-with-malware/&amp;#34;&amp;gt;When Your Smart ID Card Reader Comes With Malware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Joseph Menn | Reuters</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220517-162219/</link>
      <pubDate>Tue, 17 May 2022 16:22:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220517-162219/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/no-lights-no-heat-no-money-thats-life-ukraine-during-cyber-warfare-2022-01-14/&amp;#34;&amp;gt;No lights, no heat, no money - that&amp;#39;s life in Ukraine during cyber warfare , article with image&amp;lt;/a&amp;gt; January 14, 2022&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;U.S. lawmakers call for sanctions against Israel&amp;#39;s NSO, other spyware firms , article with gallery&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/&amp;#34;&amp;gt;U.S. State Department phones hacked with Israeli company spyware - sources , article with gallery&amp;lt;/a&amp;gt; December 4, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/&amp;#34;&amp;gt;Legal&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/us-authorities-disclose-ransomware-attacks-against-water-facilities-2021-10-14/&amp;#34;&amp;gt;U.S. authorities disclose ransomware attacks against water facilities , article with image&amp;lt;/a&amp;gt; October 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/&amp;#34;&amp;gt;Hackers of SolarWinds stole data on U.S. sanctions policy, intelligence probes , article with image&amp;lt;/a&amp;gt; October 8, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-2021-09-13/&amp;#34;&amp;gt;Cyber arms dealer exploits new iPhone software vulnerability, affecting most versions, say researchers , article with video&amp;lt;/a&amp;gt; September 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/disrupted/&amp;#34;&amp;gt;Disrupted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/&amp;#34;&amp;gt;EXCLUSIVE Microsoft warns thousands of cloud customers of exposed databases , article with video&amp;lt;/a&amp;gt; August 27, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220517-121426/</link>
      <pubDate>Tue, 17 May 2022 12:14:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220517-121426/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/17/business/elon-musk-twitter.html&amp;#34;&amp;gt;Elon Musk says Twitter deal ‘cannot move forward’ without more information. Mr. Musk called on Twitter to provide more data about the number of spam and fake accounts on the social media site. By Lauren Hirsch and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220517-003637/</link>
      <pubDate>Tue, 17 May 2022 00:36:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220517-003637/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/16/technology/elon-musk-twitter-price.html&amp;#34;&amp;gt;Elon Musk says a lower price for Twitter is ‘not out of the question.’ Mr. Musk has been creating confusion around whether the Twitter deal will close, causing the social media company’s share price to fall. By Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20220516-161111/</link>
      <pubDate>Mon, 16 May 2022 16:11:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20220516-161111/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/signal-your-support/&amp;#34;&amp;gt;Signal Your Support&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/aruna100&amp;#34;&amp;gt;aruna100&amp;lt;/a&amp;gt; on 16 May 2022&amp;lt;br&amp;gt;
People around the world count on Signal for things as simple as sharing moments of celebration like a graduation or as high stakes as coordinating a protest. We’ve got your back no matter what! As we’ve seen in recent times from moments of civil unrest to demonstrations for democracy, people turn to Signal for private and even lifesaving communications.&amp;lt;br&amp;gt;
Day in and day out, the team at Signal is working to keep your chats, voice, and video calls safe and private. It’s our mission. It’s also the reason why, unlike most other tech companies, we are structured as a nonprofit. ​We aren’t driven by profit and don’t make our money from your data or from advertising revenue. As a nonprofit, our whole focus is building safe, secure communication tools for you.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220515-081552/</link>
      <pubDate>Sun, 15 May 2022 08:15:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220515-081552/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/14/Golang-Generics&amp;#34;&amp;gt;Golang Diaries: Generics&amp;lt;/a&amp;gt; · My coding time this year has been invested in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/12/Quamina&amp;#34;&amp;gt;Quamina&amp;lt;/a&amp;gt; , an event-filtering library implemented in Go.  Just in the last couple     of weeks I spotted an opportunity to bring Go’s shiny new generics to bear, and not just anywhere, but for a central data     structure. I got good results, but the process was sort of painful; I kept trying things that looked like they ought to work but     didn’t. I’m sharing this tour through that experience because I’m a reasonably competent programmer with mainstream tastes     and if I hit these bumps in the road others probably will too &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/14/Golang-Generics&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/06/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Once again, a selection of long-form pieces for those who (unlike me) have jobs and won’t have time for all of, but might benefit     from ingesting one or two.  This month we have lots of musical offerings, along with politics, advice on how to walk,     and 5G &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/06/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220515-022402/</link>
      <pubDate>Sun, 15 May 2022 02:24:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220515-022402/</guid>
      <description>May 14, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/05/14/generating-ioctls.html&amp;#34;&amp;gt;A Hare code generator for finding ioctl numbers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220514-080612/</link>
      <pubDate>Sat, 14 May 2022 08:06:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220514-080612/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/12/06/species-definition-clarification-and-exercises/&amp;#34;&amp;gt;Species definition clarification and exercises&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220514-021522/</link>
      <pubDate>Sat, 14 May 2022 02:15:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220514-021522/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/guide-to-vue-components/&amp;#34;&amp;gt;This guide aims to share everything you need to know about Vue components, and includes in-depth examples of class components, dynamic components, single file components, functional components, and table components.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220514-021408/</link>
      <pubDate>Sat, 14 May 2022 02:14:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220514-021408/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#compiler-diagnostics&amp;#34;&amp;gt;compiler-diagnostics&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#hidden-friend-idiom&amp;#34;&amp;gt;hidden-friend-idiom&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#templates&amp;#34;&amp;gt;templates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
As of this writing, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://old.reddit.com/r/cpp/comments/uhpa7g/got_a_moment_to_to_share_your_thoughts_on_clangs/&amp;#34;&amp;gt;Chris Di Bella is running a survey on /r/cpp&amp;lt;/a&amp;gt; asking what are the biggest pain points with Clang’s diagnostics. In the free-form text entry field, I made
two observations, which I’m now expanding into a full-fledged blog post. (Don’t worry — I didn’t
type all this into that Google Forms survey!)&amp;lt;br&amp;gt;
To enable ADL, add a using-declaration&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#customization-points&amp;#34;&amp;gt;customization-points&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#name-lookup&amp;#34;&amp;gt;name-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#paradigm-shift&amp;#34;&amp;gt;paradigm-shift&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
This is yet another followup to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the std::swap two-step?”&amp;lt;/a&amp;gt; (2020-07-11)
and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2022/04/14/another-reason-for-the-poison-pill/&amp;#34;&amp;gt;“PSA: ADL requires that unqualified lookup has found a function”&amp;lt;/a&amp;gt; (2022-04-14),
as my mental model continues to evolve. (Mainly due to pressure from Jody Hagins. :))&amp;lt;br&amp;gt;
The humble potato&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#food&amp;#34;&amp;gt;food&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#old-shit&amp;#34;&amp;gt;old-shit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
From Blackwood’s Magazine , November 1819:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220514-021214/</link>
      <pubDate>Sat, 14 May 2022 02:12:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220514-021214/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/05/improved-process-isolation-in-firefox-100/&amp;#34;&amp;gt;Improved Process Isolation in Firefox 100 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/05/improved-process-isolation-in-firefox-100/&amp;#34;&amp;gt;Improved Process Isolation in Firefox 100&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Firefox uses a multi-process model for additional security and stability while browsing: Web Content (such as HTML/CSS and Javascript) is rendered in separate processes that are isolated from the rest of the operating system and managed by a privileged parent process. This way, the amount of control gained by an attacker that exploits a bug in a content process is limited. In this article, we would like to dive a bit further into the latest major milestone we have reached: Win32k Lockdown, which greatly reduces the capabilities of the content process when running on Windows.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220514-020722/</link>
      <pubDate>Sat, 14 May 2022 02:07:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220514-020722/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;Product &amp;amp;amp; Features&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/7th-birthday&amp;#34;&amp;gt;Celebrate Discord’s Bir7hday with Party Mode!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/company&amp;#34;&amp;gt;Discord HQ&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-idle-nights-merch-line-2022&amp;#34;&amp;gt;Idle Nights &amp;amp;amp; Vibrant Lights: Discord’s Newest Merch Line Drops Today&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/7th-birthday&amp;#34;&amp;gt;Celebrate Discord’s Bir7hday with Party Mode!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-idle-nights-merch-line-2022&amp;#34;&amp;gt;Idle Nights &amp;amp;amp; Vibrant Lights: Discord’s Newest Merch Line Drops Today&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220514-020255/</link>
      <pubDate>Sat, 14 May 2022 02:02:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220514-020255/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/06/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Once again, a selection of long-form pieces for those who (unlike me) have jobs and won’t have time for all of, but might benefit     from ingesting one or two.  This month we have lots of musical offerings, along with politics, advice on how to walk,     and 5G &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/05/06/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220514-015714/</link>
      <pubDate>Sat, 14 May 2022 01:57:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220514-015714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/inside-tiktoks-explosive-growth&amp;#34;&amp;gt;Inside TikTok’s Explosive Growth&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/inside-tiktoks-explosive-growth&amp;#34;&amp;gt;It’s difficult to overstate how dominant TikTok&amp;#39;s become. Even the analysts are puzzled.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220514-015555/</link>
      <pubDate>Sat, 14 May 2022 01:55:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220514-015555/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/technology/twitter-elon-musk.html&amp;#34;&amp;gt;Twitter fires two executives and freezes most hiring after Musk’s deal to buy the company. An internal memo shared with employees said the platform’s general manager and general manager for revenue would be departing. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220514-015331/</link>
      <pubDate>Sat, 14 May 2022 01:53:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220514-015331/</guid>
      <description>The U.S. Drug Enforcement Administration (DEA) says it is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases. KrebsOnSecurity has learned the alleged compromise is tied to a cybercrime and online harassment community that routinely impersonates police and government officials to harvest personal information on their targets.&amp;lt;br&amp;gt;
Unidentified hackers shared this screenshot of alleged access to the Drug Enforcement Administration’s intelligence sharing portal.&amp;lt;br&amp;gt;
On May 8, KrebsOnSecurity received a tip that hackers obtained a username and password for an authorized user of esp.usdoj.gov , which is the Law Enforcement Inquiry and Alerts (LEIA) system managed by the DEA.&amp;lt;br&amp;gt;
KrebsOnSecurity shared information about the allegedly hijacked account with the DEA, the Federal Bureau of Investigation (FBI), and the Department of Justice , which houses both agencies. The DEA declined to comment on the validity of the claims, issuing only a brief statement in response.&amp;lt;br&amp;gt;
“DEA takes cyber security and information of intrusions seriously and investigates all such reports to the fullest extent,” the agency said in a statement shared via email.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/open/inventory.php?page=87&amp;#34;&amp;gt;this page&amp;lt;/a&amp;gt; at the Justice Department website, LEIA “provides federated search capabilities for both EPIC and external database repositories,” including data classified as “law enforcement sensitive” and “mission sensitive” to the DEA.&amp;lt;br&amp;gt;
A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://obamawhitehouse.archives.gov/sites/default/files/ondcp/policy-and-research/southwest_strategy-3.pdf&amp;#34;&amp;gt;document published by the Obama administration in May 2016&amp;lt;/a&amp;gt; (PDF) says the DEA’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/El_Paso_Intelligence_Center&amp;#34;&amp;gt;El Paso Intelligence Center&amp;lt;/a&amp;gt; (EPIC) systems in Texas are available for use by federal, state, local and tribal law enforcement, as well as the Department of Defense and intelligence community.&amp;lt;br&amp;gt;
EPIC and LEIA also have access to the DEA’s National Seizure System (NSS), which the DEA uses to identify property thought to have been purchased with the proceeds of criminal activity (think fancy cars, boats and homes seized from drug kingpins).&amp;lt;br&amp;gt;
“The EPIC System Portal (ESP) enables vetted users to remotely and securely share intelligence, access the National Seizure System, conduct data analytics, and obtain information in support of criminal investigations or law enforcement operations,” the 2016 White House document reads. “Law Enforcement Inquiry and Alerts (LEIA) allows for a federated search of 16 Federal law enforcement databases.”&amp;lt;br&amp;gt;
The screenshots shared with this author indicate the hackers could use EPIC to look up a variety of records, including those for motor vehicles, boats, firearms, aircraft, and even drones.&amp;lt;br&amp;gt;
Claims about the purloined DEA access were shared with this author by “ KT ,” the current administrator of the Doxbin — a highly toxic online community that provides a forum for digging up personal information on people and posting it publicly.&amp;lt;br&amp;gt;
As KrebsOnSecurity reported earlier this year, the previous owner of the Doxbin has been &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/&amp;#34;&amp;gt;identified as the leader&amp;lt;/a&amp;gt; of LAPSUS$ , a data extortion group that hacked into some of the world’s largest tech companies this year — including Microsoft, NVIDIA, Okta, Samsung and T-Mobile.&amp;lt;br&amp;gt;
That reporting also showed how the core members of LAPSUS$ were involved in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&amp;#34;&amp;gt;selling a service offering fraudulent Emergency Data Requests&amp;lt;/a&amp;gt; (EDRs), wherein the hackers use compromised police and government email accounts to file warrantless data requests with social media firms, mobile telephony providers and other technology firms, attesting that the information being requested can’t wait for a warrant because it relates to an urgent matter of life and death.&amp;lt;br&amp;gt;
From the standpoint of individuals involved in filing these phony EDRs, access to databases and user accounts within the Department of Justice would be a major coup. But the data in EPIC would probably be far more valuable to organized crime rings or drug cartels, said Nicholas Weaver , a researcher for the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.icsi.berkeley.edu/icsi/&amp;#34;&amp;gt;International Computer Science Institute&amp;lt;/a&amp;gt; at University of California, Berkeley .&amp;lt;br&amp;gt;
Weaver said it’s clear from the screenshots shared by the hackers that they could use their access not only to view sensitive information, but also submit false records to law enforcement and intelligence agency databases.&amp;lt;br&amp;gt;
“I don’t think these [people] realize what they got, how much money the cartels would pay for access to this,” Weaver said. “Especially because as a cartel you don’t search for yourself you search for your enemies, so that even if it’s discovered there is no loss to you of putting things ONTO the DEA’s radar.”&amp;lt;br&amp;gt;
The DEA’s EPIC portal login page.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/dea-investigating-breach-of-law-enforcement-data-portal/&amp;#34;&amp;gt;DEA Investigating Breach of Law Enforcement Data Portal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220512-161309/</link>
      <pubDate>Thu, 12 May 2022 16:13:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220512-161309/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;Out There The Milky Way’s Black Hole Comes to Light The Event Horizon Telescope has once again caught sight of the “unseeable.” By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Joseph Menn | Reuters</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220512-160331/</link>
      <pubDate>Thu, 12 May 2022 16:03:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220512-160331/</guid>
      <description>Feedback&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220512-120659/</link>
      <pubDate>Thu, 12 May 2022 12:06:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220512-120659/</guid>
      <description>May 12, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/05/12/Supply-chain-when-will-we-learn.html&amp;#34;&amp;gt;When will we learn?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220512-085407/</link>
      <pubDate>Thu, 12 May 2022 08:54:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220512-085407/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/04/30/new-haskell-diagrams-library/&amp;#34;&amp;gt;New Haskell diagrams library&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220512-051433/</link>
      <pubDate>Thu, 12 May 2022 05:14:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220512-051433/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/11/technology/ftc-majority-lina-khan.html&amp;#34;&amp;gt;New Majority Gives F.T.C. a Chance to Push an Aggressive Agenda The confirmation of a third Democrat creates an opportunity for Lina Khan, the Federal Trade Commission’s chair, to advance efforts to rein in corporate power. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220512-044942/</link>
      <pubDate>Thu, 12 May 2022 04:49:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220512-044942/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/12/science/black-hole-photo.html&amp;#34;&amp;gt;Out There Has the Milky Way’s Black Hole Come to Light? The Event Horizon Telescope reaches again for a glimpse of the “unseeable.” By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220512-044820/</link>
      <pubDate>Thu, 12 May 2022 04:48:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220512-044820/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/git-branching-with-source-control/&amp;#34;&amp;gt;Running git init is one of the first steps we take when starting a software development project. Version Control Systems (VCS) like git enable us to maintain history of a codebase, experiment freely&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/best-postgresql-guis-in-2020/&amp;#34;&amp;gt;This post walks through the best GUIs available for querying your Postgres data, as well as remotely accessing and navigating database servers.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-203221/</link>
      <pubDate>Wed, 11 May 2022 20:32:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-203221/</guid>
      <description>Last month, we also started rolling out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/google-play/data-safety/&amp;#34;&amp;gt;a new Data safety section&amp;lt;/a&amp;gt; in Google Play to help you understand how apps plan to collect, share, and protect your data, before you install it. To instill even more trust in Play apps, we&amp;#39;re enabling developers to have their apps independently validated against &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/OWASP/owasp-masvs&amp;#34;&amp;gt;OWASP’s MASVS&amp;lt;/a&amp;gt; , a globally recognized standard for mobile app security.&amp;lt;br&amp;gt;
Posted by Daniel Margolis, Software Engineer, Google Account Security Team Every year, security technologies improve: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/chrome/security/&amp;#34;&amp;gt;browsers get better&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://transparencyreport.google.com/https/overview?hl=en&amp;#34;&amp;gt;encryption becomes ubiquitous on the Web&amp;lt;/a&amp;gt; , authentication becomes stronger. But phishing persistently remains a threat (as shown by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.techrepublic.com/article/phishing-attack-spoofs-us-department-of-labor-to-steal-account-credentials/&amp;#34;&amp;gt;a recent phishing attack on the U.S. Department of Labor&amp;lt;/a&amp;gt; ) because users retain the ability to log into their online accounts, often with a simple password, from anywhere in the world. It’s why today &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/io-safer-with-google/&amp;#34;&amp;gt;at I/O we announced&amp;lt;/a&amp;gt; new ways we’re reducing the risks of phishing by: scaling phishing protections to Google Docs, Sheets and Slides, continuing to auto enroll people in 2-Step Verification and more. This blog will deep dive into the method of phishing and how it has evolved today. As phishing adoption has grown, multi-factor authentication has become a particular focus for attackers. In some cases, attackers phish SMS codes directly, by following a legitimate &amp;amp;quot;one-time passcode&amp;amp;quot; (triggered by the attacker trying to log into the victim&amp;#39;s account) with a spoofed message asking the victim to &amp;amp;quot;reply back with the code you just received.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-192743/</link>
      <pubDate>Wed, 11 May 2022 19:27:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-192743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/05/io-2022-android-13-security-and-privacy.html&amp;#34;&amp;gt;I/O 2022: Android 13 security and privacy (and more!)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Eugene Liderman and Sara N-Marandi, Android Security and Privacy Team&amp;lt;br&amp;gt;
Every year at I/O we share the latest on privacy and security features on Android. But we know some users like to go a level deeper in understanding how we’re making the latest release safer, and more private, while continuing to offer a seamless experience. So let’s dig into the tools we’re building to better secure your data, enhance your privacy and increase trust in the apps and experiences on your devices.&amp;lt;br&amp;gt;
Low latency, frictionless security&amp;lt;br&amp;gt;
Regardless of whether a smartphone is used for consumer or enterprise purposes, attestation is a key underpinning to ensure the integrity of the device and apps running on the device. Fundamentally, key attestation lets a developer bind a secret or designate data to a device. This is a strong assertion: &amp;amp;#34;same user, same device&amp;amp;#34; as long as the key is available, a cryptographic assertion of integrity can be made.&amp;lt;br&amp;gt;
With Android 13 we have migrated to a new model for the provisioning of attestation keys to Android devices which is known as Remote Key Provisioning (RKP). This new approach will strengthen device security by eliminating factory provisioning errors and providing key vulnerability recovery by moving to an architecture where Google takes more responsibility in the certificate management lifecycle for these attestation keys. You can learn more about RKP &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2022/03/upgrading-android-attestation-remote.html&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We’re also making even more modules updatable directly through &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/product-documentation/answer/11462338&amp;#34;&amp;gt;Google Play System Updates&amp;lt;/a&amp;gt; so we can automatically upgrade more system components and fix bugs, seamlessly, without you having to worry about it. We now have more than 30 components in Android that can be automatically updated through Google Play, including new modules in Android 13 for Bluetooth and ultra-wideband (UWB).&amp;lt;br&amp;gt;
Last year we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/04/rust-in-android-platform.html&amp;#34;&amp;gt;talked about&amp;lt;/a&amp;gt; how the majority of vulnerabilities in major operating systems are caused by undefined behavior in programming languages like C/C&#43;&#43;. Rust is an alternative language that provides the efficiency and flexibility required in advanced systems programming (OS, networking) but Rust comes with the added boost of memory safety. We are happy to report that Rust is being adopted in security critical parts of Android, such as our key management components and networking stacks.&amp;lt;br&amp;gt;
Hardening the platform doesn’t just stop with continual improvements with memory safety and expansion of anti-exploitation techniques. It also includes hardening our API surfaces to provide a more secure experience to our end users.&amp;lt;br&amp;gt;
In Android 13 we implemented numerous enhancements to help mitigate potential vulnerabilities that app developers may inadvertently introduce. This includes making &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/features#runtime-receivers&amp;#34;&amp;gt;runtime receivers safer&amp;lt;/a&amp;gt; by allowing developers to specify whether a particular broadcast receiver in their app should be exported and visible to other apps on the device. On top of this, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/behavior-changes-13#intent-filters&amp;#34;&amp;gt;intent filters block non-matching intents&amp;lt;/a&amp;gt; which further hardens the app and its components.&amp;lt;br&amp;gt;
For enterprise customers who need to meet certain security certification requirements, we’ve updated our security logging reporting to add more coverage and consolidate security logs in one location. This is helpful for companies that need to meet standards like Common Criteria and is useful for partners such as management solutions providers who can review all security-related logs in one place.&amp;lt;br&amp;gt;
Privacy on your terms&amp;lt;br&amp;gt;
Android 13 brings developers more ways to build privacy-centric apps. Apps can now implement a new Photo picker that allows the user to select &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/features/photopicker&amp;#34;&amp;gt;the exact photos or videos&amp;lt;/a&amp;gt; they want to share without having to give another app access to their media library.&amp;lt;br&amp;gt;
With Android 13, we’re also reducing the number of apps that require your location to function using the nearby devices permission &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2021/05/android-security-and-privacy-recap.html&amp;#34;&amp;gt;introduced last year&amp;lt;/a&amp;gt; . For example, you won’t have to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/features/nearby-wifi-devices-permission&amp;#34;&amp;gt;turn on location to enable Wi-fi&amp;lt;/a&amp;gt; for certain apps and situations. We’ve also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/behavior-changes-13#granular-media-permissions&amp;#34;&amp;gt;changed&amp;lt;/a&amp;gt; how storage works, requiring developers to ask for separate permissions to access audio, image and video files.&amp;lt;br&amp;gt;
Previously, we’ve limited apps from accessing your clipboard in the background and alerted you when an app accessed it. With Android 13, we’re automatically deleting your clipboard history after a short period so apps are blocked from seeing old copied information.&amp;lt;br&amp;gt;
In Android 11, we began &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/11/privacy/permissions#auto-reset&amp;#34;&amp;gt;automatically resetting permissions&amp;lt;/a&amp;gt; for apps you haven’t used for an extended period of time, and have since &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2021/09/making-permissions-auto-reset-available.html&amp;#34;&amp;gt;expanded the feature&amp;lt;/a&amp;gt; to devices running Android 6 and above. Since then, we’ve automatically reset over 5 billion permissions.&amp;lt;br&amp;gt;
In Android 13, app makers can go above and beyond in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/features#developer-downgradable-permissions&amp;#34;&amp;gt;removing permissions&amp;lt;/a&amp;gt; even more proactively on behalf of their users. Developers will be able to provide even more privacy by reducing the time their apps have access to unneeded permissions.&amp;lt;br&amp;gt;
Finally, we know notifications are critical for many apps but are not always of equal importance to users. In Android 13, you’ll have more control over which apps you would like to get alerts from, as new apps on your device are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/about/versions/13/changes/notification-permission&amp;#34;&amp;gt;required to ask you for permission&amp;lt;/a&amp;gt; by default before they can send you notifications.&amp;lt;br&amp;gt;
Apps you can trust&amp;lt;br&amp;gt;
Most app developers build their apps using a variety of software development kits (SDKs) that bundle in pre-packaged functionality. While SDKs provide amazing functionality, app developers typically have little visibility or control over the SDK code or insight into their performance.&amp;lt;br&amp;gt;
We’re working with developers to make their apps more secure with a new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://goo.gle/play-sdk&amp;#34;&amp;gt;Google Play SDK Index&amp;lt;/a&amp;gt; that helps them see SDK safety and reliability signals before they build the code into their apps. This ensures we&amp;amp;#39;re helping everyone build a more secure and private app ecosystem.&amp;lt;br&amp;gt;
Last month, we also started rolling out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/google-play/data-safety/&amp;#34;&amp;gt;a new Data safety section&amp;lt;/a&amp;gt; in Google Play to help you understand how apps plan to collect, share, and protect your data, before you install it. To instill even more trust in Play apps, we&amp;amp;#39;re enabling developers to have their apps independently validated against &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://owasp.org/www-project-mobile-security-testing-guide/&amp;#34;&amp;gt;OWASP’s MASVS&amp;lt;/a&amp;gt; , a globally recognized standard for mobile security.&amp;lt;br&amp;gt;
We’re working with a small group of developers and authorized lab partners to evolve the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://appdefensealliance.dev/masa&amp;#34;&amp;gt;program&amp;lt;/a&amp;gt; . Developers who have completed this independent validation can showcase this on their Data safety section.&amp;lt;br&amp;gt;
Additional mobile security and safety&amp;lt;br&amp;gt;
Just like our anti-malware protection Google Play, which now scans 125 billion apps a day, we believe spam and phishing detection should be built in. We’re proud to announce that in a recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://omdia.tech.informa.com/commissioned-research/articles/omdia-consumer-mobile-security-scorecard&amp;#34;&amp;gt;analyst report&amp;lt;/a&amp;gt; , Messages was the highest rated built-in messaging app for anti-phishing and scams protection.&amp;lt;br&amp;gt;
Messages is now also helping to protect you against 1.5 billion spam messages per month, so you can avoid both annoying texts and attempts to access your data. These phishing attempts are increasingly how bad actors are trying to get your information, by getting you to click on a link or download an app, so we are always looking for ways to offer another line of defense.&amp;lt;br&amp;gt;
Last year, we introduced &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.android.com/google-features-on-android/summer-2021/#summer-2021-end-to-end-contents&amp;#34;&amp;gt;end-to-end encryption in Messages&amp;lt;/a&amp;gt; to provide more security for your mobile conversations. Later this year, we’ll launch end-to-end encryption group conversations in beta to ensure your personal messages get even more protection.&amp;lt;br&amp;gt;
As with a lot of features we build, we try to do it in an open and transparent way. In Android 11 we announced a new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/10/privacy-preserving-features-in-mobile.html&amp;#34;&amp;gt;platform feature&amp;lt;/a&amp;gt; that was backed by an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.iso.org/standard/69084.html&amp;#34;&amp;gt;ISO standard&amp;lt;/a&amp;gt; to enable the use of digital IDs on a smartphone in a privacy-preserving way. When you hand over your plastic license (or other credential) to someone for verification it’s all or nothing which means they have access to your full name, date of birth, address, and other personally identifiable information (PII). The mobile version of this allows for much more fine-grained control where the end user and/or app can select exactly what to share with the verifier. In addition, the verifier must declare whether they intend to retain the data returned. In addition, you can present certain details of your credentials, such as age, without revealing your identity.&amp;lt;br&amp;gt;
Over the last two Android releases we have been improving this API and making it easier for third-party organizations to leverage it for various digital identity use cases, such as driver’s licenses, student IDs, or corporate badges. We’re now announcing that Google Wallet uses Android &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/security/features/identity-credentials&amp;#34;&amp;gt;Identity Credential&amp;lt;/a&amp;gt; to support digital IDs and driver’s licenses. We’re working with states in the US and governments around the world to bring digital IDs to Wallet later this year. You can learn more about all of the new enhancements in Google Wallet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/android/ask-a-techspert-google-wallet&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Protected by Android&amp;lt;br&amp;gt;
We don’t think your security and privacy should be hard to understand and control. Later this year, we’ll begin rolling out a new destination in settings on Android 13 devices that puts all your device security and data privacy front and center.&amp;lt;br&amp;gt;
The new Security &amp;amp;amp; Privacy settings page will give you a simple, color-coded way to understand your safety status and will offer clear and actionable guidance to improve it. The page will be anchored by new action cards that notify you of critical steps you should take to address any safety risks. In addition to notifications to warn you about issues, we’ll also provide timely recommendations on how to enhance your privacy.&amp;lt;br&amp;gt;
We know that to feel safe and in control of your data, you need to have a secure foundation you can count on. Because if your device isn’t secure, it’s not private either. We’re working hard to make sure you’re always protected by Android. Learn more about these protections on our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/android.com/safety&amp;#34;&amp;gt;website&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20220511-182516/</link>
      <pubDate>Wed, 11 May 2022 18:25:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20220511-182516/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2022/05/10/dream-watch.html&amp;#34;&amp;gt;A dream I had (2013)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220511-181420/</link>
      <pubDate>Wed, 11 May 2022 18:14:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220511-181420/</guid>
      <description>Microsoft today released updates to fix at least 74 separate security problems in its Windows operating systems and related software. This month’s patch batch includes fixes for seven “critical” flaws, as well as a zero-day vulnerability that affects all supported versions of Windows.&amp;lt;br&amp;gt;
By all accounts, the most urgent bug Microsoft addressed this month is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925&amp;#34;&amp;gt;CVE-2022-26925&amp;lt;/a&amp;gt; , a weakness in a central component of Windows security (the “ Local Security Authority ” process within Windows). CVE-2022-26925 was publicly disclosed prior to today, and Microsoft says it is now actively being exploited in the wild. The flaw affects Windows 7 through 10 and Windows Server 2008 through 2022.&amp;lt;br&amp;gt;
Greg Wiseman , product manager for Rapid7 , said Microsoft has rated this vulnerability as important and assigned it a CVSS (danger) score of 8.1 (10 being the worst), although Microsoft notes that the CVSS score can be as high as 9.8 in certain situations.&amp;lt;br&amp;gt;
“This allows attackers to perform a man-in-the-middle attack to force domain controllers to authenticate to the attacker using NTLM authentication,” Wiseman said. “This is very bad news when used in conjunction with an NTLM relay attack, potentially leading to remote code execution. This bug affects all supported versions of Windows, but Domain Controllers should be patched on a priority basis before updating other servers.”&amp;lt;br&amp;gt;
Wiseman said the most recent time Microsoft patched a similar vulnerability — last August in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942&amp;#34;&amp;gt;CVE-2021-36942&amp;lt;/a&amp;gt; — it was also being exploited in the wild under the name “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.microsoft.com/en-gb/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429&amp;#34;&amp;gt;PetitPotam&amp;lt;/a&amp;gt; .”&amp;lt;br&amp;gt;
“CVE-2021-36942 was so bad it made CISA’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&amp;#34;&amp;gt;catalog of Known Exploited Vulnerabilities&amp;lt;/a&amp;gt; ,” Wiseman said. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/microsoft-patch-tuesday-may-2022-edition/#more-59789&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220511-180719/</link>
      <pubDate>Wed, 11 May 2022 18:07:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220511-180719/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-01253-6&amp;#34;&amp;gt;The $93-billion plan to put astronauts back on the Moon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The world’s most powerful rocket will make a trip around the Moon in 2022 — a step towards landing people there in 2025, and part of the US Artemis programme.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-180603/</link>
      <pubDate>Wed, 11 May 2022 18:06:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220511-180603/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/05/taking-on-next-generation-of-phishing.html&amp;#34;&amp;gt;Taking on the Next Generation of Phishing Scams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Daniel Margolis, Senior Software Engineer, Google Account Security Team Every year, security technologies improve: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/chrome/security/&amp;#34;&amp;gt;browsers get better&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://transparencyreport.google.com/https/overview?hl=en&amp;#34;&amp;gt;encryption becomes ubiquitous on the Web&amp;lt;/a&amp;gt; , authentication becomes stronger. But phishing persistently remains a threat (as shown by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.techrepublic.com/article/phishing-attack-spoofs-us-department-of-labor-to-steal-account-credentials/&amp;#34;&amp;gt;a recent phishing attack on the U.S. Department of Labor&amp;lt;/a&amp;gt; ) because users retain the ability to log into their online accounts, often with a simple password, from anywhere in the world. It’s why today &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/io-safer-with-google/&amp;#34;&amp;gt;at I/O we announced&amp;lt;/a&amp;gt; new ways we’re reducing the risks of phishing by: scaling phishing protections to Google Docs, Sheets and Slides, continuing to auto enroll people in 2-Step Verification and more. This blog will deep dive into the method of phishing and how it has evolved today. As phishing adoption has grown, multi-factor authentication has become a particular focus for attackers. In some cases, attackers phish SMS codes directly, by following a legitimate &amp;amp;#34;one-time passcode&amp;amp;#34; (triggered by the attacker trying to log into the victim&amp;amp;#39;s account) with a spoofed message asking the victim to &amp;amp;#34;reply back with the code you just received.”&amp;lt;br&amp;gt;
Left: legitimate Google SMS verification. Right: spoofed message asking victim to share verification code.&amp;lt;br&amp;gt;
In other cases, attackers have leveraged more sophisticated dynamic phishing pages to conduct relay attacks. In these attacks, a user thinks they&amp;amp;#39;re logging into the intended site, just as in a standard phishing attack. But instead of deploying a simple static phishing page that saves the victim&amp;amp;#39;s email and password when the victim tries to login, the phisher has deployed a web service that logs into the actual website at the same time the user is falling for the phishing page. The simplest approach is an almost off-the-shelf &amp;amp;#34;reverse proxy&amp;amp;#34; which acts as a &amp;amp;#34;person in the middle&amp;amp;#34;, forwarding the victim&amp;amp;#39;s inputs to the legitimate page and sending the response from the legitimate page back to the victim&amp;amp;#39;s browser.&amp;lt;br&amp;gt;
These attacks are especially challenging to prevent because additional authentication challenges shown to the attacker—like a prompt for an SMS code—are also relayed to the victim, and the victim&amp;amp;#39;s response is in turn relayed back to the real website. In this way, the attacker can count on their victim to solve any authentication challenge presented. Traditional multi-factor authentication with PIN codes can only do so much against these attacks, and authentication with smartphone approvals via a prompt — while more secure against SIM-swap attacks — is still vulnerable to this sort of real-time interception.&amp;lt;br&amp;gt;
The Solution Space Over the past year, we&amp;amp;#39;ve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/making-sign-safer-and-more-convenient/&amp;#34;&amp;gt;started to automatically enable device-based two-factor authentication&amp;lt;/a&amp;gt; for our users. This authentication not only helps protect against traditional password compromise but, with technology improvements, we can also use it to help defend against these more sophisticated forms of phishing. Taking a broad view, most efforts to protect and defend against phishing fall into the following categories:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dev.chromium.org/Home/chromium-security/enamel&amp;#34;&amp;gt;Browser UI improvements&amp;lt;/a&amp;gt; to help users identify authentic websites.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/accounts/answer/6208650?hl=en&amp;#34;&amp;gt;Password managers&amp;lt;/a&amp;gt; that can validate the identity of the web page before logging in.&amp;lt;br&amp;gt;
Phishing detection, both in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://safety.google/gmail/&amp;#34;&amp;gt;email&amp;lt;/a&amp;gt; —the most common delivery channel—and in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://safebrowsing.google.com/&amp;#34;&amp;gt;browser&amp;lt;/a&amp;gt; itself, to warn users about suspicious web pages.&amp;lt;br&amp;gt;
Preventing the person-in-the-middle attacks mentioned above by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2019/04/better-protection-against-man-in-middle.html&amp;#34;&amp;gt;preventing automated login attempts&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Phishing-resistant authentication using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://fidoalliance.org/how-fido-works/&amp;#34;&amp;gt;FIDO&amp;lt;/a&amp;gt; with security keys or a Bluetooth connection to your phone.&amp;lt;br&amp;gt;
Hardening the Google Prompt challenge to help users identify suspicious sign-in attempts, or to ask them to take additional steps that can defeat phishing (like navigating to a new web address, or to join the same wireless network as the computer they&amp;amp;#39;re logging into).&amp;lt;br&amp;gt;
Expanding phishing-resistant authentication to more users Over the last decade we’ve been working hard with a number of industry partners on expanding phishing-resistant authentication mechanisms, as part of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://fidoalliance.org/&amp;#34;&amp;gt;FIDO Alliance&amp;lt;/a&amp;gt; . Through these efforts we introduced physical FIDO security keys, such as the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://store.google.com/product/titan_security_key&amp;#34;&amp;gt;Titan Security Key&amp;lt;/a&amp;gt; , which prevent phishing by verifying the identity of the website you&amp;amp;#39;re logging into. (This verification protects against the &amp;amp;#34;person-in-the-middle&amp;amp;#34;  phishing described above.) Recently, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/one-step-closer-to-a-passwordless-future/&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; a major milestone with the FIDO Alliance, Apple and Microsoft by expanding our support for the FIDO Sign-in standards, helping to launch us into a truly passwordless, phishing-resistant future. Even though security keys work great, we don&amp;amp;#39;t expect everyone to add one to their keyring.&amp;lt;br&amp;gt;
Instead, to make this level of security more accessible, we&amp;amp;#39;re building it into mobile phones. Unlike physical FIDO security keys that need to be connected to your device via USB, we use Bluetooth to ensure your phone is close to the device you&amp;amp;#39;re logging into. Like physical security keys, this helps prevent a distant attacker from tricking you into approving a sign-in on their browser, giving us an added layer of security against the kind of &amp;amp;#34;person in the middle&amp;amp;#34; attacks that can still work against SMS or Google Prompt. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/security-myth-busting-and-spring-cleaning/&amp;#34;&amp;gt;But don&amp;amp;#39;t worry&amp;lt;/a&amp;gt; : this doesn&amp;amp;#39;t allow computers within Bluetooth range to login as you—it only grants that approval to the computer you&amp;amp;#39;re logging into. And we only use this to verify that your phone is near the device you&amp;amp;#39;re logging into, so you only need to have Bluetooth on during login.) Over the next couple of months we’ll be rolling out this technology in more places, which you might notice as a request for you to enable Bluetooth while logging in, so we can perform this additional security check. If you&amp;amp;#39;ve signed into your Google account on your Android phone, we can enroll your phone automatically—just like with Google Prompt—allowing us to give this added layer of security to many of our users without the need for any additional setup. But unfortunately this secure login doesn&amp;amp;#39;t work everywhere—for example, when logging into a computer that doesn&amp;amp;#39;t support Bluetooth, or a browser that doesn&amp;amp;#39;t support security keys. That&amp;amp;#39;s why, if we are to offer phishing-resistant security to everyone, we have to offer backups when security keys aren&amp;amp;#39;t available—and those backups must also be secure enough to prevent attackers from taking advantage of them.&amp;lt;br&amp;gt;
Hardening existing challenges against phishin g Over the past few months, we&amp;amp;#39;ve started experimenting with making our traditional Google Prompt challenges more phishing resistant. We already use different challenge experiences depending on the situation—for example, sometimes we ask the user to match a PIN code with what they&amp;amp;#39;re seeing on the screen in addition to clicking &amp;amp;#34;allow&amp;amp;#34; or &amp;amp;#34;deny&amp;amp;#34;. This can help prevent static phishing pages from tricking you into approving a challenge. We&amp;amp;#39;ve also begun experimenting with more involved challenges for higher-risk situations, including more prominent warnings when we see you logging in from a computer that we think might belong to a phisher, or asking you to join your phone to the same Wi-Fi network as the computer you&amp;amp;#39;re logging into so we can be sure the two are near each other. Similar to our use of Bluetooth for Security Keys, this prevents an attacker from tricking you into logging into a &amp;amp;#34;person-in-the-middle&amp;amp;#34; phishing page.&amp;lt;br&amp;gt;
Bringing it all together&amp;lt;br&amp;gt;
Of course, while all of these options dramatically increase account security, we also know that they can be a challenge for some of our users, which is why we&amp;amp;#39;re rolling them out gradually, as part of a risk-based approach that also focuses on usability. If we think an account is at a higher risk, or if we see abnormal behavior, we&amp;amp;#39;re more likely to use these additional security measures. Over time, as FIDO2 authentication becomes more widely available, we expect to be able to make it the default for many of our users, and to rely on stronger versions of our existing challenges like those described above to provide secure fallbacks. All these new tools in our toolbox—detecting browser automation to prevent &amp;amp;#34;person in the middle&amp;amp;#34; attacks, warning users in Chrome and Gmail, making the Google Prompt more secure, and automatically enabling Android phones as easy-to-use Security Keys—work together to allow us to better protect our users against phishing. Phishing attacks have long been seen as a persistent threat, but these recent developments give us the ability to really move the needle and help more of our users stay safer online.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220511-180418/</link>
      <pubDate>Wed, 11 May 2022 18:04:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220511-180418/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/10/technology/elon-musk-donald-trump-twitter-ban.html&amp;#34;&amp;gt;Elon Musk says he would ‘reverse the permanent ban’ of Donald Trump on Twitter. Mr. Musk has said he wants Twitter to be a forum for debate, and he called the barring of Mr. Trump “morally wrong.” The former president has said he would not rejoin the platform. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220511-175300/</link>
      <pubDate>Wed, 11 May 2022 17:53:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220511-175300/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-philosopher-king&amp;#34;&amp;gt;Podcast Episode - The Philosopher King&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220510-201743/</link>
      <pubDate>Tue, 10 May 2022 20:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220510-201743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/05/release-of-technical-report-into-amd.html&amp;#34;&amp;gt;Release of Technical Report into the AMD Security Processor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by James Forshaw, Google Project Zero&amp;lt;br&amp;gt;
Today , members of Project Zero and the Google Cloud security team are releasing a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/AMD_GPZ-Technical_Report_FINAL_05_2022.pdf&amp;#34;&amp;gt;technical report&amp;lt;/a&amp;gt; on a security review of AMD Secure Processor (ASP). The ASP is an isolated core in AMD EPYC CPUs that adds a root of trust and controls secure system initialization. As it&amp;amp;#39;s a generic processor AMD can add additional security features to the firmware, but like with all complex systems it&amp;amp;#39;s possible these features might have security issues which could compromise the security of everything under the ASP&amp;amp;#39;s management.&amp;lt;br&amp;gt;
The security review undertaken was on the implementation of the ASP on the 3rd Gen AMD EPYC CPUs (codenamed &amp;amp;#34;Milan&amp;amp;#34;). One feature of the ASP of interest to Google is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amd.com/en/processors/amd-secure-encrypted-virtualization&amp;#34;&amp;gt;Secure Encrypted Virtualization (SEV)&amp;lt;/a&amp;gt; . SEV adds encryption to the memory used by virtual machines running on the CPU. This feature is of importance to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/confidential-computing&amp;#34;&amp;gt;Confidential Computing&amp;lt;/a&amp;gt; as it provides protection of customer cloud data in use, not just at rest or when sending data across a network.&amp;lt;br&amp;gt;
A particular emphasis of the review was on the Secure Nested Paging (SNP) extension to SEV added to &amp;amp;#34;Milan&amp;amp;#34;. SNP aims to further improve the security of confidential computing by adding integrity protection and mitigations for numerous side-channel attacks. The review was undertaken with full cooperation with AMD. The team was granted access to source code for the ASP, and production samples to test hardware attacks.&amp;lt;br&amp;gt;
The review discovered 19 issues which have been fixed by AMD in public security bulletins. These issues ranged from incorrect use of cryptography to memory corruption in the context of the ASP firmware. The report describes some of the more interesting issues that were uncovered during the review as well as providing a background on the ASP and the process the team took to find security issues. You can read more about the review on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/identity-security/google-amd-partner-to-build-a-more-secure-future-with-confidential-computing&amp;#34;&amp;gt;Google Cloud security blog&amp;lt;/a&amp;gt; and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/AMD_GPZ-Technical_Report_FINAL_05_2022.pdf&amp;#34;&amp;gt;final report&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/05/release-of-technical-report-into-amd.html&amp;#34;&amp;gt;Release of Technical Report into the AMD Security ...&amp;lt;/a&amp;gt; (May)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220510-200108/</link>
      <pubDate>Tue, 10 May 2022 20:01:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220510-200108/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-philosopher-king&amp;#34;&amp;gt;Podcast Episode - The Philosopher King&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220510-043403/</link>
      <pubDate>Tue, 10 May 2022 04:34:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220510-043403/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/02/04/gobby-haskell-and-patch-theory/&amp;#34;&amp;gt;Gobby, Haskell, and patch theory&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220509-174753/</link>
      <pubDate>Mon, 09 May 2022 17:47:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220509-174753/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/crud-with-the-mongodb-node-js-sdk/&amp;#34;&amp;gt;If you are building an app on top of MongoDB and want some help navigating your selectOnes, understanding projections, figuring out the difference(s) between insertMany and bulkWrite, and deciphering other methods they didn’t teach you in SQL class, this tutorial is for you.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220509-172641/</link>
      <pubDate>Mon, 09 May 2022 17:26:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220509-172641/</guid>
      <description>May 9, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/05/09/hare-ssh.html&amp;#34;&amp;gt;Implementing an SSH agent in Hare&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220508-200911/</link>
      <pubDate>Sun, 08 May 2022 20:09:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220508-200911/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/02/13/patch-theory-part-ii-some-basics/&amp;#34;&amp;gt;Patch theory, part II: some basics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220507-201513/</link>
      <pubDate>Sat, 07 May 2022 20:15:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220507-201513/</guid>
      <description>Apple , Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. Experts say the changes should help defeat many types of phishing attacks and ease the overall password burden on Internet users, but caution that a true passwordless future may still be years away for most websites.&amp;lt;br&amp;gt;
Image: Blog.google&amp;lt;br&amp;gt;
The tech giants are part of an industry-led effort to replace passwords, which are easily forgotten, frequently stolen by malware and phishing schemes, or leaked and sold online in the wake of corporate data breaches.&amp;lt;br&amp;gt;
Apple, Google and Microsoft are some of the more active contributors to a passwordless sign-in standard crafted by the FIDO (“Fast Identity Online”) Alliance and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/World_Wide_Web_Consortium&amp;#34;&amp;gt;World Wide Web Consortium&amp;lt;/a&amp;gt; (W3C), groups that have been working with hundreds of tech companies over the past decade to develop a new login standard that works the same way across multiple browsers and operating systems.&amp;lt;br&amp;gt;
According to the FIDO Alliance, users will be able to sign in to websites through the same action that they take multiple times each day to unlock their devices — including a device PIN, or a biometric such as a fingerprint or face scan.&amp;lt;br&amp;gt;
“This new approach protects against phishing and sign-in will be radically more secure when compared to passwords and legacy multi-factor technologies such as one-time passcodes sent over SMS,” the alliance wrote on May 5.&amp;lt;br&amp;gt;
Sampath Srinivas , director of security authentication at Google and president of the FIDO Alliance, said that under the new system your phone will store a FIDO credential called a “passkey” which is used to unlock your online account.&amp;lt;br&amp;gt;
“The passkey makes signing in far more secure, as it’s based on public key cryptography and is only shown to your online account when you unlock your phone,” Srinivas wrote. “To sign into a website on your computer, you’ll just need your phone nearby and you’ll simply be prompted to unlock it for access. Once you’ve done this, you won’t need your phone again and you can sign in by just unlocking your computer.”&amp;lt;br&amp;gt;
As ZDNet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.zdnet.com/article/google-apple-microsoft-make-a-new-commitment-for-a-passwordless-future/&amp;#34;&amp;gt;notes&amp;lt;/a&amp;gt; , Apple, Google and Microsoft already support these passwordless standards (e.g. “Sign in with Google”), but users need to sign in at every website to use the passwordless functionality. Under this new system, users will be able to automatically access their passkey on many of their devices — without having to re-enroll every account — and use their mobile device to sign into an app or website on a nearby device.&amp;lt;br&amp;gt;
Johannes Ullrich , dean of research for the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sans.org&amp;#34;&amp;gt;SANS Technology Institute&amp;lt;/a&amp;gt; , called the announcement “by far the most promising effort to solve the authentication challenge.”&amp;lt;br&amp;gt;
“The most important part of this standard is that it will not require users to buy a new device, but instead they may use devices they already own and know how to use as authenticators,” Ullrich said.&amp;lt;br&amp;gt;
Steve Bellovin , a computer science professor at Columbia University and an early internet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cs.columbia.edu/~smb/&amp;#34;&amp;gt;researcher and pioneer&amp;lt;/a&amp;gt; , called the passwordless effort a “huge advance” in authentication, but said it will take a very long time for many websites to catch up.&amp;lt;br&amp;gt;
Bellovin and others say one potentially tricky scenario in this new passwordless authentication scheme is what happens when someone loses their mobile device, or their phone breaks and they can’t recall their iCloud password.&amp;lt;br&amp;gt;
“I worry about people who can’t afford an extra device, or can’t easily replace a broken or stolen device,” Bellovin said. “I worry about forgotten password recovery for cloud accounts.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/your-phone-may-soon-replace-many-of-your-passwords/#more-59727&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/your-phone-may-soon-replace-many-of-your-passwords/&amp;#34;&amp;gt;Your Phone May Soon Replace Many of Your Passwords&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220507-160922/</link>
      <pubDate>Sat, 07 May 2022 16:09:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220507-160922/</guid>
      <description>Notice that a jewel has a small basin in it. To even further reduce energy losses of the rotating components, a small amount of special oil is placed in that cavity. That oil sticks to the jewel and a shaft that rotates inside it to further decrease the friction, which lets the watch run longer on a single wind, while also reducing wear on the delicate mechanical parts.&amp;lt;br&amp;gt;
As long as the arbor is held, the mainspring can power the rest of the watch – you can see the rotation of the second hand attached to the fourth wheel on the other side of the watch. However, as we let the arbor go the mainspring finds an easy way to release its tension by just turning the arbor back – the spring quickly losses all its stored energy and the watch stops.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220507-122019/</link>
      <pubDate>Sat, 07 May 2022 12:20:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220507-122019/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/07/science/space/astronomy-black-hole-sound.html&amp;#34;&amp;gt;Out There Hear the Weird Sounds of a Black Hole Singing As part of an effort to “sonify” the cosmos, researchers have converted the pressure waves from a black hole into an audible … something. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>the mango zone</title>
      <link>https://www.whatsupup.com/blog/canton/ricketier/20220507-080246/</link>
      <pubDate>Sat, 07 May 2022 08:02:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/canton/ricketier/20220507-080246/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=IWT6Y0YDJUo&amp;#34;&amp;gt;Finding Tony Abbott&amp;#39;s Passport Number and entering the Do Not Get Arrested Challenge 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Feature-length film (50 minutes) in which I go through my Twitter DMs live on stage. Includes a very special segment from Channel 7&amp;amp;#39;s Sunrise.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220507-001556/</link>
      <pubDate>Sat, 07 May 2022 00:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220507-001556/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/06/technology/elon-musk-twitter-pitch-deck.html&amp;#34;&amp;gt;Inside Elon Musk’s Big Plans for Twitter Here’s what Mr. Musk is projecting for Twitter’s finances over the next few years, according to a pitch deck he presented to investors. By Mike Isaac, Lauren Hirsch and Anupreeta Das&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220506-163215/</link>
      <pubDate>Fri, 06 May 2022 16:32:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220506-163215/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/12/11/diagrams-0-6/&amp;#34;&amp;gt;Diagrams 0.6&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>DKB</title>
      <link>https://www.whatsupup.com/blog/niece/anatomized/20220506-162725/</link>
      <pubDate>Fri, 06 May 2022 16:27:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/niece/anatomized/20220506-162725/</guid>
      <description>&amp;lt;p&amp;gt;Writing about technology and society.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dkb.io/post/brave-search-interview&amp;#34;&amp;gt;Interview with Brave Search&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
# search # interview&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dkb.io/post/brave-search-interview&amp;#34;&amp;gt;Most search engines are not independent search engines, and while they may provide some value, they are qualitatively different from what Brave Search is doing. Independence is not something directly actionable, but it’s a fundamental property.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220506-042805/</link>
      <pubDate>Fri, 06 May 2022 04:28:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220506-042805/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;Elon Musk has brought in new investors to fund his Twitter deal, a filing shows. The filing lists a number of investment firms and other backers who will contribute $7 billion to the deal. By Lauren Hirsch, Anupreeta Das, Erin Griffith and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220506-042438/</link>
      <pubDate>Fri, 06 May 2022 04:24:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220506-042438/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-tech-stocks-are-crashing-and&amp;#34;&amp;gt;Why Tech Stocks Are Crashing and Burning&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-tech-stocks-are-crashing-and&amp;#34;&amp;gt;The market seeks profits, not promises, as a hope-fueled bull market sputters.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
3 hr ago&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220506-041726/</link>
      <pubDate>Fri, 06 May 2022 04:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220506-041726/</guid>
      <description>Once the pallet fork unlocks the escape wheel , that wheel has to start spinning very quickly. This is why gears in the gear train have holes in them – it reduces their moment of inertia so that the barrel can accelerate them more quickly.&amp;lt;br&amp;gt;
The teal components can freely slide on the hairspring , but they reduce or increase its effective length as they prevent the tail section of the hairspring from oscillating freely. By adjusting position of these teal components we can modify the duration of a single beat and make the watch run slightly faster or slower. That speed regulation can also be fine-tuned using the screw in the top part – its head is not centered, so when turned it will gently rotate the little teal fork .&amp;lt;br&amp;gt;
Personally, I think this entire mechanism known as the keyless works is a real mechanical marvel. The intricate interactions are so well balanced and each part serves many different roles. Older pocket watches were wound by a separate key, with the crown being used only to set the time, but modern watches get away with not having a winding key, which explains the keyless name. With just a few carefully shaped pieces and a single crown, we can control various settings of the watch. Before we move on, let’s secure the remaining pieces with the minute train bridge :&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220506-041248/</link>
      <pubDate>Fri, 06 May 2022 04:12:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220506-041248/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/02/24/whats-the-right-way-to-quickcheck-floating-point-routines/&amp;#34;&amp;gt;What’s the right way to QuickCheck floating-point routines?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220506-000507/</link>
      <pubDate>Fri, 06 May 2022 00:05:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220506-000507/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/05/05/business/elon-musk-twitter-investors.html&amp;#34;&amp;gt;Elon Musk has brought in new investors to fund his Twitter deal, a filing shows. The filing lists a number of investment firms and others backers who will contribute $7 billion to the deal. By Lauren Hirsch, Anupreeta Das, Erin Griffith and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220505-042853/</link>
      <pubDate>Thu, 05 May 2022 04:28:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220505-042853/</guid>
      <description>An important aspect of two matching gears is their number of teeth. Each tooth in one gear meets with a space between teeth in the other gear, so within a unit of time both gears rotate by the same number of teeth. If the number of teeth in two gears is different, those gears can take a different amount of time to complete a single rotation. In the demonstration below, you can change the ratio of the number of teeth between the driving red gear and the driven yellow gear to see how it affects the speed of rotation of that yellow gear :&amp;lt;br&amp;gt;
We’ll start with the mainplate , which forms the main body of the movement:&amp;lt;br&amp;gt;
This mechanism protects the fragile tips of the balance shaft from breaking when the watch experiences a sudden jerk. Let’s see how these pieces act together when the balance shaft is jolted around:&amp;lt;br&amp;gt;
Personally, I think this entire mechanism known as the keyless works is a real mechanical marvel. The intricate interactions are so well balanced and each part serves many different roles. Older pocket watches were wound by a separate key, with the crown being used only to set the time, but modern watches get away without having a winding key, which explains the keyless name. With just a few carefully shaped pieces and a single crown, we can control various settings of the watch. Before we move on, let’s secure the remaining pieces with the minute train bridge :&amp;lt;br&amp;gt;
Notice that I’m highlighting a pair of yellow and blue gears only when they’re actively transferring power directly from the weight gear to the output gear . Only one such pair is active at a time – the other either spins idly, or acts as an intermediate to change the direction of rotation to make sure the output gear always winds the spring.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amazon.com/Watchmaking-George-Daniels/dp/0856677043&amp;#34;&amp;gt;Watchmaking&amp;lt;/a&amp;gt; by George Daniels is a book dedicated to the process of actually making watches from scratch. While few will endeavor this journey, the publication also explains many of the considerations required when designing a watch movement and its parts. Many of the book’s pages are accompanied by pretty technical illustrations that help to explain the concepts.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220504-160940/</link>
      <pubDate>Wed, 04 May 2022 16:09:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220504-160940/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/mechanical-watch/&amp;#34;&amp;gt;Mechanical Watch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In the world of modern portable devices, it may be hard to believe that merely a few decades ago the most convenient way to keep track of time was a mechanical watch. Unlike their quartz and smart siblings, mechanical watches can run without using any batteries or other electronic components.&amp;lt;br&amp;gt;
Over the course of this article I’ll explain the workings of the mechanism seen in the demonstration below. You can drag the device around to change your viewing angle, and you can use the slider to peek at what’s going on inside:&amp;lt;br&amp;gt;
Loading...&amp;lt;br&amp;gt;
What you see here is known as the movement – the inner part of a mechanical watch that’s usually enclosed in a metal case. In this article I’m focusing on a watch movement itself, since beautiful watch cases merely hide the intricate mechanisms which are the real stars of the show.&amp;lt;br&amp;gt;
The entire watch movement has a lot of parts, and in this blog post I’ll explain the purpose of each one. The world of watchmaking is jargon-heavy, so many of the components may have unfamiliar names, but you shouldn’t feel pressured to remember them – the names and parts will be color-coded for easy reference.&amp;lt;br&amp;gt;
In a functioning watch many parts are in constant motion. By default all animations in this article are enabled, but if you find them distracting, or if you want to save power, you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/&amp;#34;&amp;gt;globally pause&amp;lt;/a&amp;gt; all the following demonstrations.&amp;lt;br&amp;gt;
While the entire watch movement has many parts, the timekeeping system, which forms the core function of any watch, consists of just seven major elements which we can lay out in a straight line:&amp;lt;br&amp;gt;
It may not look like much, but these parts still have a lot of interesting details about them that contribute to the second hand rotating at a correct pace. We’ll start exploring these details by focusing on the source of power for this entire contraption.&amp;lt;br&amp;gt;
Power&amp;lt;br&amp;gt;
Purely mechanical devices have a few different ways to power themselves, but one of the simplest methods to store energy is to use a spring. Most springs we see in daily life are coil springs. In the demonstration below, you can move the mass attached to this type of spring to see it bounce:&amp;lt;br&amp;gt;
When a spring like this is compressed, it stores some energy that is then released when the compressing tension is removed. Mechanical watches typically use a different kind of spring – a spiral torsion spring. This type of spring is loaded when it’s twisted. When let go, the spring unwinds in the opposite direction to eventually settle in its natural state:&amp;lt;br&amp;gt;
In a mechanical watch, we ultimately want to show rotating hands, so a spinning motion that a torsion spring provides is particularly useful. A spring in a typical mechanical watch has a slightly more complicated shape – you can see it below in its relaxed state. By dragging the slider you can try to wind it midair, but as soon as you let go, it will snap back to its original shape:&amp;lt;br&amp;gt;
As you can see, this spring is quite strong and it wants to expand very rapidly. To contain the spring we have to put it in a casing known as a barrel :&amp;lt;br&amp;gt;
Once in the barrel , the spring still wants to expand to its original state, but the barrel’s wall keep it in place. This spring is the storage of energy for the watch and its name, the mainspring , reflects its importance.&amp;lt;br&amp;gt;
Unfortunately, we can’t really get any useful work from the mainspring in this state – it has already expanded to the largest possible size. To store more energy in it we need to wind it tightly using the arbor that we’ll first attach on the inner side of the mainspring :&amp;lt;br&amp;gt;
If you look closely, the mainspring has a little hole near its end – you can see it in the center of the demonstration. The arbor has a little hook that grabs onto that hole:&amp;lt;br&amp;gt;
When the arbor is turned, it pulls the mainspring with it, causing it to wind. In the demonstration below, we’re holding the barrel tight, and you can turn the arbor by dragging the slider:&amp;lt;br&amp;gt;
Notice that as soon as you let go of the arbor by releasing the slider, the mainspring will turn the arbor right back. This is less than desired – we want the barrel to turn instead, so that it can power the other parts of the watch. To get some useful work from the mainspring , we’ll have to keep holding on to the arbor and instead let the barrel go when we want to use the stored energy:&amp;lt;br&amp;gt;
We’ll soon see how this is accomplished in practice, but for now we’ll assume that the arbor is held tight and the mainspring ends up rotating the barrel , just like in the demonstration above. Before we finish up with the mainspring and the barrel , let’s discuss two other details that make this mechanism more reliable. Let me bring up the relaxed spring one more time:&amp;lt;br&amp;gt;
The metal strip attached to the mainspring provides additional tension to its outer part. That metal strip really wants to snap back to its straight shape, so it pushes against the wall of the barrel , creating a lot of friction that keeps the mainspring in place:&amp;lt;br&amp;gt;
This locks the outer end of the mainspring when the arbor moves the inner. If we were to keep winding the spring past its maximum capacity, we’d overpower that friction letting the mainspring slip inside – this acts as a safety mechanism to prevent the parts from breaking.&amp;lt;br&amp;gt;
As we’ve seen, in its relaxed state, the mainspring forms an S-shape with varied curvature throughout. This helps to balance the tension in mainspring’s different sections when it is inside the barrel . Notice that the inner sections of the wound spring have a much smaller radius than the outer parts. If the relaxed spring was just a straight piece of metal, then after winding, the inner parts would be bent much more than the outer parts. With the S-shaped spring the outer sections of the spring are also under a similar tension because they want to get back to their curve that is bent in the opposite direction.&amp;lt;br&amp;gt;
To secure the mainspring and prevent dust from getting in we close the barrel with a lid that snaps into its place:&amp;lt;br&amp;gt;
We’ve managed to make some parts rotate and one could naively think that we could just attach a watch hand to the barrel to make it track time. Unfortunately, that won’t really work – you can witness this in the demonstration below. You can see how this “watch” behaves after you wind the mainspring with the slider and let it go:&amp;lt;br&amp;gt;
We clearly have some work to do – the hand spins way too fast and it only does a few rotations before the mainspring inside the barrel runs out of the stored energy. Clearly, this contraption won’t let us track time in any reliable way.&amp;lt;br&amp;gt;
If we wanted our watch to run continuously for around 40 hours on a single wind, we’d need the minute hand to complete 40 rotations in that time. Moreover, the second hand should cover around 40 × 60 = 2400 complete rotations in that time. We need to find a way to convert a small number of revolutions of the barrel into a large number of revolutions of the hands. This is where gears come in.&amp;lt;br&amp;gt;
Gears&amp;lt;br&amp;gt;
I’ve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/gears/&amp;#34;&amp;gt;talked about gears&amp;lt;/a&amp;gt; on this blog before, so let me just recap things very briefly. Gears can be used to change the speed of rotation between two different axes. In the demonstration below, you can witness that by observing little dots I put on each gear – the yellow gear , which is powered by the bigger red gear , takes much less time to finish a single revolution:&amp;lt;br&amp;gt;
An important aspect of two matching gears it their number of teeth. Each tooth in one gear meets with a space between teeth in the other gear, so within a unit of time both gears rotate by the same number of teeth. If the number of teeth in two gears is different, those gears can take a different amount of time to complete a single rotation. In the demonstration below, you can change the ratio of the number of teeth between the driving red gear and the driven yellow gear to see how it affects the speed of rotation of that yellow gear :&amp;lt;br&amp;gt;
1:2&amp;lt;br&amp;gt;
These gears are intended to work with each other so the ratio of teeth is equivalent to the ratio of the gear radii. When the driving gear has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/&amp;#34;&amp;gt;more teeth&amp;lt;/a&amp;gt; than the driven gear , the driven gear makes more rotations than the driving gear . We can use this behavior to make the second hand of a watch rotate many times on a single rotation of the barrel.&amp;lt;br&amp;gt;
Let’s consider how much of a speed increase we have to do here. The barrel can rotate close to 7 times on a single wind, but we want the second hand to complete around 2400 revolutions in the same time. We need the ratio of teeth, or the ratio of radii, to be around 343:1. Let’s see how that would look in practice. In the demonstration below, you can use the slider to look at the two gears from further away:&amp;lt;br&amp;gt;
As you can see, these proportions are ridiculous – to make the red gear fit in any reasonably sized watch, the yellow gear would have to be absolutely tiny and both gears would have to have very fragile, microscopic teeth.&amp;lt;br&amp;gt;
Instead, mechanical watches use a train of gears with multiple gears working in pairs – each pair increases the speed to some extent. In the demonstration below, you can see the four wheels participating in this reduction. Notice that there are two gears on most axes of rotation. You can control the speed of rotation of this gear train using the slider:&amp;lt;br&amp;gt;
The barrel acts as the first wheel , it drives the second wheel , which drives the third wheel , which finally drives the fourth wheel . Notice that each big gear drives a smaller gear called a pinion . A pinion is mounted on the same shaft as the next big gear so we’re able to keep increasing the speed on each axis. This approach has significant advantages – we’re able to make the overall mechanism much smaller and we’ll soon use one of the intermediate wheels that rotates at a slower rate to drive minute and hour hands.&amp;lt;br&amp;gt;
Before we finish up with gears, let me quickly mention the shape of their teeth. While many bigger machines use an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/gears/#strings-attached&amp;#34;&amp;gt;involute shape&amp;lt;/a&amp;gt; for the profile of their gear teeth, mechanical watches commonly use cycloidal profiles which are obtained by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tec-science.com/mechanical-power-transmission/cycloidal-gear/geometry-of-cycloidal-gears/&amp;#34;&amp;gt;rolling a circle on the surface of another circle&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Let’s see how …</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220503-202422/</link>
      <pubDate>Tue, 03 May 2022 20:24:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220503-202422/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-teaching-ai-its-targets&amp;#34;&amp;gt;Podcast Episode: Teaching AI to its Targets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220503-202310/</link>
      <pubDate>Tue, 03 May 2022 20:23:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220503-202310/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/aapihm-2022&amp;#34;&amp;gt;AAPI Heritage Month at Discord: Celebrating Who We Are&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/safety&amp;#34;&amp;gt;Policy &amp;amp;amp; Safety&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-transparency-report-h2-2021&amp;#34;&amp;gt;Discord Transparency Report: July – December 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/a-focus-on-black-joy-during-black-history-month&amp;#34;&amp;gt;A Focus on Black Joy During Black History Month&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/aapihm-2022&amp;#34;&amp;gt;AAPI Heritage Month at Discord: Celebrating Who We Are&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220503-201212/</link>
      <pubDate>Tue, 03 May 2022 20:12:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220503-201212/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/05/podcast-episode-teaching-ai-its-targets&amp;#34;&amp;gt;Podcast Episode: Teaching AI to its Targets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220503-000937/</link>
      <pubDate>Tue, 03 May 2022 00:09:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220503-000937/</guid>
      <description>Image: Proxima Studios, via Shutterstock.&amp;lt;br&amp;gt;
Faced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage of qualified information technology experts: Forcing tech-savvy people within the nation’s prison population to perform low-cost IT work for domestic companies.&amp;lt;br&amp;gt;
Multiple Russian news outlets published stories on April 27 saying the Russian Federal Penitentiary Service had announced a plan to recruit IT specialists from Russian prisons to work remotely for domestic commercial companies.&amp;lt;br&amp;gt;
Russians sentenced to forced labor will serve out their time at one of many correctional centers across dozens of Russian regions, usually at the center that is closest to their hometown. Alexander Khabarov , deputy head of Russia’s penitentiary service, said his agency had received proposals from businessmen in different regions to involve IT specialists serving sentences in correctional centers to work remotely for commercial companies.&amp;lt;br&amp;gt;
Khabarov told Russian media outlets that under the proposal people with IT skills at these facilities would labor only in IT-related roles, but would not be limited to working with companies in their own region.&amp;lt;br&amp;gt;
“We are approached with this initiative in a number of territories, in a number of subjects by entrepreneurs who work in this area,” Khabarov told &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.rbc.ru/society/27/04/2022/626914459a7947739ffe8d31&amp;#34;&amp;gt;Russian state media organization TASS&amp;lt;/a&amp;gt; . “We are only at the initial stage. If this is in demand, and this is most likely in demand, we think that we will not force specialists in this field to work in some other industries.”&amp;lt;br&amp;gt;
According to Russian media site Lenta.ru, since March 21 nearly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lenta.ru/news/2022/04/04/vaccc/&amp;#34;&amp;gt;95,000 vacancies in IT have remained unfilled in Russia&amp;lt;/a&amp;gt; . Lenta says the number unfilled job slots actually shrank 25 percent from the previous month, officially because “many Russian companies are currently reviewing their plans and budgets, and some projects have been postponed.” The story fails to even mention the recent economic sanctions that are currently affecting many Russian companies thanks to Russia’s invasion of Ukraine in late February. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/russia-to-rent-tech-savvy-prisoners-to-corporate-it/#more-59685&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/05/russia-to-rent-tech-savvy-prisoners-to-corporate-it/&amp;#34;&amp;gt;Russia to Rent Tech-Savvy Prisoners to Corporate IT?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220502-180427/</link>
      <pubDate>Mon, 02 May 2022 18:04:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220502-180427/</guid>
      <description>Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after Google rolled out a new policy enabling people under the age of 18 (or a parent/guardian) to request removal of their images from Google search results.&amp;lt;br&amp;gt;
Google has for years accepted requests to remove certain sensitive data such as bank account or credit card numbers from search results. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/search/new-options-for-removing-your-personally-identifiable-information-from-search/&amp;#34;&amp;gt;a blog post on Wednesday&amp;lt;/a&amp;gt; , Google’s Michelle Chang wrote that the company’s expanded policy now allows for the removal of additional information that may pose a risk for identity theft, such as confidential log-in credentials, email addresses and phone numbers when it appears in Search results.&amp;lt;br&amp;gt;
“When we receive removal requests, we will evaluate all content on the web page to ensure that we’re not limiting the availability of other information that is broadly useful, for instance in news articles,” Chang wrote. “We’ll also evaluate if the content appears as part of the public record on the sites of government or official sources. In such cases, we won’t make removals.”&amp;lt;br&amp;gt;
While Google’s removal of a search result from its index will do nothing to remove the offending content from the site that is hosting it, getting a link decoupled from Google search results is going to make the content at that link far less visible. According to recent estimates, Google enjoys somewhere near 90 percent market share in search engine usage.&amp;lt;br&amp;gt;
KrebsOnSecurity decided to test this expanded policy with what would appear to be a no-brainer request: I asked Google to remove search result for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=briansclub&amp;#34;&amp;gt;BriansClub&amp;lt;/a&amp;gt; , one of the largest (if not THE largest) cybercrime stores for selling stolen payment card data.&amp;lt;br&amp;gt;
BriansClub has long abused my name and likeness to pimp its wares on the hacking forums. Its homepage includes a copy of my credit report, Social Security card, phone bill, and a fake but otherwise official looking government ID card. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/you-can-now-ask-google-to-remove-your-phone-number-email-or-address-from-search-results/#more-59639&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/you-can-now-ask-google-to-remove-your-phone-number-email-or-address-from-search-results/&amp;#34;&amp;gt;You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220502-175640/</link>
      <pubDate>Mon, 02 May 2022 17:56:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220502-175640/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-01213-0&amp;#34;&amp;gt;Costly SOFIA telescope faces termination after years of problems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
NASA and the German space agency ground the telescope on a plane, citing the astronomy community’s concerns over cost and productivity.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220502-174936/</link>
      <pubDate>Mon, 02 May 2022 17:49:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220502-174936/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/evaluating-elon-musks-plan-to-fix&amp;#34;&amp;gt;Evaluating Elon Musk’s Plan To Fix Twitter&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/evaluating-elon-musks-plan-to-fix&amp;#34;&amp;gt;Alex Roetter, who once ran Twitter engineering, evaluates the feasibility of Musk’s proposals.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220502-174541/</link>
      <pubDate>Mon, 02 May 2022 17:45:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220502-174541/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/30/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;How Twitter’s Board Went From Fighting Elon Musk to Accepting Him It’s highly unusual to move from a “poison pill” to a $44 billion deal in under two weeks. But Twitter’s board ran out of options. By Lauren Hirsch and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Deprocrastination Blog - Guides and digital tools on how to stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220502-173720/</link>
      <pubDate>Mon, 02 May 2022 17:37:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220502-173720/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-boost-your-attention-span&amp;#34;&amp;gt;How to boost your attention span: 6 tips and tricks&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-not-to-get-overwhelmed-by-tasks&amp;#34;&amp;gt;How not to get overwhelmed by tasks&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-increase-your-attention-span-5-key-strategies&amp;#34;&amp;gt;How to increase your attention span: 5 key strategies&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/learn-to-tolerate-discomfort-or-suffer-escaping-from-it&amp;#34;&amp;gt;Learn to tolerate discomfort or suffer escaping from it&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;#39;t scrolling or watching&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220429-081148/</link>
      <pubDate>Fri, 29 Apr 2022 08:11:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220429-081148/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/DuallyNoted_CHI22.pdf&amp;#34;&amp;gt;Dually Noted: Layout-Aware Annotations with Smartphone Augmented Reality&amp;lt;/a&amp;gt; Jing Qian, Qi Sun, Curtis Wigington, Han L. Han, Tong Sun, Jennifer Healey, James Tompkin, Jeff Huang CHI 2022&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Readability_TOCHI22.pdf&amp;#34;&amp;gt;Towards Individuated Reading Experiences: Different Fonts Increase Reading Speed for Different Individuals&amp;lt;/a&amp;gt; Shaun Wallace, Zoya Bylinskii, Jonathan Dobres, Bernard Kerr, Sam Berlow, Rick Treitman, Nirmal Kumawat, Kathleen Arpin, Dave B. Miller, Jeff Huang, Ben D. Sawyer TOCHI (Transactions on Computer-Human Interaction)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220429-041746/</link>
      <pubDate>Fri, 29 Apr 2022 04:17:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220429-041746/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/best-practices-for-building-crud-endpoints/&amp;#34;&amp;gt;If this is your first (or maybe second) time building CRUD endpoints, here are some non-intuitive best practices to follow around URL naming, which HTTP methods to use, and how to handle versioning.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220429-001948/</link>
      <pubDate>Fri, 29 Apr 2022 00:19:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220429-001948/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-01213-0&amp;#34;&amp;gt;Costly telescope-on-a-plane finally faces termination after years of problems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
NASA and the German Space Agency ground the SOFIA observatory, citing community concerns over cost and productivity.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220428-200915/</link>
      <pubDate>Thu, 28 Apr 2022 20:09:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220428-200915/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/the-package-analysis-project-scalable.html&amp;#34;&amp;gt;The Package Analysis Project: Scalable detection of malicious open source packages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Caleb Brown, Open Source Security Team&amp;lt;br&amp;gt;
Despite open source software’s essential role in all software built today, it’s far too easy for bad actors to circulate malicious packages that attack the systems and users running that software. Unlike mobile app stores that can scan for and reject malicious contributions, package repositories have limited resources to review the thousands of daily updates and must maintain an open model where anyone can freely contribute. As a result, malicious packages like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/advisories/GHSA-pjwm-rvh2-c87w&amp;#34;&amp;gt;ua-parser-js&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://snyk.io/blog/peacenotwar-malicious-npm-node-ipc-package-vulnerability/&amp;#34;&amp;gt;node-ipc&amp;lt;/a&amp;gt; are regularly uploaded to popular repositories despite their best efforts, with sometimes devastating consequences for users. Google, a member of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://openssf.org/&amp;#34;&amp;gt;Open Source Security Foundation&amp;lt;/a&amp;gt; (OpenSSF), is proud to support the OpenSSF’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://openssf.org/blog/2022/04/28/introducing-package-analysis-scanning-open-source-packages-for-malicious-behavior&amp;#34;&amp;gt;Package Analysis project,&amp;lt;/a&amp;gt; which is a welcome step toward helping secure the open source packages we all depend on. The Package Analysis program performs dynamic analysis of all packages uploaded to popular open source repositories and catalogs the results in a BigQuery table. By detecting malicious activities and alerting consumers to suspicious behavior before they select packages, this program contributes to a more secure software supply chain and greater trust in open source software. The program also gives insight into the types of malicious packages that are most common at any given time, which can guide decisions about how to better protect the ecosystem. To better understand how the Package Analysis program is contributing to supply chain security, we analyzed the nearly 200 malicious packages it captured over a one-month period. Here’s what we discovered:&amp;lt;br&amp;gt;
Results&amp;lt;br&amp;gt;
All signals collected are published in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://console.cloud.google.com/bigquery?d=packages&amp;amp;p=ossf-malware-analysis&amp;amp;t=analysis&amp;amp;page=table&amp;#34;&amp;gt;BigQuery table&amp;lt;/a&amp;gt; . Using simple queries on this table, we found around 200 meaningful results from the packages uploaded to NPM and PyPI in a period of just over a month. Here are some notable examples, with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/package-analysis/blob/main/docs/case_studies.md&amp;#34;&amp;gt;more available in the repository&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
PyPI: discordcmd&amp;lt;br&amp;gt;
This Python package will attack the desktop client for Discord on Windows. It was found by spotting the unusual requests to raw.githubusercontent.com, Discord API, and ipinfo.io. First, it downloaded a backdoor from GitHub and installed it into the Discord electron client.&amp;lt;br&amp;gt;
Next, it looked through various local databases for the user&amp;amp;#39;s Discord token.&amp;lt;br&amp;gt;
Finally, it grabbed the data associated with the token from the Discord API and exfiltrated it back to a Discord server controlled by the attacker.&amp;lt;br&amp;gt;
NPM: @roku-web-core/ajax&amp;lt;br&amp;gt;
During install, this NPM package exfiltrates details of the machine it is running on and then opens a reverse shell, allowing the remote execution of commands.&amp;lt;br&amp;gt;
This package was discovered from its requests to an attacker-controlled address.&amp;lt;br&amp;gt;
Dependency Confusion / Typosquatting&amp;lt;br&amp;gt;
The vast majority of the malicious packages we detected are dependency confusion and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.darkreading.com/vulnerabilities-threats/beware-the-package-typosquatting-supply-chain-attack&amp;#34;&amp;gt;typosquatting attacks&amp;lt;/a&amp;gt; . The packages we found usually contain a simple script that runs during an install and calls home with a few details about the host. These packages are most likely the work of security researchers looking for bug bounties, since most are not exfiltrating meaningful data except the name of the machine or a username, and they make no attempt to disguise their behavior. These dependency confusion attacks were discovered through the domains they used, such as burpcollaborator.net, pipedream.com, interact.sh, which are commonly used for reporting back attacks. The same domains appear across unrelated packages and have no apparent connection to the packages themselves. Many packages also used unusual version numbers that were high (e.g. v5.0.0, v99.10.9) for a package with no previous versions.&amp;lt;br&amp;gt;
Conclusions&amp;lt;br&amp;gt;
The short time frame and low sophistication needed for finding the results above underscore the challenge facing open source package repositories. While many of the results above were likely the work of security researchers, any one of these packages could have done far more to hurt the unfortunate victims who installed them. These results show the clear need for more investment in vetting packages being published in order to keep users safe. This is a growing space, and having an open standard for reporting would help centralize analysis results and offer consumers a trusted place to assess the packages they’re considering using. Creating an open standard should also foster healthy competition, promote integration, and raise the overall security of open source packages.&amp;lt;br&amp;gt;
Over time we hope that the Package Analysis program will offer comprehensive knowledge about the behavior and capabilities of packages across open source software, and help guide the future efforts needed to make the ecosystem more secure for everyone. To get involved, please check out the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/package-analysis&amp;#34;&amp;gt;GitHub Project&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/package-analysis/milestones&amp;#34;&amp;gt;Milestones&amp;lt;/a&amp;gt; for opportunities to contribute.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220428-200432/</link>
      <pubDate>Thu, 28 Apr 2022 20:04:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220428-200432/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/mdn-plus-now-available-in-more-markets/&amp;#34;&amp;gt;MDN Plus now available in more countries&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220428-162130/</link>
      <pubDate>Thu, 28 Apr 2022 16:21:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220428-162130/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/common-voice-dataset-tops-20000-hours/&amp;#34;&amp;gt;Common Voice dataset tops 20,000 hours →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/common-voice-dataset-tops-20000-hours/&amp;#34;&amp;gt;Common Voice dataset tops 20,000 hours&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The latest Common Voice dataset, released today, has achieved a major milestone: More than 20,000 hours of open-source speech data that anyone, anywhere can use. The dataset has nearly doubled in the past year. Mozilla’s Common Voice seeks to change the language technology ecosystem by supporting communities to collect voice data for the creation of voice-enabled applications for their own languages.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220428-161210/</link>
      <pubDate>Thu, 28 Apr 2022 16:12:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220428-161210/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/28/technology/twitter-first-quarter-earnings-elon-musk.html&amp;#34;&amp;gt;Twitter reports growth in revenue and users as Elon Musk prepares to take over. The social media company reported a 16 percent jump in daily active users from a year ago. By Mike Isaac and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20220428-122039/</link>
      <pubDate>Thu, 28 Apr 2022 12:20:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20220428-122039/</guid>
      <description>&amp;lt;p&amp;gt;Founder and Editor-at-Large&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you&amp;#34;&amp;gt;Pixel Hunt Applied for Student Aid Online? Facebook Saw You The FAFSA form included code that sent personal information back to Facebook April 28, 2022 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2022/04/28/how-we-built-a-meta-pixel-inspector&amp;#34;&amp;gt;Show Your Work Pixel Hunt How We Built a Meta Pixel Inspector The first large-scale, crowdsourced study that monitors how Meta tracks people across the internet April 28, 2022 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220428-121438/</link>
      <pubDate>Thu, 28 Apr 2022 12:14:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220428-121438/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/mdn-plus-now-available-in-more-markets/&amp;#34;&amp;gt;MDN Plus now available in more markets →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/mdn-plus-now-available-in-more-markets/&amp;#34;&amp;gt;MDN Plus now available in more markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Almost a month ago, we announced MDN Plus, a new premium service on MDN that allows users to customize their experience on the website.
&amp;lt;p&amp;gt;We are very glad to announce today that it is now possible for MDN users around the globe to create an MDN Plus free account, no matter where they are.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220428-002543/</link>
      <pubDate>Thu, 28 Apr 2022 00:25:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220428-002543/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/27/technology/twitter-elon-musk-news/in-tweets-musk-takes-aim-at-twitter-executives-creating-outrage&amp;#34;&amp;gt;In tweets, Musk takes aim at Twitter executives, creating outrage. This was featured in live coverage. By Erin Woo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220428-000100/</link>
      <pubDate>Thu, 28 Apr 2022 00:00:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220428-000100/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;Product &amp;amp;amp; Features&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/slash-commands-permissions-discord-apps-bots&amp;#34;&amp;gt;Permission to Slash, Granted: Introducing Slash Command Permissions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/slash-commands-permissions-discord-apps-bots&amp;#34;&amp;gt;Permission to Slash, Granted: Introducing Slash Command Permissions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220427-201650/</link>
      <pubDate>Wed, 27 Apr 2022 20:16:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220427-201650/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;Product &amp;amp;amp; Features&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/slash-commands-permissions-discord-apps-bots&amp;#34;&amp;gt;Permission to Slash, Granted: Introducing Role Permissions for Slash Commands&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/calixta-guide-to-navigating-the-voice-acting-industry&amp;#34;&amp;gt;Calixta’s Guide to Navigating the Voice Acting Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/safety&amp;#34;&amp;gt;Policy &amp;amp;amp; Safety&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/important-policy-updates&amp;#34;&amp;gt;Important Policy Updates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/engineering&amp;#34;&amp;gt;Engineering &amp;amp;amp; Design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/how-data-science-informs-strategy-innovation-at-discord&amp;#34;&amp;gt;How Data Science Informs Strategy &amp;amp;amp; Innovation at Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;Product &amp;amp;amp; Features&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/playstation-discord-account-connection-linking-game-status&amp;#34;&amp;gt;PlayStation® x Discord: Connect Your Account and Show What You’re Playing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/safety&amp;#34;&amp;gt;Policy &amp;amp;amp; Safety&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-pta-collaboration-announcement-educators-parents&amp;#34;&amp;gt;Parents &amp;amp;amp; Educators, join us on Discord!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/company&amp;#34;&amp;gt;Discord HQ&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/sourcery-at-discord-the-team-who-finds-new-discord-employees&amp;#34;&amp;gt;Sourcery at Discord: The Team Who Finds New Discord Employees&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-profile-tips-from-design-professionals&amp;#34;&amp;gt;Make Your Discord Profile Shine: Profile Pointers from Design Pros&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/company&amp;#34;&amp;gt;Discord HQ&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-welcomes-elizabeth-hamren-as-new-coo&amp;#34;&amp;gt;Discord Welcomes Elizabeth Hamren as new COO&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
COLLECTION&amp;lt;br&amp;gt;
Product &amp;amp;amp; Features&amp;lt;br&amp;gt;
Announcements, new features, and general info about the Discord app.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/category/product&amp;#34;&amp;gt;View Collection&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/slash-commands-permissions-discord-apps-bots&amp;#34;&amp;gt;Permission to Slash, Granted: Introducing Role Permissions for Slash Commands&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/3-months-free-picsart-gold-discord-nitro-promo&amp;#34;&amp;gt;Starting Now, Nitro Users Get 3 Months of Picsart Gold&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/a-note-on-upcoming-community-experiments&amp;#34;&amp;gt;Testing 1-2-3: A Note on Upcoming Community Experiments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/playstation-discord-account-connection-linking-game-status&amp;#34;&amp;gt;PlayStation® x Discord: Connect Your Account and Show What You’re Playing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Community&amp;lt;br&amp;gt;
Stories, spotlights, and behind the scenes from the heart and soul of Discord: the community.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/calixta-guide-to-navigating-the-voice-acting-industry&amp;#34;&amp;gt;Calixta’s Guide to Navigating the Voice Acting Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/a-focus-on-black-joy-during-black-history-month&amp;#34;&amp;gt;A Focus on Black Joy During Black History Month&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/snowsgiving-2021&amp;#34;&amp;gt;Snowsgiving 2021 Has Ended — See How You Made It Truly Special&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-profile-tips-from-design-professionals&amp;#34;&amp;gt;Make Your Discord Profile Shine: Profile Pointers from Design Pros&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Resources &amp;amp;amp; Education&amp;lt;br&amp;gt;
Tutorials and guides to help with Discord and other topics of interest.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/starting-your-first-discord-server&amp;#34;&amp;gt;Starting Your First Discord Server&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discussing-latinx-heritage-month-with-discord-hispanic-erg-la-cafeteria&amp;#34;&amp;gt;Discussing Latinx Heritage Month with Discord’s Latinx ERG: La Cafetería&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/ten-tips-to-help-your-college-club-bloom-on-discord&amp;#34;&amp;gt;Ten Tips to Help Your College Club Bloom on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Discord HQ&amp;lt;br&amp;gt;
General company updates about what Discord is up to at HQ.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/sourcery-at-discord-the-team-who-finds-new-discord-employees&amp;#34;&amp;gt;Sourcery at Discord: The Team Who Finds New Discord Employees&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-welcomes-elizabeth-hamren-as-new-coo&amp;#34;&amp;gt;Discord Welcomes Elizabeth Hamren as new COO&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/new-discord-merch-store&amp;#34;&amp;gt;Introducing @everyone and @here Discord Merch — New Store Swag&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/how-the-cord-club-interns-made-their-mark-on-discord&amp;#34;&amp;gt;How the Cord Club Interns Made Their Mark on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Policy &amp;amp;amp; Safety&amp;lt;br&amp;gt;
General tips and insights from Discord&amp;amp;#39;s Policy &amp;amp;amp; Safety teams who enable users and communities to be safe on the platform.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/discord-transparency-report-h2-2021&amp;#34;&amp;gt;Discord Transparency Report: July – December 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/addressing-health-misinformation&amp;#34;&amp;gt;Addressing Health Misinformation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/important-policy-updates&amp;#34;&amp;gt;Important Policy Updates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/addressing-harmful-off-platform-behavior&amp;#34;&amp;gt;Addressing Harmful Off-Platform Behavior&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Engineering &amp;amp;amp; Design&amp;lt;br&amp;gt;
In-depth analysis and thought process on engineering and design challenges.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/how-data-science-informs-strategy-innovation-at-discord&amp;#34;&amp;gt;How Data Science Informs Strategy &amp;amp;amp; Innovation at Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/why-and-how-discord-uses-patch-to-test-elixir&amp;#34;&amp;gt;Why and How Discord Uses Patch to Test Elixir&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/how-discord-creates-insights-from-trillions-of-data-points&amp;#34;&amp;gt;How Discord Creates Insights from Trillions of Data Points&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog/building-open-source-design-tools-to-improve-discords-design-workflow&amp;#34;&amp;gt;Building open-source design tools to improve Discord’s design workflow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Imagine a place&amp;lt;br&amp;gt;
Product&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/download&amp;#34;&amp;gt;Download&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/why-discord-is-different&amp;#34;&amp;gt;Why Discord&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/inspiration&amp;#34;&amp;gt;Inspiration&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/college&amp;#34;&amp;gt;College&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/nitro&amp;#34;&amp;gt;Nitro&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discordstatus.com/&amp;#34;&amp;gt;Status&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Company&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/company&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/jobs&amp;#34;&amp;gt;Jobs&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/branding&amp;#34;&amp;gt;Branding&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/newsroom&amp;#34;&amp;gt;Newsroom&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discordmerch.com/&amp;#34;&amp;gt;Store&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Resources&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.discord.com/hc/en-us&amp;#34;&amp;gt;Support&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/safety&amp;#34;&amp;gt;Safety&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/blog&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://feedback.discord.com/&amp;#34;&amp;gt;Feedback&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/partners&amp;#34;&amp;gt;Partners&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/verification&amp;#34;&amp;gt;Verification&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/developers/docs&amp;#34;&amp;gt;Developers&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/streamkit&amp;#34;&amp;gt;StreamKit&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/open-source&amp;#34;&amp;gt;Open Source&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/moderation&amp;#34;&amp;gt;Moderation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Policies&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/terms&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/privacy&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/guidelines&amp;#34;&amp;gt;Guidelines&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/acknowledgements&amp;#34;&amp;gt;Acknowledgements&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/licenses&amp;#34;&amp;gt;Licenses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.com/register&amp;#34;&amp;gt;Sign up&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220427-201527/</link>
      <pubDate>Wed, 27 Apr 2022 20:15:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220427-201527/</guid>
      <description>When KrebsOnSecurity recently explored how cybercriminals were using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&amp;#34;&amp;gt;hacked email accounts at police departments worldwide&amp;lt;/a&amp;gt; to obtain warrantless Emergency Data Requests (EDRs) from social media firms and technology providers, many security experts called it a fundamentally unfixable problem. But don’t tell that to Matt Donahue , a former FBI agent who recently quit the agency to launch a startup that aims to help tech companies do a better job screening out phony law enforcement data requests — in part by assigning trustworthiness or “credit ratings” to law enforcement authorities worldwide.&amp;lt;br&amp;gt;
A sample Kodex dashboard. Image: Kodex.us.&amp;lt;br&amp;gt;
Donahue is co-founder of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kodex.us/&amp;#34;&amp;gt;Kodex&amp;lt;/a&amp;gt; , a company formed in February 2021 that builds security portals designed to help tech companies “manage information requests from government agencies who contact them, and to securely transfer data &amp;amp;amp; collaborate against abuses on their platform.”&amp;lt;br&amp;gt;
The 30-year-old Donahue said he left the FBI in April 2020 to start Kodex because it was clear that social media and technology companies needed help validating the increasingly large number of law enforcement requests domestically and internationally.&amp;lt;br&amp;gt;
“So much of this is such an antiquated, manual process,” Donahue said of his perspective gained at the FBI. “In a lot of cases we’re still sending faxes when more secure and expedient technologies exist.”&amp;lt;br&amp;gt;
Donahue said when he brought the subject up with his superiors at the FBI, they would kind of shrug it off, as if to say, “This is how it’s done and there’s no changing it.”&amp;lt;br&amp;gt;
“My bosses told me I was committing career suicide doing this, but I genuinely believe fixing this process will do more for national security than a 20-year career at the FBI,” he said. “This is such a bigger problem than people give it credit for, and that’s why I left the bureau to start this company.”&amp;lt;br&amp;gt;
One of the stated goals of Kodex is to build a scoring or reputation system for law enforcement personnel who make these data requests. After all, there are tens of thousands of police jurisdictions around the world — including roughly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Law_enforcement_in_the_United_States#:~:text=There%20are%2017%2C985%20U.S.%20police,and%20federal%20law%20enforcement%20agencies.&amp;#34;&amp;gt;18,000 in the United States alone&amp;lt;/a&amp;gt; — and all it takes for hackers to abuse the EDR process is illicit access to a single police email account.&amp;lt;br&amp;gt;
Kodex is trying to tackle the problem of fake EDRs by working directly with the data providers to pool information about police or government officials submitting these requests, and hopefully making it easier for all customers to spot an unauthorized EDR.&amp;lt;br&amp;gt;
Kodex’s first big client was cryptocurrency giant Coinbase , which confirmed their partnership but otherwise declined to comment for this story. Twilio confirmed it uses Kodex’s technology for law enforcement requests destined for any of its business units, but likewise declined to comment further.&amp;lt;br&amp;gt;
Within their own separate Kodex portals, Twilio can’t see requests submitted to Coinbase, or vice versa. But each can see if a law enforcement entity or individual tied to one of their own requests has ever submitted a request to a different Kodex client, and then drill down further into other data about the submitter, such as Internet address(es) used, and the age of the requestor’s email address.&amp;lt;br&amp;gt;
Donahue said in Kodex’s system, each law enforcement entity is assigned a credit rating, wherein officials who have a long history of sending valid legal requests will have a higher rating than someone sending an EDR for the first time.&amp;lt;br&amp;gt;
“In those cases, we warn the customer with a flash on the request when it pops up that we’re allowing this to come through because the email was verified [as being sent from a valid police or government domain name], but we’re trying to verify the emergency situation for you, and we will change that rating once we get new information about the emergency,” Donahue said.&amp;lt;br&amp;gt;
“This way, even if one customer gets a fake request, we’re able to prevent it from happening to someone else,” he continued. “In a lot of cases with fake EDRs, you can see the same email [address] being used to message different companies for data. And that’s the problem: So many companies are operating in their own silos and are not able to share information about what they’re seeing, which is why we’re seeing scammers exploit this good faith process of EDRs.”&amp;lt;br&amp;gt;
NEEDLES IN THE HAYSTACK&amp;lt;br&amp;gt;
As social media and technology platforms have grown over the years, so have the volumes of requests from law enforcement agencies worldwide for user data. For example, in its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.verizon.com/about/investors/transparency-report&amp;#34;&amp;gt;latest transparency report&amp;lt;/a&amp;gt; mobile giant Verizon reported receiving 114,000 data requests of all types from U.S. law enforcement entities in the second half of 2021.&amp;lt;br&amp;gt;
Verizon said approximately 35,000 of those requests (~30 percent) were EDRs , and that it provided data in roughly 91 percent of those cases. The company doesn’t disclose how many EDRs came from foreign law enforcement entities during that same time period. Verizon currently asks law enforcement officials to send these requests via fax.&amp;lt;br&amp;gt;
Validating legal requests by domain name may be fine for data demands that include documents like subpoenas and search warrants, which can be validated with the courts. But not so for EDRs, which largely bypass any official review and do not require the requestor to submit any court-approved documents .&amp;lt;br&amp;gt;
Police and government authorities can legitimately request EDRs to learn the whereabouts or identities of people who have posted online about plans to harm themselves or others, or in other exigent circumstances such as a child abduction or abuse, or a potential terrorist attack.&amp;lt;br&amp;gt;
But as KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&amp;#34;&amp;gt;reported in March&amp;lt;/a&amp;gt; , it is now clear that crooks have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using illicit access to hacked police email accounts, the attackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.&amp;lt;br&amp;gt;
In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR — and potentially having someone’s blood on their hands — or possibly leaking a customer record to the wrong person. That might explain why the compliance rate for EDRs is usually quite high — often upwards of 90 percent.&amp;lt;br&amp;gt;
Fake EDRs have become such a reliable method in the cybercrime underground for obtaining information about account holders that several cybercriminals have started offering services that will submit these fraudulent EDRs on behalf of paying clients to a number of top social media and technology firms. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/#more-59232&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/&amp;#34;&amp;gt;Fighting Fake EDRs With ‘Credit Ratings’ for Police&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220427-162015/</link>
      <pubDate>Wed, 27 Apr 2022 16:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220427-162015/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-we-fought-bad-apps-and-developers.html&amp;#34;&amp;gt;How we fought bad apps and developers in 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Steve Kafka and Khawaja Shams, Android Security and Privacy Team&amp;lt;br&amp;gt;
Providing a safe experience to billions of users continues to be one of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2022/03/privacy-and-security-direction.html&amp;#34;&amp;gt;highest priorities&amp;lt;/a&amp;gt; for Google Play. Last year we introduced multiple privacy focused features, enhanced our protections against bad apps and developers, and improved &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Software_development_kit&amp;#34;&amp;gt;SDK&amp;lt;/a&amp;gt; data safety. In addition, Google Play Protect continues to scan billions of installed apps each day across billions of devices to keep people safe from malware and unwanted software.&amp;lt;br&amp;gt;
We continue to enhance our machine learning systems and review processes, and in 2021 we blocked 1.2 million policy violating apps from being published on Google Play, preventing billions of harmful installations. We also continued in our efforts to combat malicious and spammy developers, banning 190k bad accounts in 2021. In addition, we have closed around 500k developer accounts that are inactive or abandoned.&amp;lt;br&amp;gt;
In May we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2021/05/new-safety-section-in-google-play-will.html&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; our new Data safety section for Google Play where developers will be required to give users deeper insight into the privacy and security practices of the apps they download, and provide transparency into the data the app may collect and why. The Data safety section &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/google-play/data-safety/&amp;#34;&amp;gt;launched&amp;lt;/a&amp;gt; this week, and developers are required to complete this section for their apps by July 20th.&amp;lt;br&amp;gt;
We’ve also invested in making life easier for our developers. We added the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://play.google.com/console/about/policystatus/&amp;#34;&amp;gt;Policy and Programs&amp;lt;/a&amp;gt; section to Google Play Console to help developers manage all their app compliance issues in one central location. This includes the ability to appeal a decision and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/googleplay/android-developer/answer/9842754?hl=en&amp;#34;&amp;gt;track its status&amp;lt;/a&amp;gt; from this page.&amp;lt;br&amp;gt;
In addition, we continued to partner with SDK developers to improve app safety, limit how user data is shared, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/googleplay/android-developer/answer/10358880&amp;#34;&amp;gt;improve lines of communication with app developers&amp;lt;/a&amp;gt; . SDKs provide functionality for app developers, but it can sometimes be tricky to know when an SDK is safe to use. Last year, we engaged with SDK developers to build a safer Android and Google Play ecosystem. As a result of this work, SDK developers have improved the safety of SDKs used by hundreds of thousands of apps impacting billions of users. This remains a huge investment area for our team, and we will continue in our efforts to make SDKs safer across the ecosystem.&amp;lt;br&amp;gt;
Limiting access&amp;lt;br&amp;gt;
The best way to ensure users&amp;amp;#39; data stays safe is to limit access to it in the first place.&amp;lt;br&amp;gt;
As a result of new platform protections and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/googleplay/android-developer/answer/10467955&amp;#34;&amp;gt;policies&amp;lt;/a&amp;gt; , developer collaboration and education, 98% of apps migrating to Android 11 or higher have reduced their access to sensitive APIs and user data. We&amp;amp;#39;ve also significantly reduced the unnecessary, dangerous, or disallowed use of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/googleplay/android-developer/answer/10964491?hl=en#:~:text=Google%20Play%20permits%20the%20use,that%20they%20are%20accessibility%20tools.&amp;#34;&amp;gt;Accessibility APIs&amp;lt;/a&amp;gt; in apps migrating to Android 12, while preserving the functionality of legitimate use cases.&amp;lt;br&amp;gt;
We also continued in our commitment to make Android a great place for families. Last year we disallowed the collection of Advertising ID (AAID) and other device identifiers from all users in apps solely targeting children, and gave all users the ability to delete their Advertising ID entirely, regardless of the app.&amp;lt;br&amp;gt;
Pixel enhancements&amp;lt;br&amp;gt;
For Pixel users, we had even more great features to help keep you safe. Our new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html&amp;#34;&amp;gt;Security hub&amp;lt;/a&amp;gt; helps protect your phone, apps, Google Account, and passwords by giving you a central view of your device’s current configuration. Security hub also provides recommendations to improve your security, helping you decide what settings best meet your needs.&amp;lt;br&amp;gt;
In addition, Pixels now use new machine learning models that improve the detection of malware in Google Play Protect. The detection runs on your Pixel, and uses a privacy preserving technology called federated analytics to discover bad apps.&amp;lt;br&amp;gt;
Our global teams are dedicated to keeping our billions of users safe, and look forward to many exciting announcements in 2022.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Not Found – Medium</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220427-081434/</link>
      <pubDate>Wed, 27 Apr 2022 08:14:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220427-081434/</guid>
      <description>Oops! We couldn’t find that page.&amp;lt;br&amp;gt;
Sorry about that.&amp;lt;br&amp;gt;
Refresh the page, check &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.statuspage.io/&amp;#34;&amp;gt;Medium’s site status&amp;lt;/a&amp;gt; , or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/browse/top&amp;#34;&amp;gt;find something interesting to read&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220427-001640/</link>
      <pubDate>Wed, 27 Apr 2022 00:16:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220427-001640/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/26/business/twitter-elon-musk-news/twitter-musk-breakup-fee&amp;#34;&amp;gt;Elon Musk’s deal for Twitter includes a $1 billion breakup fee. Twitter would have to pay if it signed a deal with another suitor. Mr. Musk would have to pay if his financing falls apart. By Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20220427-001350/</link>
      <pubDate>Wed, 27 Apr 2022 00:13:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20220427-001350/</guid>
      <description>Everything you need to know about car APIs. Delivered monthly.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220426-161639/</link>
      <pubDate>Tue, 26 Apr 2022 16:16:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220426-161639/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/business/twitter-parag-agrawal-musk.html&amp;#34;&amp;gt;How Twitter’s staff reacted at a meeting after the announcement. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220426-121359/</link>
      <pubDate>Tue, 26 Apr 2022 12:13:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220426-121359/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Archive - Big Technology</title>
      <link>https://www.whatsupup.com/blog/relational/steak/20220426-081449/</link>
      <pubDate>Tue, 26 Apr 2022 08:14:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/20220426-081449/</guid>
      <description>Share this post&amp;lt;br&amp;gt;
Why Snapchat’s Product Is Booming&amp;lt;br&amp;gt;
bigtechnology.substack.com&amp;lt;br&amp;gt;
Copy link&amp;lt;br&amp;gt;
Twitter&amp;lt;br&amp;gt;
Facebook&amp;lt;br&amp;gt;
Email&amp;lt;br&amp;gt;
Twitter After Elon&amp;lt;br&amp;gt;
Elon Musk And Twitter’s Business Are On A Collision Course&amp;lt;br&amp;gt;
The Big Tech Antitrust Movement Is Finally Showing Results&amp;lt;br&amp;gt;
TikTok’s Golden Opportunity&amp;lt;br&amp;gt;
“A Reckoning.” The Direct To Consumer Craze Is Slamming Into Reality.&amp;lt;br&amp;gt;
Ukraine And The Limits Of Russia’s Social Media Power&amp;lt;br&amp;gt;
Ex-Washington Post Owner Don Graham On Doing Business With Zuckerberg And Bezos&amp;lt;br&amp;gt;
Why El Salvador’s Wild Bitcoin Experiment Just Might Work&amp;lt;br&amp;gt;
It’s Way Too Early To Count Out Instagram Reels&amp;lt;br&amp;gt;
For Facebook, It’s Metaverse Or Bust&amp;lt;br&amp;gt;
Tech Can Help Solve Our Mental Health Crisis. But We Can’t Forget The Human Element.&amp;lt;br&amp;gt;
Cooling Stock Market Has Some Tech Giant Employees Exploring Their Options&amp;lt;br&amp;gt;
Congress Needs To Stop Day Trading, Says Sen. Mark Warner&amp;lt;br&amp;gt;
Why Jack Dorsey Went To War With Andreessen Horowitz&amp;lt;br&amp;gt;
The First Annual Big Technology Book Awards&amp;lt;br&amp;gt;
The Revolt Against Institutions Is 2021’s Defining Story&amp;lt;br&amp;gt;
“Standing Up For Us Plebs.” Amazon Leaders Reject Policy To Push Employees Out.&amp;lt;br&amp;gt;
The Internet Was Once Flat. No Longer.&amp;lt;br&amp;gt;
Five Ways China Is Trying To Unaddict Kids From Social Media&amp;lt;br&amp;gt;
A Xiaomi Phone Might’ve Shipped With A Censorship List In Europe. Now What?&amp;lt;br&amp;gt;
Why LinkedIn Is The One Good Social Network&amp;lt;br&amp;gt;
The Case To Reform The Share Button, According To Facebook’s Own Research&amp;lt;br&amp;gt;
Silicon Valley’s Open Culture Era Comes To An End&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220426-001637/</link>
      <pubDate>Tue, 26 Apr 2022 00:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220426-001637/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/25/business/elon-musk-twitter/twitter-parag-agrawal-musk&amp;#34;&amp;gt;How Twitter’s staff reacted at a meeting after the announcement. This was featured in live coverage. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;With Deal for Twitter, Musk Lands a Prize and Pledges Fewer Limits The world’s richest man succeeded in a bid to acquire the influential social networking service, which he has said he wants to take private. By Mike Isaac and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220426-001404/</link>
      <pubDate>Tue, 26 Apr 2022 00:14:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220426-001404/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/musk-twitter-sale.html&amp;#34;&amp;gt;With Deal for Twitter, Musk Lands a Prize and Pledges Fewer Limits The world’s richest man succeeded in a bid to acquire the influential social networking service, which he has said he wants to take private. By Mike Isaac and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>https://bigtechnology.substack.com/archive</title>
      <link>https://www.whatsupup.com/blog/relational/steak/000000-000000/</link>
      <pubDate>Tue, 26 Apr 2022 00:13:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/relational/steak/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220425-201623/</link>
      <pubDate>Mon, 25 Apr 2022 20:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220425-201623/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/25/business/elon-musk-twitter/musk-twitter-sale&amp;#34;&amp;gt;Musk’s deal for Twitter is worth about $44 billion. The world’s richest man succeeded in a bid to acquire the influential social networking service, which he has said he wants to take private. By Mike Isaac and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/twitter-employees-elon-musk.html&amp;#34;&amp;gt;Twitter Employees Search for Answers as Musk Takeover Becomes Reality Workers say they have been left largely in the dark about what a sale to the billionaire will mean for them and their shares in the company. By Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/business/meta-plans-to-open-its-first-retail-store-as-it-highlights-metaverse-related-products.html&amp;#34;&amp;gt;Meta plans to open its first retail store as it highlights metaverse-related products. Meta Store, the company’s first physical storefront, will sell virtual- and augmented-reality devices. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220425-201348/</link>
      <pubDate>Mon, 25 Apr 2022 20:13:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220425-201348/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/recommendations&amp;#34;&amp;gt;Recommendations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.bytebytego.com/?utm_source=homepage_recommendations&amp;#34;&amp;gt;ByteByteGo System Design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
ByteByteGo&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://anchorchange.substack.com/?utm_source=homepage_recommendations&amp;#34;&amp;gt;Anchor Change&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Katie Harbath&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://newsletter.pragmaticengineer.com/?utm_source=homepage_recommendations&amp;#34;&amp;gt;The Pragmatic Engineer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Gergely Orosz&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://therebooting.substack.com/?utm_source=homepage_recommendations&amp;#34;&amp;gt;The Rebooting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Brian Morrissey&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.newcomer.co/?utm_source=homepage_recommendations&amp;#34;&amp;gt;Newcomer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Eric Newcomer&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220425-200522/</link>
      <pubDate>Mon, 25 Apr 2022 20:05:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220425-200522/</guid>
      <description>In one chat, the LAPSUS$ leader — a 17-year-old from the U.K. who goes by the nicknames “ White ,” “ WhiteDoxbin ” and “ Oklaqq ” — is sharing his screen with another LAPSUS$ member who used the handles “ Amtrak ” and “ Asyntax .”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220425-161641/</link>
      <pubDate>Mon, 25 Apr 2022 16:16:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220425-161641/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/technology/twitter-employees-elon-musk.html&amp;#34;&amp;gt;Twitter Employees Search for Answers as Musk Deal Takes Shape Workers say they have been left largely in the dark about what a sale to the billionaire would mean for them and their shares in the company. By Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/25/business/meta-plans-to-open-its-first-retail-store-as-it-highlights-metaverse-related-products.html&amp;#34;&amp;gt;Meta plans to open its first retail store as it highlights metaverse-related products. Meta Store, the company’s first physical storefront, will sell virtual and augmented reality devices. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;Twitter Nears a Deal to Sell Itself to Elon Musk The company’s 11-member board met with Mr. Musk to discuss his offer to buy the social networking service and take it private. An agreement could come as soon as Monday. By Lauren Hirsch, Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220425-121659/</link>
      <pubDate>Mon, 25 Apr 2022 12:16:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220425-121659/</guid>
      <description>April 25, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/04/25/Announcing-Hare.html&amp;#34;&amp;gt;Announcing the Hare programming language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220425-081623/</link>
      <pubDate>Mon, 25 Apr 2022 08:16:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220425-081623/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;Twitter in Advanced Talks to Sell Itself to Elon Musk The company’s 11-member board was negotiating with Mr. Musk into the morning on Monday over his offer to buy the social networking service and take it private. By Lauren Hirsch and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220425-081547/</link>
      <pubDate>Mon, 25 Apr 2022 08:15:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220425-081547/</guid>
      <description>April 25, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/04/25/Announcing-Hare.html&amp;#34;&amp;gt;Announcing the Hare programming langauge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220425-001722/</link>
      <pubDate>Mon, 25 Apr 2022 00:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220425-001722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/technology/twitter-board-elon-musk.html&amp;#34;&amp;gt;Twitter’s Board Is Said to Seriously Consider Elon Musk’s Bid Twitter’s 11-member board met on Sunday morning to discuss Mr. Musk’s offer to buy the company and take it private. By Lauren Hirsch and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220425-001209/</link>
      <pubDate>Mon, 25 Apr 2022 00:12:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220425-001209/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/13/Three-Perfect-Tools&amp;#34;&amp;gt;Three Perfect Tools&amp;lt;/a&amp;gt; · We live in a world of things that have Product Managers and Design Teams and Documentation Architecture and often vast     ambition. And yet, so many of them are so bad.  And worse, some which are good &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/07/Apps-Get-Worse&amp;#34;&amp;gt;then become bad&amp;lt;/a&amp;gt; for no good reason.     There is a particular joy in a product that just does what you need done, in     about the way you expect or (thrillingly) better, and isn’t hard to figure out, and doesn’t change unnecessarily. Here are three     to learn from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/13/Three-Perfect-Tools&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220424-121531/</link>
      <pubDate>Sun, 24 Apr 2022 12:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220424-121531/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/24/science/scheinert-kwan-film-multiverse.html&amp;#34;&amp;gt;Out There Tripping Through the Universes A new cosmic kung fu film explores the meaning of existence in alternate realities. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220424-121428/</link>
      <pubDate>Sun, 24 Apr 2022 12:14:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220424-121428/</guid>
      <description>We use cookies and other data collection technologies to provide the best experience for our customers. You may request that your data not be shared with third parties here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Do Not Sell My Data&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220422-160552/</link>
      <pubDate>Fri, 22 Apr 2022 16:05:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220422-160552/</guid>
      <description>KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion.&amp;lt;br&amp;gt;
LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.&amp;lt;br&amp;gt;
From its inception in December 2021 until its implosion late last month, LAPSUS$ operated openly on its Telegram chat channel, which quickly grew to more than 40,000 followers after the group started using it to leak huge volumes of sensitive data stolen from victim corporations.&amp;lt;br&amp;gt;
But LAPSUS$ also used private Telegram channels that were restricted to the core seven members of the group. KrebsOnSecurity recently received a week’s worth of these private conversations between LAPSUS$ members as they plotted their final attacks late last month.&amp;lt;br&amp;gt;
The candid conversations show LAPSUS$ frequently obtained the initial access to targeted organizations by purchasing it from sites like Russian Market , which sell access to remotely compromised systems, as well as any credentials stored on those systems.&amp;lt;br&amp;gt;
The logs indicate LAPSUS$ had exactly zero problems buying, stealing or sweet-talking their way into employee accounts at companies they wanted to hack. The bigger challenge for LAPSUS$ was the subject mentioned by “Lapsus Jobs” in the screenshot above: Device enrollment. In most cases, this involved social engineering employees at the targeted firm into adding one of their computers or mobiles to the list of devices allowed to authenticate with the company’s virtual private network (VPN).&amp;lt;br&amp;gt;
The messages show LAPSUS$ members continuously targeted T-Mobile employees, whose access to internal company tools could give them everything they needed to conduct hassle-free “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/category/sim-swapping/&amp;#34;&amp;gt;SIM swaps&amp;lt;/a&amp;gt; ” — reassigning a target’s mobile phone number to a device they controlled. These unauthorized sim swaps allow an attacker to intercept a target’s text messages and phone calls, including any links sent via SMS for password resets, or one-time codes sent for multi-factor authentication.&amp;lt;br&amp;gt;
The LAPSUS$ group had a laugh at this screenshot posted by their leader, White, which shows him reading a T-Mobile news alert about their hack into Samsung. White is viewing the page via a T-Mobile employee’s virtual machine.&amp;lt;br&amp;gt;
In one chat, the LAPSUS$ leader — 17-year-old from the U.K. who goes by the nicknames “ White ,” “ WhiteDoxbin ” and “ Oklaqq ” — is sharing his screen with another LAPSUS$ member who used the handles “ Amtrak ” and “ Asyntax .”&amp;lt;br&amp;gt;
The two were exploring T-Mobile’s internal systems, and Amtrak asked White to obscure the T-Mobile logo on his screen. In these chats, the user “ Lapsus Jobs ” is White. Amtrak explains this odd request by saying their parents are aware Amtrak was previously involved in SIM swapping.&amp;lt;br&amp;gt;
“Parents know I simswap,” Amtrak &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/parentsknowisimswap.png&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; . “So, if they see [that] they think I’m hacking.”&amp;lt;br&amp;gt;
The messages reveal that each time LAPSUS$ was cut off from a T-Mobile employee’s account — either because the employee tried to log in or change their password — they would just &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/anothertmob.png&amp;#34;&amp;gt;find or buy another set of T-Mobile VPN credentials&amp;lt;/a&amp;gt; . T-Mobile currently has approximately 75,000 employees worldwide.&amp;lt;br&amp;gt;
On March 19, 2022, the logs and accompanying screenshots show LAPSUS$ had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/hasatlas1.png&amp;#34;&amp;gt;gained access to Atlas&amp;lt;/a&amp;gt; , a powerful internal T-Mobile tool for managing customer accounts.&amp;lt;br&amp;gt;
LAPSUS$ leader White/Lapsus Jobs looking up the Department of Defense in T-Mobile’s internal Atlas system.&amp;lt;br&amp;gt;
After gaining access to Atlas, White proceeded to look up T-Mobile accounts associated with the FBI and Department of Defense (see image above). Fortunately, those accounts were listed as requiring additional verification procedures before any changes could be processed.&amp;lt;br&amp;gt;
Faced with increasingly vocal pleadings from other LAPSUS$ members &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/killatlasin1second.png&amp;#34;&amp;gt;not to burn their access to Atlas and other tools&amp;lt;/a&amp;gt; by trying to SIM swap government accounts, White unilaterally decided to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/anothertmob.png&amp;#34;&amp;gt;terminate the VPN connection permitting access to T-Mobile’s network.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The other LAPSUS$ members desperately wanted to SIM swap some wealthy targets for money. Amtrak &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/whyyyyyyy.png&amp;#34;&amp;gt;throws a fit&amp;lt;/a&amp;gt; , saying “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/workedreallyhardforthis.png&amp;#34;&amp;gt;I worked really hard for this!&amp;lt;/a&amp;gt; ” White calls the Atlas access trash and then kills the VPN connection anyway, saying he wanted to focus on using their illicit T-Mobile access to steal source code.&amp;lt;br&amp;gt;
A screenshot taken by LAPSUS$ inside T-Mobile’s source code repository at Bitbucket.&amp;lt;br&amp;gt;
Perhaps to mollify his furious teammates, White changed the subject and told them he’d gained access to T-Mobile’s Slack and Bitbucket accounts. He said he’d figured out how to upload files to the virtual machine he had access to at T-Mobile. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/#more-59472&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/&amp;#34;&amp;gt;Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220422-121502/</link>
      <pubDate>Fri, 22 Apr 2022 12:15:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220422-121502/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/22/technology/tech-regulation-europe-us.html&amp;#34;&amp;gt;News Analysis As Europe Approves New Tech Laws, the U.S. Falls Further Behind Federal privacy bills, security legislation and antitrust laws to address the power of the tech giants have all failed to advance in Congress, despite hand wringing and shows of bipartisan support. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220422-080804/</link>
      <pubDate>Fri, 22 Apr 2022 08:08:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220422-080804/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-create-a-time-picker-in-react/&amp;#34;&amp;gt;Date and time formatting varies globally, which can confuse users. Date and time pickers (DTPs) solve this problem by providing a simple UI component with intuitive pop-up or drop-down calendar elements. Here&amp;#39;s how to create a React time picker in a simple demo app.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220422-041438/</link>
      <pubDate>Fri, 22 Apr 2022 04:14:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220422-041438/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-snapchats-product-is-booming&amp;#34;&amp;gt;Why Snapchat’s Product Is Booming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-snapchats-product-is-booming&amp;#34;&amp;gt;The company withstood Facebook’s best swing, now it’s growing fast again. Here’s why.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220421-161649/</link>
      <pubDate>Thu, 21 Apr 2022 16:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220421-161649/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/adopting-users-design-feedback/&amp;#34;&amp;gt;Adopting users’ design feedback →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/adopting-users-design-feedback/&amp;#34;&amp;gt;Adopting users’ design feedback&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
On March 1st, 2022, MDN Web Docs released a new design and a new brand identity. Overall, the community responded to the redesign enthusiastically and we received many positive messages and kudos. We also received valuable feedback on some of the things we didn’t get quite right, like the browser compatibility table changes as well as some accessibility and readability issues.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Joseph Menn | Reuters</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220421-161549/</link>
      <pubDate>Thu, 21 Apr 2022 16:15:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220421-161549/</guid>
      <description>Thomson Reuters&amp;lt;br&amp;gt;
Europe &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/no-lights-no-heat-no-money-thats-life-ukraine-during-cyber-warfare-2022-01-14/&amp;#34;&amp;gt;No lights, no heat, no money - that&amp;#39;s life in Ukraine during cyber warfare , article with image&amp;lt;/a&amp;gt; January 14, 2022&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/major-tech-companies-struggle-plug-holes-logging-software-2021-12-16/&amp;#34;&amp;gt;Major tech companies struggle to plug holes in logging software , article with image&amp;lt;/a&amp;gt; December 16, 2021&amp;lt;br&amp;gt;
United States &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;U.S. lawmakers call for sanctions against Israel&amp;#39;s NSO, other spyware firms , article with gallery&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
U.S. Markets &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/us-cybersecurity-officials-see-mainly-low-impact-attacks-logging-flaw-so-far-2021-12-15/&amp;#34;&amp;gt;U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far , article with image&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-2021-12-13/&amp;#34;&amp;gt;Widely used software with key vulnerability sends cyber defenders scrambling , article with gallery&amp;lt;/a&amp;gt; December 13, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/ransomware-attack-australian-utility-claimed-by-russian-speaking-criminals-2021-12-08/&amp;#34;&amp;gt;Ransomware attack on Australian utility claimed by Russian-speaking criminals , article with image&amp;lt;/a&amp;gt; December 9, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/us-seizes-6-mln-ransom-payments-charge-ukrainian-over-cyberattack-cnn-2021-11-08/&amp;#34;&amp;gt;U.S. charges Ukrainian and Russian in major ransomware spree, seizes $6 mln , article with gallery&amp;lt;/a&amp;gt; November 9, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;EXCLUSIVE Governments turn tables on ransomware gang REvil by pushing it offline , article with gallery&amp;lt;/a&amp;gt; October 21, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-2021-10-19/&amp;#34;&amp;gt;China-linked hacking group accessing calling records worldwide, CrowdStrike says , article with image&amp;lt;/a&amp;gt; October 19, 2021&amp;lt;br&amp;gt;
Government &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/us-authorities-disclose-ransomware-attacks-against-water-facilities-2021-10-14/&amp;#34;&amp;gt;U.S. authorities disclose ransomware attacks against water facilities , article with image&amp;lt;/a&amp;gt; October 14, 2021&amp;lt;br&amp;gt;
United States &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/&amp;#34;&amp;gt;Hackers of SolarWinds stole data on U.S. sanctions policy, intelligence probes , article with image&amp;lt;/a&amp;gt; October 8, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/expressvpn-employees-complain-about-ex-spys-top-role-company-2021-09-23/&amp;#34;&amp;gt;ExpressVPN employees complain about ex-spy&amp;#39;s top role at company , article with gallery&amp;lt;/a&amp;gt; September 23, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/&amp;#34;&amp;gt;Exclusive: Wide-ranging SolarWinds probe sparks fear in Corporate America , article with gallery&amp;lt;/a&amp;gt; September 10, 2021&amp;lt;br&amp;gt;
World &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/pro-china-social-media-campaign-expands-new-countries-blames-us-covid-2021-09-08/&amp;#34;&amp;gt;Pro-China social media campaign hits new countries, blames U.S. for COVID , article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/microsoft-warns-azure-customers-flaw-that-could-have-permitted-hackers-access-2021-09-08/&amp;#34;&amp;gt;Microsoft warns Azure customers of flaw that could have permitted hackers access to data , article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/researchers-cybersecurity-agency-urge-action-by-microsoft-cloud-database-users-2021-08-28/&amp;#34;&amp;gt;Researchers, cybersecurity agency urge action by Microsoft cloud database users , article with image&amp;lt;/a&amp;gt; August 30, 2021&amp;lt;br&amp;gt;
Technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-policy-groups-ask-apple-drop-plans-inspect-imessages-scan-abuse-images-2021-08-19/&amp;#34;&amp;gt;Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images , article with gallery&amp;lt;/a&amp;gt; August 19, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20220421-080538/</link>
      <pubDate>Thu, 21 Apr 2022 08:05:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20220421-080538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2022/04/20/function-keys.html&amp;#34;&amp;gt;Little stories for every function key&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220420-201725/</link>
      <pubDate>Wed, 20 Apr 2022 20:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220420-201725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/12/03/typed-type-level-programming-status-report/&amp;#34;&amp;gt;Typed type-level programming: status report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220420-201441/</link>
      <pubDate>Wed, 20 Apr 2022 20:14:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220420-201441/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/20/technology/barack-obama-disinformation.html&amp;#34;&amp;gt;Barack Obama Takes On a New Role: Fighting Disinformation The former president has embarked on a campaign to warn that the scourge of online falsehoods has eroded the foundations of democracy. By Steven Lee Myers and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20220420-120719/</link>
      <pubDate>Wed, 20 Apr 2022 12:07:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20220420-120719/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/almost-scammed/&amp;#34;&amp;gt;I&amp;#39;m a security engineer and I still almost got scammed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220420-001645/</link>
      <pubDate>Wed, 20 Apr 2022 00:16:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220420-001645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/19/technology/elon-musk-twitter.html&amp;#34;&amp;gt;Elon Musk Races to Secure Financing for Twitter Bid The world’s richest man is trying to shore up debt financing, including potentially taking out a loan against his shares of Tesla, so he can buy Twitter for $43 billion. By Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220420-001327/</link>
      <pubDate>Wed, 20 Apr 2022 00:13:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220420-001327/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-01087-2&amp;#34;&amp;gt;Next stop, Uranus? Icy planet tops priority list for next big NASA mission&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Influential panel’s recommendation makes the ice giant a likely destination for a flagship space mission.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220419-201316/</link>
      <pubDate>Tue, 19 Apr 2022 20:13:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220419-201316/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html&amp;#34;&amp;gt;The More You Know, The More You Know You Don’t Know&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220419-161610/</link>
      <pubDate>Tue, 19 Apr 2022 16:16:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220419-161610/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2018/05/21/ertugrul-soylemez-1985-2018/&amp;#34;&amp;gt;Ertugrul Söylemez: 1985-2018&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220419-161226/</link>
      <pubDate>Tue, 19 Apr 2022 16:12:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220419-161226/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html&amp;#34;&amp;gt;The More You Know, The More You Know You Don’t Know&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A Year in Review of 0-days Used In-the-Wild in 2021&amp;lt;br&amp;gt;
Posted by Maddie Stone, Google Project Zero&amp;lt;br&amp;gt;
This is our third annual year in review of 0-days exploited in-the-wild [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/02/deja-vu-lnerability.html&amp;#34;&amp;gt;2020&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/detection-deficit-year-in-review-of-0.html&amp;#34;&amp;gt;2019&amp;lt;/a&amp;gt; ]. Each year we’ve looked back at all of the detected and disclosed in-the-wild 0-days as a group and synthesized what we think the trends and takeaways are. The goal of this report is not to detail each individual exploit, but instead to analyze the exploits from the year as a group, looking for trends, gaps, lessons learned, successes, etc. If you’re interested in the analysis of individual exploits, please check out our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/p/rca.html&amp;#34;&amp;gt;root cause analysis repository&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We perform and share this analysis in order to make 0-day hard . We want it to be more costly, more resource intensive, and overall more difficult for attackers to use 0-day capabilities. 2021 highlighted just how important it is to stay relentless in our pursuit to make it harder for attackers to exploit users with 0-days. We heard &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://forbiddenstories.org/about-the-pegasus-project/&amp;#34;&amp;gt;over&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/&amp;#34;&amp;gt;over&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amnesty.org/en/latest/research/2021/11/devices-of-palestinian-human-rights-defenders-hacked-with-nso-groups-pegasus-spyware-2/&amp;#34;&amp;gt;over&amp;lt;/a&amp;gt; about how governments were targeting journalists, minoritized populations, politicians, human rights defenders, and even security researchers around the world. The decisions we make in the security and tech communities can have real impacts on society and our fellow humans’ lives.&amp;lt;br&amp;gt;
We’ll provide our evidence and process for our conclusions in the body of this post, and then wrap it all up with our thoughts on next steps and hopes for 2022 in the conclusion. If digging into the bits and bytes is not your thing, then feel free to just check-out the Executive Summary and Conclusion.&amp;lt;br&amp;gt;
Executive Summary&amp;lt;br&amp;gt;
2021 included the detection and disclosure of 58 in-the-wild 0-days, the most ever recorded since Project Zero began tracking in mid-2014. That’s more than double the previous maximum of 28 detected in 2015 and especially stark when you consider that there were only 25 detected in 2020. We’ve tracked publicly known in-the-wild 0-day exploits in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0&amp;#34;&amp;gt;this spreadsheet&amp;lt;/a&amp;gt; since mid-2014.&amp;lt;br&amp;gt;
While we often talk about the number of 0-day exploits used in-the-wild, what we’re actually discussing is the number of 0-day exploits detected and disclosed as in-the-wild. And that leads into our first conclusion: we believe the large uptick in in-the-wild 0-days in 2021 is due to increased detection and disclosure of these 0-days, rather than simply increased usage of 0-day exploits.&amp;lt;br&amp;gt;
With this record number of in-the-wild 0-days to analyze we saw that attacker methodology hasn’t actually had to change much from previous years . Attackers are having success using the same bug patterns and exploitation techniques and going after the same attack surfaces. Project Zero’s mission is “make 0day hard”. 0-day will be harder when, overall, attackers are not able to use public methods and techniques for developing their 0-day exploits. When we look over these 58 0-days used in 2021, what we see instead are 0-days that are similar to previous &amp;amp;amp; publicly known vulnerabilities. Only two 0-days stood out as novel: one for the technical sophistication of its exploit and the other for its use of logic bugs to escape the sandbox.&amp;lt;br&amp;gt;
So while we recognize the industry’s improvement in the detection and disclosure of in-the-wild 0-days, we also acknowledge that there’s a lot more improving to be done. Having access to more “ground truth” of how attackers are actually using 0-days shows us that they are able to have success by using previously known techniques and methods rather than having to invest in developing novel techniques. This is a clear area of opportunity for the tech industry.&amp;lt;br&amp;gt;
We had so many more data points in 2021 to learn about attacker behavior than we’ve had in the past. Having all this data, though, has left us with even more questions than we had before. Unfortunately, attackers who actively use 0-day exploits do not share the 0-days they’re using or what percentage of 0-days we’re missing in our tracking, so we’ll never know exactly what proportion of 0-days are currently being found and disclosed publi cly.&amp;lt;br&amp;gt;
Based on our analysis of the 2021 0-days we hope to see the following progress in 2022 in order to continue taking steps towards making 0-day hard:&amp;lt;br&amp;gt;
All vendors agree to disclose the in-the-wild exploitation status of vulnerabilities in their security bulletins.&amp;lt;br&amp;gt;
Exploit samples or detailed technical descriptions of the exploits are shared more widely.&amp;lt;br&amp;gt;
Continued concerted efforts on reducing memory corruption vulnerabilities or rendering them unexploitable.Launch mitigations that will significantly impact the exploitability of memory corruption vulnerabilities.&amp;lt;br&amp;gt;
A Record Year for In-the-Wild 0-days&amp;lt;br&amp;gt;
2021 was a record year for in-the-wild 0-days. So what happened?&amp;lt;br&amp;gt;
Is it that software security is getting worse? Or is it that attackers are using 0-day exploits more? Or has our ability to detect and disclose 0-days increased? When looking at the significant uptick from 2020 to 2021, we think it&amp;amp;#39;s mostly explained by the latter. While we believe there has been a steady growth in interest and investment in 0-day exploits by attackers in the past several years, and that security still needs to urgently improve, it appears that the security industry&amp;amp;#39;s ability to detect and disclose in-the-wild 0-day exploits is the primary explanation for the increase in observed 0-day exploits in 2021.&amp;lt;br&amp;gt;
While we often talk about “0-day exploits used in-the-wild”, what we’re actually tracking are “0-day exploits detected and disclosed as used in-the-wild”. There are more factors than just the use that contribute to an increase in that number, most notably: detection and disclosure. Better detection of 0-day exploits and more transparently disclosed exploited 0-day vulnerabilities is a positive indicator for security and progress in the industry.&amp;lt;br&amp;gt;
Overall, we can break down the uptick in the number of in-the-wild 0-days into:&amp;lt;br&amp;gt;
More detection of in-the-wild 0-day exploits&amp;lt;br&amp;gt;
More public disclosure of in-the-wild 0-day exploitation&amp;lt;br&amp;gt;
More detection&amp;lt;br&amp;gt;
In the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/detection-deficit-year-in-review-of-0.html&amp;#34;&amp;gt;2019 Year in Review&amp;lt;/a&amp;gt; , we wrote about the “Detection Deficit”. We stated “ As a community, our ability to detect 0-days being used in the wild is severely lacking to the point that we can’t draw significant conclusions due to the lack of (and biases in) the data we have collected .” In the last two years, we believe that there’s been progress on this gap.&amp;lt;br&amp;gt;
Anecdotally, we hear from more people that they’ve begun working more on detection of 0-day exploits. Quantitatively, while a very rough measure, we’re also seeing the number of entities credited with reporting in-the-wild 0-days increasing. I t stands to reason that if the number of people working on trying to find 0-day exploits increases, then the number of in-the-wild 0-day exploits detected may increase.&amp;lt;br&amp;gt;
We’ve also seen the number of vendors detecting in-the-wild 0-days in their own products increasing. Whether or not these vendors were previously working on detection, vendors seem to have found ways to be more successful in 2021. Vendors likely have the most telemetry and overall knowledge and visibility into their products so it’s important that they are investing in (and hopefully having success in) detecting 0-days targeting their own products. As shown in the chart above , there was a significant increase in the number of in-the-wild 0-days discovered by vendors in their own products. Google discovered 7 of the in-the-wild 0-days in their own products and Microsoft discovered 10 in their products!&amp;lt;br&amp;gt;
More disclosure&amp;lt;br&amp;gt;
The second reason why the number of detected in-the-wild 0-days has increased is due to more disclosure of these vulnerabilities. Apple and Google Android (we differentiate “Google Android” rather than just “Google” because Google Chrome has been annotating their security bulletins for the last few years) first began labeling vulnerabilities in their security advisories with the information about potential in-the-wild exploitation in November 2020 and January 2021 respectively. When vendors don’t annotate their release notes, the only way we know that a 0-day was exploited in-the-wild is if the researcher who discovered the exploitation comes forward. If Apple and Google Android had not begun annotating their release notes, the public would likely not know about at least 7 of the Apple in-the-wild 0-days and 5 of the Android in-the-wild 0-days. Why? Because these vulnerabilities were reported by “Anonymous” reporters. If the reporters didn’t want credit for the vulnerability, it’s unlikely that they would have gone public to say that there were indications of exploitation. That is 12 0-days that wouldn’t have been included in this year’s list if Apple and Google Android had not begun transparently annotating their security advisories.&amp;lt;br&amp;gt;
Kudos and thank you to Microsoft, Google Chrome, and Adobe who have been annotating their security bulletins for transparency for multiple years now! And thanks to Apache who also annotated their release notes for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://httpd.apache.org/security/vulnerabilities_24.html&amp;#34;&amp;gt;CVE-2021-41773&amp;lt;/a&amp;gt; this past year.&amp;lt;br&amp;gt;
In-the-wild 0-days in Qualcomm and ARM products were annotated as in-the-wild in Android security bulletins, but not in the vendor’s own security advisories.&amp;lt;br&amp;gt;
It&amp;amp;#39;s highly likely that in 2021, there were other 0-days that were exploited in the wild and detected, but vendors did not mention this in their release notes. In 2022, we hope that more vendors start noting when they patch vulnerabilities that have been exploited in-the-wild. Until we’re confident that all vendors are transparently disclosing in-the-wild status, there’s a big question of how many in-the-wild 0-days are discovered, but not labeled publicly by vendors.&amp;lt;br&amp;gt;
New Year, Old Techniques&amp;lt;br&amp;gt;
We had a record number of “data points” in 2021 to understand how attackers are actually using 0-day exploits. A bit surprising to us though, out of all those data points, there was nothing new amongst all this data. 0-day exploits are considered one of the most advanced attack methods an actor …</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220419-160524/</link>
      <pubDate>Tue, 19 Apr 2022 16:05:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220419-160524/</guid>
      <description>Conti — one of the most ruthless and successful Russian ransomware groups — publicly declared during the height of the COVID-19 pandemic that it would refrain from targeting healthcare providers. But new information confirms this pledge was always a lie, and that Conti has launched more than 200 attacks against hospitals and other healthcare facilities since first surfacing in 2018 under its earlier name, “ Ryuk .”&amp;lt;br&amp;gt;
On April 13, Microsoft said it executed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blogs.microsoft.com/on-the-issues/2022/04/13/zloader-botnet-disrupted-malware-ukraine/&amp;#34;&amp;gt;a legal sneak attack&amp;lt;/a&amp;gt; against Zloader , a remote access trojan and malware platform that multiple ransomware groups have used to deploy their malware inside victim networks. More specifically, Microsoft &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://noticeofpleadings.com/Zloader/&amp;#34;&amp;gt;obtained a court order&amp;lt;/a&amp;gt; that allowed it to seize 65 domain names that were used to maintain the Zloader botnet.&amp;lt;br&amp;gt;
Microsoft’s civil lawsuit against Zloader names seven “John Does,” essentially seeking information to identify cybercriminals who used Zloader to conduct ransomware attacks. As the company’s complaint notes, some of these John Does were associated with lesser ransomware collectives such as Egregor and Netfilim .&amp;lt;br&amp;gt;
But according to Microsoft and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/uscert/ncas/alerts/aa21-265a&amp;#34;&amp;gt;an advisory&amp;lt;/a&amp;gt; from the U.S. Cybersecurity &amp;amp;amp; Infrastructure Security Agency (CISA), Zloader had a special relationship with Ryuk/Conti, acting as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://threatpost.com/malsmoke-microsoft-e-signature-verification/177363/&amp;#34;&amp;gt;a preferred distribution platform for deploying Ryuk/Conti ransomware&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Several parties backed Microsoft in its legal efforts against Zloader by filing supporting declarations, including Errol Weiss , a former penetration tester for the U.S. National Security Agency (NSA). Weiss now serves as the chief security officer of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.h-isac.org&amp;#34;&amp;gt;Health Information Sharing &amp;amp;amp; Analysis Center&amp;lt;/a&amp;gt; (H-ISAC), an industry group that shares information about cyberattacks against healthcare providers.&amp;lt;br&amp;gt;
Weiss said ransomware attacks from Ryuk/Conti have impacted hundreds of healthcare facilities across the United States, including facilities located in 192 cities and 41 states and the District of Columbia.&amp;lt;br&amp;gt;
“The attacks resulted in the temporary or permanent loss of IT systems that support many of the provider delivery functions in modern hospitals resulting in cancelled surgeries and delayed medical care,” Weiss said in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://noticeofpleadings.com/zloader/files/Application%20for%20TRO/TRO%2008%20-%20Weiss%20Decl%20with%20Ex%201%20ISO%20TRO%20and%20PI.pdf&amp;#34;&amp;gt;a declaration&amp;lt;/a&amp;gt; (PDF) with the U.S. District Court for the Northern District of Georgia.&amp;lt;br&amp;gt;
“Hospitals reported revenue losses due to Ryuk infections of nearly $100 million from data I obtained through interviews with hospital staff, public statements, and media articles,” Weiss wrote. “The Ryuk attacks also caused an estimated $500 million in costs to respond to the attacks – costs that include ransomware payments, digital forensic services, security improvements and upgrading impacted systems plus other expenses.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/#more-59446&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/&amp;#34;&amp;gt;Conti’s Ransomware Toll on the Healthcare Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220419-041632/</link>
      <pubDate>Tue, 19 Apr 2022 04:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220419-041632/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2007/06/21/solving-an-arithmetic-puzzle-with-haskell/&amp;#34;&amp;gt;Solving an arithmetic puzzle with Haskell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220419-001152/</link>
      <pubDate>Tue, 19 Apr 2022 00:11:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220419-001152/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/18/E-Bike&amp;#34;&amp;gt;4,000,000m Lessons&amp;lt;/a&amp;gt; · The odometer on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/201x/2019/06/09/Micromobility&amp;#34;&amp;gt;my e-bike&amp;lt;/a&amp;gt; clicked over to 4K and, rather than a general-purpose “e-bikes are     great” rave, I thought I’d assemble a few concrete arguments for them, suitable for re-use with friends and     loved ones in the (likely) case that you’re already convinced. With pictures &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/18/E-Bike&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
, selected pointers to long-form pieces that have added value to my semi-retired     days and one or two of which might reward you if you make time for them.  A few of this month’s pieces aren’t free; it’s a     bitter fact that the truth is paywalled but the lies are free. Sorry &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/04/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20220417-200933/</link>
      <pubDate>Sun, 17 Apr 2022 20:09:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20220417-200933/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2022/04/17/canonsofcbor.html&amp;#34;&amp;gt;The several canons of CBOR&amp;lt;/a&amp;gt; (17 Apr 2022)&amp;lt;br&amp;gt;
There are many encoding formats. CBOR is one of them. Like several others, a subset of it basically fine—I&amp;#39;m not starting that fight today.&amp;lt;br&amp;gt;
Whatever encoding you use, it&amp;#39;s nice to reduce flexibility. If there are multiple ways of encoding the same thing then, for anything with a non-negligible diversity of implementations, you&amp;#39;ll find that there is a canonical encoding, it&amp;#39;s just not documented. As soon as one implementation tries using a valid, but less common encoding, it&amp;#39;ll find that it doesn&amp;#39;t work and something will change to sort it all out. But that process of eventual coordination is expensive—better to do it explicitly and up-front.&amp;lt;br&amp;gt;
For example, TCP options are chunks of tag–length–value and the spec doesn&amp;#39;t define any restriction on their ordering. That didn&amp;#39;t stop me &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/304791/?format=printable&amp;#34;&amp;gt;blowing up a Ubuntu release&amp;lt;/a&amp;gt; because a change of mine happened to alter the order that Linux sent them, and some DSL modems dropped packets when options came in that order. That&amp;#39;s an expensive discovery of an implicit canonicalisation rule.&amp;lt;br&amp;gt;
If you&amp;#39;re using CBOR then RFC 7049 has a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc7049#section-3.9&amp;#34;&amp;gt;section&amp;lt;/a&amp;gt; titled “Canonical CBOR”. One of the things it defines is how to order map elements. Great! No more TCP options messes. You can read that section for yourself, but one interpretation of the words there is what I&amp;#39;ll call the three-step ordering for map keys:&amp;lt;br&amp;gt;
Lowest valued types come first then, within each type,&amp;lt;br&amp;gt;
Shortest encoded key comes first then, within consecutive keys with equal lengths,&amp;lt;br&amp;gt;
Sort lexicographically.&amp;lt;br&amp;gt;
However, there is another interpretation of the same section which I&amp;#39;ll call the two-step ordering. It drops the first step, i.e. doesn&amp;#39;t sort by types. When I first read that section, I certainly came away with only one interpretation, but I can somewhat see how the other arises.&amp;lt;br&amp;gt;
CTAP, the protocol for talking to security keys, uses CBOR a lot and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html#message-encoding&amp;#34;&amp;gt;explicitly picks&amp;lt;/a&amp;gt; the three-step ordering. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.rfc-editor.org/errata_search.php?eid=4409&amp;#34;&amp;gt;An errata&amp;lt;/a&amp;gt; was eventually raised against the RFC to “clarify” that the three-step order was correct, but it was rejected as a semantic change. So perhaps that&amp;#39;s an official ruling that two-step was the correct understanding?&amp;lt;br&amp;gt;
It only matters if you mix different types of keys in the same map, and sometimes you don&amp;#39;t, so maybe it&amp;#39;s moot for you. (But keep in mind that negative and non-negative numbers are different types in CBOR.) Anyway, the IETF revised the CBOR RFC to&amp;lt;br&amp;gt;
firmly clarify the issue&amp;lt;br&amp;gt;
add a third option:&amp;lt;br&amp;gt;
RFC 7049 is obsoleted by 8949. The old “Canonical CBOR” section is replaced by “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc8949#section-4.2.1&amp;#34;&amp;gt;Core Deterministic Encoding Requirements&amp;lt;/a&amp;gt; ” and that specifies what I&amp;#39;ll have to call the one-step ordering:&amp;lt;br&amp;gt;
Sort lexicographically on the encoded key.&amp;lt;br&amp;gt;
It has some advantages! Like, why was it ever more complicated than that in the first place? But it was, and now there&amp;#39;s two (or three) orderings. The two-step ordering even has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc8949#section-4.2.3&amp;#34;&amp;gt;a subsection&amp;lt;/a&amp;gt; of its own in the new RFC and a note saying that it “could be called Old Canonical CBOR”. If only shipped implementations were as changeable as the X-Men universe.&amp;lt;br&amp;gt;
So that&amp;#39;s why there&amp;#39;s two and half “canonical” CBORs and now I have something that I can reference when people ask me about this.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220417-081648/</link>
      <pubDate>Sun, 17 Apr 2022 08:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220417-081648/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2022/04/17/espanol/nazi-ucrania-putin.html&amp;#34;&amp;gt;Vladimir Putin habla de ‘desnazificar’ Ucrania. ¿Por qué? El surgimiento del insulto “nazi” muestra cómo el presidente de Rusia intenta utilizar estereotipos, una realidad distorsionada y el trauma persistente de la Segunda Guerra Mundial para justificar su invasión. By Anton Troianovski&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220417-081013/</link>
      <pubDate>Sun, 17 Apr 2022 08:10:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220417-081013/</guid>
      <description>This is taking longer than expected, check your Internet connection and reload the page if the problem persists.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220416-081759/</link>
      <pubDate>Sat, 16 Apr 2022 08:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220416-081759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/04/07/functional-pearl-on-combinatorial-species/&amp;#34;&amp;gt;Functional pearl on combinatorial species&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220416-081724/</link>
      <pubDate>Sat, 16 Apr 2022 08:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220416-081724/</guid>
      <description>April 16, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2022/04/16/Stepping-away-from-Gemini.gmi&amp;#34;&amp;gt;Stepping away from Gemini&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220416-041335/</link>
      <pubDate>Sat, 16 Apr 2022 04:13:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220416-041335/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/cve-2021-1782-ios-in-wild-vulnerability.html&amp;#34;&amp;gt;CVE-2021-1782, an iOS in-the-wild vulnerability in&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220416-041100/</link>
      <pubDate>Sat, 16 Apr 2022 04:11:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220416-041100/</guid>
      <description>This is taking longer than expected, check your Internet connection and reload the page if the problem persists.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220416-002031/</link>
      <pubDate>Sat, 16 Apr 2022 00:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220416-002031/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/04/podcast-episode-making-hope-adam-savage&amp;#34;&amp;gt;Podcast Episode: Making Hope with Adam Savage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220416-002029/</link>
      <pubDate>Sat, 16 Apr 2022 00:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220416-002029/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/04/podcast-episode-making-hope-adam-savage&amp;#34;&amp;gt;Podcast Episode: Making Hope with Adam Savage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220416-001738/</link>
      <pubDate>Sat, 16 Apr 2022 00:17:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220416-001738/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/14/technology/elon-musk-twitter-bid.html&amp;#34;&amp;gt;Elon Musk, After Toying With Twitter, Now Wants It All The billionaire executive recently became one of the company’s largest shareholders. Now he says he wants to buy the whole thing and change how it handles speech. By Mike Isaac, Kate Conger and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/14/business/elon-musk-twitter/elon-musk-twitter-employees&amp;#34;&amp;gt;Worries inside Twitter as employees consider Elon Musk’s takeover bid. At a meeting Thursday, employees expressed concerns about how the social media company would change if Mr. Musk were to overhaul it. By Kate Conger and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/04/14/business/elon-musk-twitter/twitters-board-of-directors-meets-after-musks-takeover-offer&amp;#34;&amp;gt;Twitter’s board is weighing a plan to thwart Musk’s takeover attempt. This was featured in live coverage. By Kate Conger and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/11/technology/twitter-elon-musk-problem.html&amp;#34;&amp;gt;Twitter Grapples With an Elon Musk Problem Mr. Musk, Twitter’s biggest shareholder, is free to buy more stock in the company and could use the platform against itself. Some employees are dismayed. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/10/technology/elon-musk-twitter-board.html&amp;#34;&amp;gt;Elon Musk Will Not Join Twitter’s Board, Company Says The announcement reverses a decision last week, when Twitter said Mr. Musk would become a board member after amassing a 9.2 percent stake in the company. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220416-001659/</link>
      <pubDate>Sat, 16 Apr 2022 00:16:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220416-001659/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/mozilla-partners-with-the-center-for-humane-technology/&amp;#34;&amp;gt;Mozilla partners with the Center for Humane Technology →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/04/mozilla-partners-with-the-center-for-humane-technology/&amp;#34;&amp;gt;Mozilla partners with the Center for Humane Technology&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We’re pleased to announce that we have partnered with Center for Humane Tech, a nonprofit organization that radically reimagines the digital infrastructure. Its mission is to drive a comprehensive shift toward humane technology that supports the collective well-being, democracy and shared information environment.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20220416-001542/</link>
      <pubDate>Sat, 16 Apr 2022 00:15:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20220416-001542/</guid>
      <description>The modern internet was built on a legal framework of safe harbors for user-generated content. These safe harbors are widely credited with having enabled global internet innovation by protecting online…&amp;lt;br&amp;gt;
At GitHub, we put developers first, and we work hard to provide a safe, open, and inclusive platform for code collaboration. This means we are committed to minimizing the disruption…&amp;lt;br&amp;gt;
We regularly update our policies to reflect the evolution of our products, changing legal requirements, and user feedback. In this update, we’ve made some changes to our Terms of Service,…&amp;lt;br&amp;gt;
As policymakers grapple with how to address hate speech and disinformation on the internet, they’re eying the legal structure underpinning collaborative software development: legal safe harbors. These safe harbors protect…&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20220416-001540/</link>
      <pubDate>Sat, 16 Apr 2022 00:15:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20220416-001540/</guid>
      <description>This morning, we watched in awe as the first Mars Helicopter, Ingenuity, took flight in the thin Martian atmosphere. This is an incredible achievement for the teams at NASA and…&amp;lt;br&amp;gt;
Good news: we removed all cookie banners from GitHub! No one likes cookie banners. But cookie banners are everywhere. So how did we pull this off? Well, EU law…&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220416-001523/</link>
      <pubDate>Sat, 16 Apr 2022 00:15:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220416-001523/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitter-after-elon&amp;#34;&amp;gt;Twitter After Elon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitter-after-elon&amp;#34;&amp;gt;Catching a falling knife can hurt like hell.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;18&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitter-after-elon/comments&amp;#34;&amp;gt;Comment 1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Apr 8&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tiktoks-golden-opportunity/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220416-001442/</link>
      <pubDate>Sat, 16 Apr 2022 00:14:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220416-001442/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00998-4&amp;#34;&amp;gt;Climate change — four decades of missed opportunities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The United States should learn from its mistakes on decarbonization.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220416-001416/</link>
      <pubDate>Sat, 16 Apr 2022 00:14:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220416-001416/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/cve-2021-1782-ios-in-wild-vulnerability.html&amp;#34;&amp;gt;CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
This blog post is my analysis of a vulnerability exploited in the wild and patched in early 2021. Like the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html&amp;#34;&amp;gt;writeup published last week&amp;lt;/a&amp;gt; looking at an ASN.1 parser bug, this blog post is based on the notes I took as I was analyzing the patch and trying to understand the XNU vouchers subsystem. I hope that this writeup serves as the missing documentation for how some of the internals of the voucher subsystem works and its quirks which lead to this vulnerability.&amp;lt;br&amp;gt;
CVE-2021-1782 was fixed in iOS 14.4, as noted by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/s1guza/status/1354575808547999744&amp;#34;&amp;gt;@s1guza on twitter&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
This vulnerability was fixed on January 26th 2021, and Apple updated the iOS 14.4 release notes on May 28th 2021 to indicate that the issue may have been actively exploited:&amp;lt;br&amp;gt;
Vouchers&amp;lt;br&amp;gt;
What exactly is a voucher?&amp;lt;br&amp;gt;
The kernel code has a concise description:&amp;lt;br&amp;gt;
Vouchers are a reference counted immutable (once-created) set of indexes to particular resource manager attribute values (which themselves are reference counted).&amp;lt;br&amp;gt;
That definition is technically correct, though perhaps not all that helpful by itself.&amp;lt;br&amp;gt;
To actually understand the root cause and exploitability of this vulnerability is going to require covering a lot of the voucher codebase. This part of XNU is pretty obscure, and pretty complicated.&amp;lt;br&amp;gt;
A voucher is a reference-counted table of keys and values. Pointers to all created vouchers are stored in the global ivht_bucket hash table.&amp;lt;br&amp;gt;
For a particular set of keys and values there should only be one voucher object. During the creation of a voucher there is a deduplication stage where the new voucher is compared against all existing vouchers in the hashtable to ensure they remain unique, returning a reference to the existing voucher if a duplicate has been found.&amp;lt;br&amp;gt;
Here&amp;amp;#39;s the structure of a voucher:&amp;lt;br&amp;gt;
struct ipc_voucher {&amp;lt;br&amp;gt;
iv_index_t     iv_hash ; /* checksum hash */&amp;lt;br&amp;gt;
iv_index_t     iv_sum ; /* checksum of values */&amp;lt;br&amp;gt;
os_refcnt_t    iv_refs ; /* reference count */&amp;lt;br&amp;gt;
iv_index_t     iv_table_size ; /* size of the voucher table */&amp;lt;br&amp;gt;
iv_index_t     iv_inline_table [ IV_ENTRIES_INLINE ];&amp;lt;br&amp;gt;
iv_entry_t     iv_table ; /* table of voucher attr entries */&amp;lt;br&amp;gt;
ipc_port_t     iv_port ; /* port representing the voucher */&amp;lt;br&amp;gt;
queue_chain_t  iv_hash_link ; /* link on hash chain */&amp;lt;br&amp;gt;
#define IV_ENTRIES_INLINE MACH_VOUCHER_ATTR_KEY_NUM_WELL_KNOWN&amp;lt;br&amp;gt;
The voucher codebase is written in a very generic, extensible way, even though its actual use and supported feature set is quite minimal.&amp;lt;br&amp;gt;
Keys&amp;lt;br&amp;gt;
Keys in vouchers are not arbitrary. Keys are indexes into a voucher&amp;amp;#39;s iv_table ; a value&amp;amp;#39;s position in the iv_table table determines what &amp;amp;#34;key&amp;amp;#34; it was stored under. Whilst the vouchers codebase supports the runtime addition of new key types this feature isn&amp;amp;#39;t used and there are just a small number of fixed, well-known keys:&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_ALL (( mach_voucher_attr_key_t )~ 0 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_NONE (( mach_voucher_attr_key_t ) 0 )&amp;lt;br&amp;gt;
/* other well-known-keys will be added here */&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_ATM (( mach_voucher_attr_key_t ) 1 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_IMPORTANCE (( mach_voucher_attr_key_t ) 2 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_BANK (( mach_voucher_attr_key_t ) 3 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_PTHPRIORITY (( mach_voucher_attr_key_t ) 4 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_USER_DATA (( mach_voucher_attr_key_t ) 7 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_TEST (( mach_voucher_attr_key_t ) 8 )&amp;lt;br&amp;gt;
#define MACH_VOUCHER_ATTR_KEY_NUM_WELL_KNOWN MACH_VOUCHER_ATTR_KEY_TEST&amp;lt;br&amp;gt;
The iv_inline_table in an ipc_voucher has 8 entries. But of those, only four are actually supported and have any associated functionality. The ATM voucher attributes are deprecated and the code supporting them is gone so only IMPORTANCE (2), BANK (3), PTHPRIORITY (4) and USER_DATA (7) are valid keys. There&amp;amp;#39;s some confusion (perhaps on my part) about when exactly you should use the term key and when attribute; I&amp;amp;#39;ll use them interchangeably to refer to these key values and the corresponding &amp;amp;#34;types&amp;amp;#34; of values which they manage. More on that later.&amp;lt;br&amp;gt;
Values&amp;lt;br&amp;gt;
Each entry in a voucher iv_table is an iv_index_t :&amp;lt;br&amp;gt;
typedef natural_t iv_index_t ;&amp;lt;br&amp;gt;
Each value is again an index; this time into a per-key cache of values, abstracted as a &amp;amp;#34;Voucher Attribute Cache Control Object&amp;amp;#34; represented by this structure:&amp;lt;br&amp;gt;
struct ipc_voucher_attr_control {&amp;lt;br&amp;gt;
os_refcnt_t   ivac_refs ;&amp;lt;br&amp;gt;
boolean_t     ivac_is_growing ; /* is the table being grown */&amp;lt;br&amp;gt;
ivac_entry_t  ivac_table ; /* table of voucher attr value entries */&amp;lt;br&amp;gt;
iv_index_t    ivac_table_size ; /* size of the attr value table */&amp;lt;br&amp;gt;
iv_index_t    ivac_init_table_size ; /* size of the attr value table */&amp;lt;br&amp;gt;
iv_index_t    ivac_freelist ; /* index of the first free element */&amp;lt;br&amp;gt;
ipc_port_t    ivac_port ; /* port for accessing the cache control  */&amp;lt;br&amp;gt;
lck_spin_t    ivac_lock_data ;&amp;lt;br&amp;gt;
iv_index_t    ivac_key_index ; /* key index for this value */&amp;lt;br&amp;gt;
These are accessed indirectly via another global table:&amp;lt;br&amp;gt;
static ipc_voucher_global_table_element iv_global_table [ MACH_VOUCHER_ATTR_KEY_NUM_WELL_KNOWN ];&amp;lt;br&amp;gt;
(Again, the comments in the code indicate that in the future that this table may grow in size and allow attributes to be managed in userspace, but for now it&amp;amp;#39;s just a fixed size array.)&amp;lt;br&amp;gt;
Each element in that table has this structure:&amp;lt;br&amp;gt;
typedef struct ipc_voucher_global_table_element {&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_t      ivgte_manager ;&amp;lt;br&amp;gt;
ipc_voucher_attr_control_t      ivgte_control ;&amp;lt;br&amp;gt;
mach_voucher_attr_key_t         ivgte_key ;&amp;lt;br&amp;gt;
} ipc_voucher_global_table_element ;&amp;lt;br&amp;gt;
Both the iv_global_table and each voucher&amp;amp;#39;s iv_table are indexed by (key-1) , not key , so the userdata entry is [6] , not [7] , even though the array still has 8 entries.&amp;lt;br&amp;gt;
The ipc_voucher_attr_control_t provides an abstract interface for managing &amp;amp;#34;values&amp;amp;#34; and the ipc_voucher_attr_manager_t provides the &amp;amp;#34;type-specific&amp;amp;#34; logic to implement the semantics of each type (here by type I mean &amp;amp;#34;key&amp;amp;#34; or &amp;amp;#34;attr&amp;amp;#34; type.) Let&amp;amp;#39;s look more concretely at what that means. Here&amp;amp;#39;s the definition of ipc_voucher_attr_manager_t :&amp;lt;br&amp;gt;
struct ipc_voucher_attr_manager {&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_release_value_t    ivam_release_value ;&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_get_value_t        ivam_get_value ;&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_extract_content_t  ivam_extract_content ;&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_command_t          ivam_command ;&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_release_t          ivam_release ;&amp;lt;br&amp;gt;
ipc_voucher_attr_manager_flags              ivam_flags ;&amp;lt;br&amp;gt;
ivam_flags is an int containing some flags; the other five fields are function pointers which define the semantics of the particular attr type. Here&amp;amp;#39;s the ipc_voucher_attr_manager structure for the user_data type:&amp;lt;br&amp;gt;
const struct ipc_voucher_attr_manager user_data_manager = {&amp;lt;br&amp;gt;
. ivam_release_value = user_data_release_value ,&amp;lt;br&amp;gt;
. ivam_get_value = user_data_get_value ,&amp;lt;br&amp;gt;
. ivam_extract_content = user_data_extract_content ,&amp;lt;br&amp;gt;
. ivam_command = user_data_command ,&amp;lt;br&amp;gt;
. ivam_release = user_data_release ,&amp;lt;br&amp;gt;
. ivam_flags = IVAM_FLAGS_NONE ,&amp;lt;br&amp;gt;
Those five function pointers are the only interface from the generic voucher code into the type-specific code. The interface may seem simple but there are some tricky subtleties in there; we&amp;amp;#39;ll get to that later!&amp;lt;br&amp;gt;
Let&amp;amp;#39;s go back to the generic ipc_voucher_attr_control structure which maintains the &amp;amp;#34;values&amp;amp;#34; for each key in a type-agnostic way. The most important field is ivac_entry_t  ivac_table , which is an array of ivac_entry_s &amp;amp;#39;s . It&amp;amp;#39;s an index into this table which is stored in each voucher&amp;amp;#39;s iv_table .&amp;lt;br&amp;gt;
Here&amp;amp;#39;s the structure of each entry in that table:&amp;lt;br&amp;gt;
struct ivac_entry_s {&amp;lt;br&amp;gt;
iv_value_handle_t ivace_value ;&amp;lt;br&amp;gt;
iv_value_refs_t   ivace_layered : 1 , /* layered effective entry */&amp;lt;br&amp;gt;
ivace_releasing : 1 , /* release in progress */&amp;lt;br&amp;gt;
ivace_free : 1 , /* on freelist */&amp;lt;br&amp;gt;
ivace_persist : 1 , /* Persist the entry, don&amp;amp;#39;t&amp;lt;br&amp;gt;
count made refs */&amp;lt;br&amp;gt;
ivace_refs : 28 ; /* reference count */&amp;lt;br&amp;gt;
iv_value_refs_t ivaceu_made ; /* made count (non-layered) */&amp;lt;br&amp;gt;
iv_index_t      ivaceu_layer ; /* next effective layer&amp;lt;br&amp;gt;
(layered) */&amp;lt;br&amp;gt;
} ivace_u ;&amp;lt;br&amp;gt;
iv_index_t        ivace_next ; /* hash or freelist */&amp;lt;br&amp;gt;
iv_index_t        ivace_index ; /* hash head (independent) */&amp;lt;br&amp;gt;
ivace_refs is a reference count for this table index. Note that this entry is inline in an array; so this reference count going to zero doesn&amp;amp;#39;t cause the ivac_entry_s to be free&amp;amp;#39;d back to a kernel allocator (like the zone allocator for example.) Instead, it moves this table index onto a freelist of empty entries. The table can grow but never shrink.&amp;lt;br&amp;gt;
Table entries which aren&amp;amp;#39;t free store a type-specific &amp;amp;#34;handle&amp;amp;#34; in ivace_value . Here&amp;amp;#39;s the typedef chain for that type:&amp;lt;br&amp;gt;
iv_value_handle_t ivace_value&amp;lt;br&amp;gt;
typedef mach_voucher_attr_value_handle_t iv_value_handle_t ;&amp;lt;br&amp;gt;
typedef uint64_t mach_voucher_attr_value_handle_t ;&amp;lt;br&amp;gt;
The handle is a uint64_t but in reality the attrs can (and do) store pointers there, hidden behind casts.&amp;lt;br&amp;gt;
A guarantee made by the attr_control is that there will only ever be one (live) ivac_entr y_s for a particular ivace_value . This means that each time a new ivace_value needs an ivac_entry the attr_control &amp;amp;#39;s ivac_table needs to be searched to see if a matching value is already present. To speed this up in-use ivac_entries are linked together in hash buckets so that a (hopefully significantly) shorter linked-list of entries can be searched rather than a linear scan of the whole table. (Note that it&amp;amp;#39;s not a linked-list of pointers; each link in the chain is an index into the table.)&amp;lt;br&amp;gt;
Userdata attrs&amp;lt;br&amp;gt;
user_data is one of the four types of supported, implemented voucher attr types. It&amp;amp;#39;s only purpose is to manage buffers of arbitrary, user controlled data. Since the attr_control performs deduping only on the ivace_value (which is a pointer) the userdata attr manager is responsible for ensuring that userdata values which have identical buffer values (matching length and bytes) have identical pointers.&amp;lt;br&amp;gt;
To do this it maintains a hash table of user_data_value_element structures, …</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220416-001334/</link>
      <pubDate>Sat, 16 Apr 2022 00:13:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220416-001334/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-to-slsa-part-3-putting-it-all.html&amp;#34;&amp;gt;How to SLSA Part 3 - Putting it all together&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Tom Hennen, software engineer, BCID &amp;amp;amp; GOSST&amp;lt;br&amp;gt;
In our last two posts ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-to-slsa-part-1-basics.html&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-to-slsa-part-2-details.html&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; ) we introduced a fictional example of Squirrel, Oppy, and Acme learning to SLSA and covered the basics and details of how they’d use SLSA for their organizations. Today we’ll close out the series by exploring how each organization pulls together the various solutions into a heterogeneous supply chain. As a reminder, Acme is trying to produce a container image that contains three artifacts:&amp;lt;br&amp;gt;
The Squirrel package ‘foo’&amp;lt;br&amp;gt;
The Oppy package ‘baz’&amp;lt;br&amp;gt;
A custom executable, ‘bar’, written by Acme employees.&amp;lt;br&amp;gt;
The process starts with ‘foo’ package authors triggering a build using GitHub Actions. This results in a new version of ‘foo’ (an artifact with hash ‘abc’) being pushed to the Squirrel repo along with its SLSA provenance (signed by Fulcio) and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/in-toto/attestation/issues/47&amp;#34;&amp;gt;source attestation&amp;lt;/a&amp;gt; . When Squirrel gets this push request it verifies the artifact against the specific policy for ‘foo’ which checks that it was built by GitHub Actions from the expected source repository. After the artifact passes the policy check a VSA is created and the new package, its original SLSA provenance, and the VSA are made public in the Squirrel repo, available to all users of package ‘foo’. Next the maintainers of the Oppy ‘baz’ package trigger a new build using the Oppy Autobuilder. This results in a new version of ‘baz’ (an artifact with hash ‘def’) being pushed to a public Oppy repo with the SLSA provenance (signed by their org-specific keys) published to Rekor. When the repo gets the push request it makes the artifact available to the public. The repo does not perform any verification at this time. An Acme employee then makes a change to their Dockerfile, sending it for review by their co-worker, who approves the change and merges the PR. This then causes the Acme builder to trigger a build. During this build:&amp;lt;br&amp;gt;
bar is compiled from source code stored in the same source repo as the Dockerfile.&amp;lt;br&amp;gt;
acorn install downloads ‘foo’ from the Squirrel repo, verifying the VSA, and recording the use of acorn://foo@abc and its VSA in the build.&amp;lt;br&amp;gt;
acme_oppy_get install (a custom script made by Acme) downloads the latest version of the Oppy ‘baz’ package and queries its SLSA provenance and other attestations from Rekor. It then performs a full verification checking that it was built by ‘https://oppy.example/slsa/builder/v1’ and the publicized key. Once verification is complete it records the use of oppy://baz@def and the associated attestations in the build.&amp;lt;br&amp;gt;
The build process assembles the SLSA provenance for the container by:&amp;lt;br&amp;gt;
Recording the Acme git repo the bar source and Dockerfile came from, into &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/provenance/v0.2#materials&amp;#34;&amp;gt;materials&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Copying the reported dependencies of acorn://foo@abc and oppy://baz@def into &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/provenance/v0.2#materials&amp;#34;&amp;gt;materials&amp;lt;/a&amp;gt; and adding their attestations to the output &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/in-toto/attestation/blob/main/spec/bundle.md&amp;#34;&amp;gt;in-toto bundle&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Recording the CI/CD entrypoint as the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/provenance/v0.2#invocation&amp;#34;&amp;gt;invocation&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Creating a signed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/secure-systems-lab/dsse&amp;#34;&amp;gt;DSSE&amp;lt;/a&amp;gt; with the SLSA provenance and adding it to the output &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/in-toto/attestation/blob/main/spec/bundle.md&amp;#34;&amp;gt;in-toto bundle&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Once the container is ready for release the Acme verifier checks the SLSA provenance (and other data in the in-toto bundle) using the policy from their own policy repo and issues a VSA. The VSA and all associated attestations are then published to an internal Rekor instance. Acme can then create an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Software_bill_of_materials&amp;#34;&amp;gt;SBOM&amp;lt;/a&amp;gt; for the container leveraging data about the build as stored in Rekor. Acme then publishes the container image, the VSA, and the SBOM on Dockerhub. Downstream users of this Acme container can then check the Acme issued VSA, and if there are any problems Acme can consult their internal Rekor instance to get more details on the build allowing Acme to trace all of their dependencies back to source code and the systems used to create them. Conclusion With SLSA implemented in the ways described in this series, downstream users are protected from many of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/spec/v0.1/threats&amp;#34;&amp;gt;the threats affecting the software supply chain today&amp;lt;/a&amp;gt; . While users still need to trust certain parties, the number of systems requiring trust is much lower and users are in a much better position to investigate any issues that arise. We’d love to see the ideas in this series implemented, refuted, or used as a foundation to build even stronger solutions. We’d also love to hear some other methods on how to solve these issues. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa#get-involved&amp;#34;&amp;gt;Show us&amp;lt;/a&amp;gt; how you like to SLSA.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-to-slsa-part-2-details.html&amp;#34;&amp;gt;How to SLSA Part 2 - The Details&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Tom  Hennen, software engineer, BCID &amp;amp;amp; GOSST&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/how-to-slsa-part-1-basics.html&amp;#34;&amp;gt;our last post&amp;lt;/a&amp;gt; we introduced a fictional example of Squirrel, Oppy, and Acme learning to use SLSA and covered the basics of what their implementations might look like. Today we’ll cover the details: where to store attestations and policies, what policies should check, and how to handle key distribution and trust.&amp;lt;br&amp;gt;
Attestation storage&amp;lt;br&amp;gt;
Attestations play a large role in SLSA and it’s essential that consumers of artifacts know where to find the attestations for those artifacts.&amp;lt;br&amp;gt;
Co-located in repo Attestations could be colocated in the repository that hosts the artifact. This is how Squirrel plans to store attestations for packages. They even want to add support to the Squirrel CLI (e.g. acorn get-attestations foo@1.2.3). Acme really likes this approach because the attestations are always available and it doesn’t introduce any new dependencies.&amp;lt;br&amp;gt;
Rekor&amp;lt;br&amp;gt;
Meanwhile, Oppy plans to store attestations in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/rekor&amp;#34;&amp;gt;Rekor&amp;lt;/a&amp;gt; . They like being able to direct users to an existing public instance while not having to maintain any new infrastructure themselves, and the in-depth defense the transparency log provides against tampering with the attestations. Though the latency of querying attestations from Rekor is likely too high for doing verification at time of use, Oppy isn’t too concerned since they expect users to query Rekor at install time. Hybrid A hybrid model is also available where the publisher stores the attestations in Rekor as well as co-located with the artifact in the repo—along with Rekor’s inclusion proof. This provides confidence the data was added to Rekor while providing the benefits of co-locating attestations in the repository.&amp;lt;br&amp;gt;
Policy content&amp;lt;br&amp;gt;
‘Policy’ refers to the rules used to determine if an artifact should be allowed for a use case. Policies often use the package name as a proxy for determining the use case. An example being, if you want to find the policy to apply you could look up the policy using the package name of the artifact you’re evaluating. Policy specifics may vary based on ease of use, availability of data, risk tolerance and more. Full verification needs more from policies than delegated verification does.&amp;lt;br&amp;gt;
Default policy Default policies allow admission decisions without the need to create specific policies for each package. A default policy is a way of saying “anything that doesn’t have a more specific policy must comply with this policy”. Squirrel plans to eventually implement a default policy of “any package without a more specific policy will be accepted as long as it meets SLSA 3”, but they recognize that most packages don’t support this yet. Until they achieve critical mass they’ll have a default SLSA 0 policy (all artifacts are accepted). While Oppy is leaving verification to their users, they’ll suggest a default policy of “any package built by ‘https://oppy.example/slsa/builder/v1’”.&amp;lt;br&amp;gt;
Specific policy Squirrel also plans to allow users to create policies for specific packages. For example, this policy requires that package ‘foo’ must have been built by GitHub Actions, from github.com/foo/acorn-foo, and be SLSA 4.&amp;lt;br&amp;gt;
scope : &amp;amp;#39;acorn://foo&amp;amp;#39;&amp;lt;br&amp;gt;
target_level : SLSA_L4&amp;lt;br&amp;gt;
allow_github_actions {&amp;lt;br&amp;gt;
workflow : &amp;amp;#39;https://github.com/gossts/slsa-acorn/.github/workflows/builder.yml@main&amp;amp;#39;&amp;lt;br&amp;gt;
source_repo : &amp;amp;#39;https://github.com/foo/acorn-foo.git&amp;amp;#39;&amp;lt;br&amp;gt;
allow_branch : &amp;amp;#39;main&amp;amp;#39;&amp;lt;br&amp;gt;
Squirrel will also allow packages to create SLSA 0 policies if they’re not using SLSA compliant infrastructure.&amp;lt;br&amp;gt;
scope : &amp;amp;#39;acorn://qux&amp;amp;#39;&amp;lt;br&amp;gt;
Policy auto generation&amp;lt;br&amp;gt;
Squirrel has an enormous number of existing packages. It’s not feasible to get all those package maintainers to create specific policies themselves. Therefore, Squirrel plans to leverage &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Process_mining&amp;#34;&amp;gt;process mining&amp;lt;/a&amp;gt; to auto generate policies for packages based on the history of the package. E.g. “The last 10 times Squirrel package foo was published it was built by GitHub Actions from github.com/foo/acorn-foo, and met SLSA 4 (this is the policy above). Let’s create a policy that requires that and send it to the maintainers to review.” Policy add-ons Policy evaluation could do more than just evaluate the SLSA requirements. The same policies that check SLSA requirements are well placed to check other properties that are important to organizations like “was static analysis performed”, “are there any known CVEs in this artifact”, “was integration testing successful”, etc… Acme is really interested in some of these policy add-ons. They’d like to avoid the embarrassing situation of publishing a new container image with known CVEs. They’re not sure how to implement it yet but they’ll be on the lookout for tools that can help them do so.&amp;lt;br&amp;gt;
Delegated policies When using delegated verification there’s much less that actually needs to be checked and they can be hard-coded directly in tooling. A minimal delegated verification policy might be “allow if trusted-party verified this artifact (identified by digest) as &amp;amp;lt;package name&amp;amp;gt;”. This can be tightened further by adding requirements on the artifact &amp;amp;amp; its dependencies SLSA levels (data which is available in the VSA). For example, “allow if trusted-party verified this artifact as &amp;amp;lt;package name&amp;amp;gt; at SLSA 3 and it doesn’t have any dependencies less than SLSA 2”.&amp;lt;br&amp;gt;
# Delegated verification implicitly checks that the package name we&amp;amp;#39;re&amp;lt;br&amp;gt;
# checking matches the VSA&amp;amp;#39;s subject.name field.&amp;lt;br&amp;gt;
allow_delegated_verification {&amp;lt;br&amp;gt;
trusted_verifier : &amp;amp;#39;https://delegatedverifier.com/slsa/v1&amp;amp;#39;&amp;lt;br&amp;gt;
minimum_level : SLSA_L3&amp;lt;br&amp;gt;
minimum_dependency_level : SLSA_L2&amp;lt;br&amp;gt;
Policy storage&amp;lt;br&amp;gt;
When using specific, non-default, policies …</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220416-001331/</link>
      <pubDate>Sat, 16 Apr 2022 00:13:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220416-001331/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#customization-points&amp;#34;&amp;gt;customization-points&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#name-lookup&amp;#34;&amp;gt;name-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#standard-library-trivia&amp;#34;&amp;gt;standard-library-trivia&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
As seen on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;cpplang Slack&amp;lt;/a&amp;gt; (hat tip to Jody Hagins).
Recall my post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the std::swap two-step?”&amp;lt;/a&amp;gt; (2020-07-11), where I said:&amp;lt;br&amp;gt;
A qualified call like&amp;lt;br&amp;gt;
base::frotz(t)&amp;lt;br&amp;gt;
indicates, “I’m sure I know how to&amp;lt;br&amp;gt;
frotz&amp;lt;br&amp;gt;
whatever this thing may be.
No type&amp;lt;br&amp;gt;
T&amp;lt;br&amp;gt;
will ever know better than me how to&amp;lt;br&amp;gt;
.”&amp;lt;br&amp;gt;
An unqualified call using the two-step, like&amp;lt;br&amp;gt;
using my::xyzzy; xyzzy(t)&amp;lt;br&amp;gt;
, indicates,
“I know one way to&amp;lt;br&amp;gt;
xyzzy&amp;lt;br&amp;gt;
whatever this thing may be, but&amp;lt;br&amp;gt;
itself might know a better way.
If&amp;lt;br&amp;gt;
has an opinion, you should trust&amp;lt;br&amp;gt;
over me.”&amp;lt;br&amp;gt;
An unqualified call not using the two-step, like&amp;lt;br&amp;gt;
plugh(t)&amp;lt;br&amp;gt;
, indicates, “Not only should you trust&amp;lt;br&amp;gt;
over me, but I myself have no idea how to&amp;lt;br&amp;gt;
plugh&amp;lt;br&amp;gt;
anything. Type&amp;lt;br&amp;gt;
must come up with a solution;
I offer no guidance here.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220416-001250/</link>
      <pubDate>Sat, 16 Apr 2022 00:12:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220416-001250/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/13/Three-Perfect-Tools&amp;#34;&amp;gt;Three Perfect Tools&amp;lt;/a&amp;gt; · We live in a world of things that have Product Managers and Design Teams and Documentation Architecture and often vast     ambition. And yet, so many of them are so bad.  And worse, some which are good &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/07/Apps-Get-Worse&amp;#34;&amp;gt;then become bad&amp;lt;/a&amp;gt; for no good reason.     There is a particular joy in a product that just does what you need done, in     about the way you expect or (thrillingly) better, and isn’t hard to figure out, and doesn’t change unnecessarily. Here are three     to learn from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/13/Three-Perfect-Tools&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
, selected pointers to long-form pieces that have added value to my semi-retired     days and one or two of which might reward you if you make time for them.  A few of this month’s pieces aren’t free; it’s a     bitter fact that the truth is paywalled but the lies are free. Sorry &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/04/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220416-000850/</link>
      <pubDate>Sat, 16 Apr 2022 00:08:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220416-000850/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-we-upgraded-postgresql-database/&amp;#34;&amp;gt;Last fall, we migrated our 4TB Postgres database from version 9.6 to version 13 with minimal downtime. In this post, we’ll tell the story and share tips to help you with a similar upgrade.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-component-libraries/&amp;#34;&amp;gt;Get an overview of the best React component libraries looking at several factors like popularity, use cases, documentation, resources, support, and more.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/filtering-data-in-react-filter-map-and-for-loops/&amp;#34;&amp;gt;In this post, you’ll learn some common data filtering techniques in JavaScript and their application in React. We’ll run through `filter()`, `map()`, and good old `for` loops, covering their strengths and limitations, and when to use a specific method over another.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20220416-000805/</link>
      <pubDate>Sat, 16 Apr 2022 00:08:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20220416-000805/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/heresy.html&amp;#34;&amp;gt;Heresy&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/words.html&amp;#34;&amp;gt;Words&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/goodtaste.html&amp;#34;&amp;gt;Taste&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/smart.html&amp;#34;&amp;gt;Smart&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/weird.html&amp;#34;&amp;gt;Weird&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220416-000737/</link>
      <pubDate>Sat, 16 Apr 2022 00:07:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220416-000737/</guid>
      <description>This is taking longer than expected, check your Internet connection and reload the page if the problem persists.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220416-000730/</link>
      <pubDate>Sat, 16 Apr 2022 00:07:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220416-000730/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/computer-science-open-data/&amp;#34;&amp;gt;Computer Science Open Data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/computer-science-open-data/#cs-faculty-composition-and-hiring-trends&amp;#34;&amp;gt;CS Faculty&amp;lt;/a&amp;gt; Composition and Hiring Trends [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drafty.cs.brown.edu/csprofessors?src=jeffhome&amp;#34;&amp;gt;source&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
Bias in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/computer-science-open-data/#bias-in-computer-science-rankings&amp;#34;&amp;gt;Computer Science Rankings&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drafty.cs.brown.edu/csopenrankings/&amp;#34;&amp;gt;source&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
Who Wins &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/computer-science-open-data/#who-wins-cs-best-paper-awards&amp;#34;&amp;gt;CS Best Paper Awards&amp;lt;/a&amp;gt; ? [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/best_paper_awards/&amp;#34;&amp;gt;source&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
Verified &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/computer-science-open-data/#verified-computer-science-phd-stipends&amp;#34;&amp;gt;Computer Science Ph.D. Stipends&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://forms.gle/oLaYneCnvHCX6CKPA&amp;#34;&amp;gt;source&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
On Timeless Publishing&amp;lt;br&amp;gt;
On Personal Data Tracking&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Deprocrastination Blog - Guides and digital tools on how to stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220416-000705/</link>
      <pubDate>Sat, 16 Apr 2022 00:07:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220416-000705/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-not-to-get-overwhelmed-by-tasks&amp;#34;&amp;gt;How not to get overwhelmed by tasks&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-increase-your-attention-span-5-key-strategies&amp;#34;&amp;gt;How to increase your attention span: 5 key strategies&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/learn-to-tolerate-discomfort-or-suffer-escaping-from-it&amp;#34;&amp;gt;Learn to tolerate discomfort or suffer escaping from it&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;#39;t scrolling or watching&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/quiz&amp;#34;&amp;gt;Take a quiz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220416-000622/</link>
      <pubDate>Sat, 16 Apr 2022 00:06:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220416-000622/</guid>
      <description>&amp;lt;p&amp;gt;Microsoft on Tuesday released updates to fix roughly 120 security vulnerabilities in its Windows operating systems and other software. Two of the flaws have been publicly detailed prior to this week, and one is already seeing active exploitation, according to a report from the U.S. National Security Agency (NSA).&amp;lt;br&amp;gt;
Of particular concern this month is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24521&amp;#34;&amp;gt;CVE-2022-24521&amp;lt;/a&amp;gt; , which is a “privilege escalation” vulnerability in the Windows common log file system driver. In its advisory, Microsoft said it received a report from the NSA that the flaw is under active attack.&amp;lt;br&amp;gt;
“It’s not stated how widely the exploit is being used in the wild, but it’s likely still targeted at this point and not broadly available,” assessed Dustin Childs with Trend Micro’s Zero Day Initiative. “Go patch your systems before that situation changes.”&amp;lt;br&amp;gt;
Nine of the updates pushed this week address problems Microsoft considers “critical,” meaning the flaws they fix could be abused by malware or malcontents to seize total, remote access to a Windows system without any help from the user.&amp;lt;br&amp;gt;
Among the scariest critical bugs is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26809&amp;#34;&amp;gt;CVE-2022-26809,&amp;lt;/a&amp;gt; a potentially “wormable” weakness in a core Windows component ( RPC ) that earned a CVSS score of 9.8 (10 being the worst). Microsoft said it believes exploitation of this flaw is more likely than not.&amp;lt;br&amp;gt;
Other potentially wormable threats this month include &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24491&amp;#34;&amp;gt;CVE-2022-24491&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24497&amp;#34;&amp;gt;CVE-2022-24497&amp;lt;/a&amp;gt; , Windows Network File System (NFS) vulnerabilities that also clock in at 9.8 CVSS scores and are listed as “exploitation more likely by Microsoft.”&amp;lt;br&amp;gt;
“These could be the kind of vulnerabilities which appeal to ransomware operators as they provide the potential to expose critical data,” said Kevin Breen , director of cyber threat research at Immersive Labs . “It is also important for security teams to note that NFS Role is not a default configuration for Windows devices.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/microsoft-patch-tuesday-april-2022-edition/#more-59439&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The U.S. Department of Justice (DOJ) said today it seized the website and user database for RaidForums , an extremely popular English-language cybercrime forum that sold access to more than 10 billion consumer records stolen in some of the world’s largest data breaches since 2015. The DOJ also charged the alleged administrator of RaidForums — 21-year-old Diogo Santos Coelho , of Portugal — with six criminal counts, including conspiracy, access device fraud and aggravated identity theft.&amp;lt;br&amp;gt;
The “raid” in RaidForums is a nod to the community’s humble beginnings in 2015, when it was primarily an online venue for organizing and supporting various forms of electronic harassment. According to the DOJ, that early activity included ‘ raiding ‘ — posting or sending an overwhelming volume of contact to a victim’s online communications medium — and ‘ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/tag/swatting/&amp;#34;&amp;gt;swatting&amp;lt;/a&amp;gt; ,’ the practice of making false reports to public safety agencies of situations that would necessitate a significant, and immediate armed law enforcement response.”&amp;lt;br&amp;gt;
But over the years as trading in hacked databases became big business, RaidForums emerged as the go-to place for English-speaking hackers to peddle their wares. Perhaps the most bustling marketplace within RaidForums was its “ Leaks Market ,” which described itself as a place to buy, sell, and trade hacked databases and leaks.&amp;lt;br&amp;gt;
The government alleges Coelho and his forum administrator identity “ Omnipotent ” profited from the illicit activity on the platform by charging “escalating prices for membership tiers that offered greater access and features, including a top-tier ‘God’ membership status.”&amp;lt;br&amp;gt;
“RaidForums also sold ‘credits’ that provided members access to privileged areas of the website and enabled members to ‘unlock’ and download stolen financial information, means of identification, and data from compromised databases, among other items,” the DOJ said in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-edva/pr/us-leads-seizure-one-world-s-largest-hacker-forums-and-arrests-administrator&amp;#34;&amp;gt;a written statement&amp;lt;/a&amp;gt; . “Members could also earn credits through other means, such as by posting instructions on how to commit certain illegal acts.”&amp;lt;br&amp;gt;
Prosecutors say Coelho also personally sold stolen data on the platform, and that Omnipotent directly facilitated illicit transactions by operating a fee-based “ Official Middleman ” service, a kind of escrow or insurance service that denizens of RaidForums were encouraged to use when transacting with other criminals.&amp;lt;br&amp;gt;
Investigators described multiple instances wherein undercover federal agents or confidential informants used Omnipotent’s escrow service to purchase huge tranches of data from one of Coelho’s alternate user  identities — meaning Coelho not only sold data he’d personally hacked but also further profited by insisting the transactions were handled through his own middleman service.&amp;lt;br&amp;gt;
Not all of those undercover buys went as planned. One incident described in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-edva/press-release/file/1493601/download&amp;#34;&amp;gt;an affidavit by prosecutors&amp;lt;/a&amp;gt; (PDF) appears related to the sale of tens of millions of consumer records stolen last year from T-Mobile , although the government refers to the victim only as a major telecommunications company and wireless network operator in the United States.&amp;lt;br&amp;gt;
On Aug. 11, 2021, an individual using the moniker “ SubVirt ” posted on RaidForums an offer to sell Social Security numbers, dates of birth and other records on more than 120 million people in the United States (SubVirt would later edit the sales thread to say 30 million records). Just days later, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/&amp;#34;&amp;gt;T-Mobile would acknowledge a data breach&amp;lt;/a&amp;gt; affecting 40 million current, former or prospective customers who applied for credit with the company.&amp;lt;br&amp;gt;
The government says the victim firm hired a third-party to purchase the database and prevent it from being sold to cybercriminals. That third-party ultimately paid approximately $200,000 worth of bitcoin to the seller, with the agreement that the data would be destroyed after sale. “However, it appears the co-conspirators continued to attempt to sell the databases after the third-party’s purchase,” the affidavit alleges.&amp;lt;br&amp;gt;
The FBI’s seizure of RaidForums was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/&amp;#34;&amp;gt;first reported by KrebsOnSecurity on Mar. 23&amp;lt;/a&amp;gt; , after a federal investigator confirmed rumors that the FBI had been secretly operating the RaidForums website for weeks. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/raidforums-get-raided-alleged-admin-arrested/#more-59419&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many seemingly disparate crypto scam websites tend to rely on the same dodgy infrastructure providers to remain online in the face of massive fraud and abuse complaints from their erstwhile customers. Here’s a closer look at hundreds of phony crypto investment schemes that are all connected through a hosting provider which caters to people running crypto scams.&amp;lt;br&amp;gt;
A security researcher recently shared with KrebsOnSecurity an email he received from someone who said they foolishly invested an entire bitcoin (currently worth ~USD $43,000) at a website called ark-x2[.]org, which promised to double any cryptocurrency investment made with the site.&amp;lt;br&amp;gt;
The ark-x2[.]org site pretended to be a crypto giveaway website run by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/CathieDWood&amp;#34;&amp;gt;Cathie Wood&amp;lt;/a&amp;gt; , the founder and CEO of ARKinvest , an established Florida company that manages several exchange-traded investment funds. This is hardly the first time scammers have impersonated Wood or ARKinvest; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/cathiedwood/status/1313547340272340993?lang=en&amp;#34;&amp;gt;a tweet from Wood in 2020 warned&amp;lt;/a&amp;gt; that the company would never use YouTube, Twitter, Instagram or any social media to solicit money.&amp;lt;br&amp;gt;
At the crux of these scams are well-orchestrated video productions published on YouTube and Facebook that claim to be a “live event” featuring famous billionaires. In reality, these videos just rehash older footage while peppering viewers with prompts to sign up at a scam investment site — one they claim has been endorsed by the celebrities.&amp;lt;br&amp;gt;
“I was watching a live video at YouTube where Elon Musk, Cathy Wood, and Jack Dorsey were talking about Crypto,” the victim told my security researcher friend. “An overlay on the video pointed to subscribing to the event at their website. I’ve been following Cathy Wood in her analysis on financial markets, so I was in a comfortable and trusted environment. The three of them are bitcoin maximalists in a sense, so it made perfect sense they were organizing a giveaway.”&amp;lt;br&amp;gt;
“Without any doubt (other than whether the transfer would go through), I sent them 1 BTC (~$42,800), and they were supposed to return 2 BTC back,” the victim continued. “In hindsight, this was an obvious scam. But the live video and the ARK Invest website is what produced the trusted environment to me. I realized a few minutes later, when the live video looped. It wasn’t actually live, but a replay of a video from 6 months ago.”&amp;lt;br&amp;gt;
Ark-x2[.]org is no longer online. But a look at the Internet address historically tied to this domain (186.2.171.79) shows the same address is used to host or park &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1R3fZBzb75eQ3_RSxZ1Oq2DErZpkN-f5IMZj4i8IRs80/edit?usp=sharing&amp;#34;&amp;gt;hundreds of other newly-minted crypto scam domains&amp;lt;/a&amp;gt; , including coinbase-x2[.]net (pictured below).&amp;lt;br&amp;gt;
The crypto scam site coinbase-x2[.]net, which snares unwary investors with promises of free money.&amp;lt;br&amp;gt;
Typical of crypto scam sites, Coinbase-x2 promises a chance to win 50,000 ETH (Ethereum virtual currency), plus a “welcome bonus” wherein they promise to double any crypto investment made with the platform. But everyone who falls for this greed trap soon discovers they won’t be getting anything in return, and that their “investment” is gone forever.&amp;lt;br&amp;gt;
There isn’t a lot of information about who bought these crypto scam domains, as most of them were registered in the past month at registrars that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/03/who-is-afraid-of-more-spams-and-scams/&amp;#34;&amp;gt;automatically redact the site’s WHOIS ownership records&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
However, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/04/cryptohost-us.txt&amp;#34;&amp;gt;several dozen of the domains&amp;lt;/a&amp;gt; are in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/.us&amp;#34;&amp;gt;.us domain space&amp;lt;/a&amp;gt; , which is technically supposed to be reserved for entities physically based in the United States. Those Dot-us domains all contain the registrant name Sergei Orlovets from Moscow, the email address &amp;lt;a href=&amp;#34;mailto:ulaninkirill52@gmail.com&amp;#34;&amp;gt;ulaninkirill52@gmail.com&amp;lt;/a&amp;gt; , and the phone number &#43;7.9914500893 . Unfortunately, each of these clues lead to a dead end, meaning they were likely picked and used solely for these scam sites.&amp;lt;br&amp;gt;
A dig into the Domain Name Server (DNS) records for Coinbase-x2[.]net shows it is hosted at a service called Cryptohost[.]to . …&amp;lt;/p&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20220416-000619/</link>
      <pubDate>Sat, 16 Apr 2022 00:06:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20220416-000619/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2022/04/13/sbt-s.html&amp;#34;&amp;gt;What “[S]” means in sbt’s dependencyTree output&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>mtlynch.io</title>
      <link>https://www.whatsupup.com/blog/tweediest/constructed/20220409-121207/</link>
      <pubDate>Sat, 09 Apr 2022 12:12:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tweediest/constructed/20220409-121207/</guid>
      <description>I&amp;#39;m Michael Lynch, software developer and blogger. I used to work as a
software engineer at large companies, but now I run small software
businesses of my own and blog about the process.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220409-001648/</link>
      <pubDate>Sat, 09 Apr 2022 00:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220409-001648/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/signup?utm_source=substack&amp;amp;utm_medium=web&amp;amp;utm_content=footer&amp;#34;&amp;gt;Publish on Substack&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/app/app-store-redirect?utm_campaign=app-marketing&amp;amp;utm_content=web-footer-button&amp;#34;&amp;gt;Get the app&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220408-160650/</link>
      <pubDate>Fri, 08 Apr 2022 16:06:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220408-160650/</guid>
      <description>The U.S. Federal Bureau of Investigation (FBI) says it has disrupted a giant botnet built and operated by a Russian government intelligence unit known for launching destructive cyberattacks against energy infrastructure in the United States and Ukraine. Separately, law enforcement agencies in the U.S. and Germany moved to decapitate “ Hydra ,” a billion-dollar Russian darknet drug bazaar that also helped to launder the profits of multiple Russian ransomware groups.&amp;lt;br&amp;gt;
FBI officials &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fbi.gov/news/pressrel/press-releases/director-christopher-wray-announces-actions-to-disrupt-and-prosecute-russian-criminal-activity-040622&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; Wednesday they disrupted “ Cyclops Blink ,” a collection of compromised networking devices managed by hackers working with the Russian Federation’s Main Intelligence Directorate (GRU).&amp;lt;br&amp;gt;
A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-botnet-controlled-russian-federation&amp;#34;&amp;gt;statement&amp;lt;/a&amp;gt; from the U.S. Department of Justice (DOJ) says the GRU’s hackers built Cyclops Blink by exploiting previously undocumented security weaknesses in firewalls and routers made by both ASUS and WatchGuard Technologies . The DOJ said it did not seek to disinfect compromised devices; instead, it obtained court orders to remove the Cyclops Blink malware from its “command and control” servers — the hidden machines that allowed the attackers to orchestrate the activities of the botnet.&amp;lt;br&amp;gt;
The FBI and other agencies &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ncsc.gov.uk/news/joint-advisory-shows-new-sandworm-malware-cyclops-blink-replaces-vpnfilter&amp;#34;&amp;gt;warned in March&amp;lt;/a&amp;gt; that the Cyclops Blink malware was built to replace a threat called “ VPNFilter ,” an earlier malware platform that targeted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/05/fbi-kindly-reboot-your-router-now-please/&amp;#34;&amp;gt;vulnerabilities in a number of consumer-grade wireless and wired routers&amp;lt;/a&amp;gt; . In May 2018, the FBI executed a similar strategy to dismantle VPNFilter, which had spread to more than a half-million consumer devices.&amp;lt;br&amp;gt;
On April 1, ASUS &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.asus.com/content/ASUS-Product-Security-Advisory/&amp;#34;&amp;gt;released updates&amp;lt;/a&amp;gt; to fix the security vulnerability in a range of its Wi-Fi routers. Meanwhile, WatchGuard appears to have &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/information-technology/2022/04/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers/?utm_source=twitter&amp;amp;utm_social-type=owned&amp;amp;utm_brand=ars&amp;amp;utm_medium=social&amp;#34;&amp;gt;silently fixed its vulnerability in an update shipped almost a year ago&amp;lt;/a&amp;gt; , according to Dan Goodin at Ars Technica. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/actions-target-russian-govt-botnet-hydra-dark-market/#more-59305&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/actions-target-russian-govt-botnet-hydra-dark-market/&amp;#34;&amp;gt;Actions Target Russian Govt. Botnet, Hydra Dark Market&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220408-041805/</link>
      <pubDate>Fri, 08 Apr 2022 04:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220408-041805/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/11/24/species-subtraction-made-simple/&amp;#34;&amp;gt;Species subtraction made simple&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220408-041529/</link>
      <pubDate>Fri, 08 Apr 2022 04:15:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220408-041529/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/elon-musk-and-twitters-business-are&amp;#34;&amp;gt;Elon Musk And Twitter’s Business Are On A Collision Course&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/elon-musk-and-twitters-business-are&amp;#34;&amp;gt;As Twitter&amp;#39;s revenue explodes due to its brand safety push, Musk wants a return it to the freewheeling times of old.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-antitrust-movement-is&amp;#34;&amp;gt;The Big Tech Antitrust Movement Is Finally Showing Results&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-antitrust-movement-is&amp;#34;&amp;gt;In one week, Google opened direct payments to Android developers and Europe passed the Digital Markets Act. It’s not the return of the free market, but…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220408-001339/</link>
      <pubDate>Fri, 08 Apr 2022 00:13:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220408-001339/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html&amp;#34;&amp;gt;CVE-2021-30737, @xerub&amp;amp;amp;#39;s 2021 iOS ASN.1 Vulnerability&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220407-161536/</link>
      <pubDate>Thu, 07 Apr 2022 16:15:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220407-161536/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/04/cve-2021-30737-xerubs-2021-ios-asn1.html&amp;#34;&amp;gt;CVE-2021-30737, @xerub&amp;#39;s 2021 iOS ASN.1 Vulnerability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ian Beer, Google Project Zero&amp;lt;br&amp;gt;
This blog post is my analysis of a vulnerability found by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/xerub&amp;#34;&amp;gt;@xerub&amp;lt;/a&amp;gt; . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://phrack.org/issues/70/12.html#article&amp;#34;&amp;gt;Phrack published @xerub&amp;amp;#39;s writeup&amp;lt;/a&amp;gt; so go check that out first.&amp;lt;br&amp;gt;
As well as doing my own vulnerability research I also spend time trying as best as I can to keep up with the public state-of-the-art, especially when details of a particularly interesting vulnerability are announced or a new in-the-wild exploit is caught. Originally this post was just a series of notes I took last year as I was trying to understand this bug. But the bug itself and the narrative around it are so fascinating that I thought it would be worth writing up these notes into a more coherent form to share with the community.&amp;lt;br&amp;gt;
On April 14th 2021 the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/&amp;#34;&amp;gt;Washington Post published an article&amp;lt;/a&amp;gt; on the unlocking of the San Bernardino iPhone by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en/article/8xdayg/iphone-zero-days-inside-azimuth-security&amp;#34;&amp;gt;Azimuth&amp;lt;/a&amp;gt; containing a nugget of non-public information:&amp;lt;br&amp;gt;
&amp;amp;#34; Azimuth specialized in finding significant vulnerabilities . Dowd [...] had found one in open-source code from Mozilla that Apple used to permit accessories to be plugged into an iPhone’s lightning port, according to the person. &amp;amp;#34;&amp;lt;br&amp;gt;
There&amp;amp;#39;s not that much Mozilla code running on an iPhone and even less which is likely to be part of such an attack surface. Therefore, if accurate, this quote almost certainly meant that Azimuth had exploited a vulnerability in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/ASN.1&amp;#34;&amp;gt;ASN.1&amp;lt;/a&amp;gt; parser used by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.apple.com/source/Security/&amp;#34;&amp;gt;Security.framework&amp;lt;/a&amp;gt; , which is a fork of Mozilla&amp;amp;#39;s NSS ASN.1 parser.&amp;lt;br&amp;gt;
I searched around in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugzilla.mozilla.org/&amp;#34;&amp;gt;bugzilla&amp;lt;/a&amp;gt; (Mozilla&amp;amp;#39;s issue tracker) looking for candidate vulnerabilities which matched the timeline discussed in the Post article and narrowed it down to a handful of plausible bugs including: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugzilla.mozilla.org/show_bug.cgi?id=1202868&amp;#34;&amp;gt;1202868&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugzilla.mozilla.org/show_bug.cgi?id=1192028&amp;#34;&amp;gt;1192028&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugzilla.mozilla.org/show_bug.cgi?id=1245528&amp;#34;&amp;gt;1245528&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
I was surprised that there had been so many exploitable-looking issues in the ASN.1 code and decided to add auditing the NSS ASN.1 parser as an quarterly goal.&amp;lt;br&amp;gt;
A month later, having predictably done absolutely nothing more towards that goal, I saw this &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/xerub/status/1397190931653222400&amp;#34;&amp;gt;tweet from @xerub&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
@xerub: CVE-2021-30737 is pretty bad. Please update ASAP. (Shameless excerpt from the full chain source code) 4:00 PM - May 25, 2021&amp;lt;br&amp;gt;
The shameless excerpt reads:&amp;lt;br&amp;gt;
// This is the real deal. Take no chances, take no prisoners! I AM THE STATE MACHINE!&amp;lt;br&amp;gt;
And CVE-2021-30737, fixed in iOS 14.6 was described in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.apple.com/en-us/HT212528#:~:text=2021%2D30699%3A%20videosdebarraquito-,Security,CVE%2D2021%2D30737%3A%20xerub,-WebKit&amp;#34;&amp;gt;iOS release notes&amp;lt;/a&amp;gt; as:&amp;lt;br&amp;gt;
Impact: Processing a maliciously crafted certification may lead to arbitrary code execution&amp;lt;br&amp;gt;
Description: A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code.&amp;lt;br&amp;gt;
Feeling slightly annoyed that I hadn&amp;amp;#39;t acted on my instincts as there was clearly something awesome lurking there I made a mental note to diff the source code once Apple released it which they finally did a few weeks later on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.apple.com/source/Security/Security-59754.120.12/&amp;#34;&amp;gt;opensource.apple.com in the Security package&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Here&amp;amp;#39;s the diff between the MacOS 11.4 and 11.3 versions of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.apple.com/source/Security/Security-59754.120.12/OSX/libsecurity_asn1/lib/secasn1d.c.auto.html&amp;#34;&amp;gt;secasn1d.c&amp;lt;/a&amp;gt; which contains the ASN.1 parser:&amp;lt;br&amp;gt;
diff -- git a / OSX / libsecurity_asn1 / lib / secasn1d . c b / OSX / libsecurity_asn1 / lib / secasn1d . c&amp;lt;br&amp;gt;
index f338527 .. 5b4915a 100644&amp;lt;br&amp;gt;
--- a / OSX / libsecurity_asn1 / lib / secasn1d . c&amp;lt;br&amp;gt;
&#43;&#43;&#43; b / OSX / libsecurity_asn1 / lib / secasn1d . c&amp;lt;br&amp;gt;
@@ - 434 , 9 &#43; 434 , 6 @@ loser :&amp;lt;br&amp;gt;
PORT_ArenaRelease ( cx -&amp;amp;gt; our_pool , state -&amp;amp;gt; our_mark );&amp;lt;br&amp;gt;
state -&amp;amp;gt; our_mark = NULL ;&amp;lt;br&amp;gt;
- if ( new_state != NULL ) {&amp;lt;br&amp;gt;
- PORT_Free ( new_state );&amp;lt;br&amp;gt;
- }&amp;lt;br&amp;gt;
return NULL ;&amp;lt;br&amp;gt;
@@ - 1794 , 19 &#43; 1791 , 13 @@ sec_asn1d_parse_bit_string ( sec_asn1d_state * state ,&amp;lt;br&amp;gt;
/*PORT_Assert (state-&amp;amp;gt;pending &amp;amp;gt; 0); */&amp;lt;br&amp;gt;
PORT_Assert ( state -&amp;amp;gt; place == beforeBitString );&amp;lt;br&amp;gt;
- if (( state -&amp;amp;gt; pending == 0 ) || ( state -&amp;amp;gt; contents_length == 1 )) {&amp;lt;br&amp;gt;
&#43; if ( state -&amp;amp;gt; pending == 0 ) {&amp;lt;br&amp;gt;
if ( state -&amp;amp;gt; dest != NULL ) {&amp;lt;br&amp;gt;
SecAsn1Item * item = ( SecAsn1Item *)( state -&amp;amp;gt; dest );&amp;lt;br&amp;gt;
item -&amp;amp;gt; Data = NULL ;&amp;lt;br&amp;gt;
item -&amp;amp;gt; Length = 0 ;&amp;lt;br&amp;gt;
state -&amp;amp;gt; place = beforeEndOfContents ;&amp;lt;br&amp;gt;
- if ( state -&amp;amp;gt; contents_length == 1 ) {&amp;lt;br&amp;gt;
- /* skip over (unused) remainder byte */&amp;lt;br&amp;gt;
- return 1 ;&amp;lt;br&amp;gt;
- else {&amp;lt;br&amp;gt;
&#43; return 0 ;&amp;lt;br&amp;gt;
The first change (removing the PORT_Free ) is immaterial for Apple&amp;amp;#39;s use case as it&amp;amp;#39;s fixing a double free which doesn&amp;amp;#39;t impact Apple&amp;amp;#39;s build. It&amp;amp;#39;s only relevant when &amp;amp;#34;allocator marks&amp;amp;#34; are enabled and this feature is disabled.&amp;lt;br&amp;gt;
The vulnerability must therefore be in sec_asn1d_parse_bit_string . We know from xerub&amp;amp;#39;s tweet that something goes wrong with a state machine, but to figure it out we need to cover some ASN.1 basics and then start looking at how the NSS ASN.1 state machine works.&amp;lt;br&amp;gt;
ASN.1 encoding&amp;lt;br&amp;gt;
ASN.1 is a Type-Length-Value serialization format, but with the neat quirk that it can also handle the case when you don&amp;amp;#39;t know the length of the value, but want to serialize it anyway! That quirk is only possible when ASN.1 is encoded according to Basic Encoding Rules (BER.) There is a stricter encoding called DER (Distinguished Encoding Rules) which enforces that a particular value only has a single correct encoding and disallows the cases where you can serialize values without knowing their eventual lengths.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://luca.ntop.org/Teaching/Appunti/asn1.html&amp;#34;&amp;gt;This page is a nice beginner&amp;amp;#39;s guide to ASN.1&amp;lt;/a&amp;gt; . I&amp;amp;#39;d really recommend skimming that to get a good overview of ASN.1.&amp;lt;br&amp;gt;
There are a lot of built-in types in ASN.1. I&amp;amp;#39;m only going to describe the minimum required to understand this vulnerability (mostly because I don&amp;amp;#39;t know any more than that!) So let&amp;amp;#39;s just start from the very first byte of a serialized ASN.1 object and figure out how to decode it:&amp;lt;br&amp;gt;
This first byte tells you the type, with the least significant 5 bits defining the type identifier. The special type identifier value of 0x1f tells you that the type identifier doesn&amp;amp;#39;t fit in those 5 bits and is instead encoded in a different way (which we&amp;amp;#39;ll ignore):&amp;lt;br&amp;gt;
Diagram showing first two bytes of a serialized ASN.1 object. The first byte in this case is the type and class identifier and the second is the length.&amp;lt;br&amp;gt;
The upper two bits of the first byte tell you the class of the type: universal, application, content-specific or private. For us, we&amp;amp;#39;ll leave that as 0 (universal.)&amp;lt;br&amp;gt;
Bit 6 is where the fun starts. A value of 1 tells us that this is a primitive encoding which means that following the length are content bytes which can be directly interpreted as the intended type. For example, a primitive encoding of the string &amp;amp;#34;HELLO&amp;amp;#34; as an ASN.1 printable string would have a length byte of 5 followed by the ASCII characters &amp;amp;#34; HELLO &amp;amp;#34;. All fairly straightforward.&amp;lt;br&amp;gt;
A value of 0 for bit 6 however tells us that this is a constructed encoding. This means that the bytes following the length are not the &amp;amp;#34;raw&amp;amp;#34; content bytes for the type but are instead ASN.1 encodings of one or more &amp;amp;#34;chunks&amp;amp;#34; which need to be individually parsed and concatenated to form the final output value. And to make things extra complicated it&amp;amp;#39;s also possible to specify a length value of 0 which means that you don&amp;amp;#39;t even know how long the reconstructed output will be or how much of the subsequent input will be required to completely build the output.&amp;lt;br&amp;gt;
This final case (of a constructed type with indefinite length) is known as indefinite form. The end of the input which makes up a single indefinite value is signaled by a serialized type with the identifier, constructed, class and length values all equal to 0 , which is encoded as two NULL bytes.&amp;lt;br&amp;gt;
ASN.1 bitstrings&amp;lt;br&amp;gt;
Most of the ASN.1 string types require no special treatment; they&amp;amp;#39;re just buffers of raw bytes. Some of them have length restrictions. For example: a BMP string must have an even length and a UNIVERSAL string must be a multiple of 4 bytes in length, but that&amp;amp;#39;s about it.&amp;lt;br&amp;gt;
ASN.1 bitstrings are strings of bits as opposed to bytes. You could for example have a bitstring with a length of a single bit (so either a 0 or 1 ) or a bitstring with a length of 127 bits (so 15 full bytes plus an extra 7 bits.)&amp;lt;br&amp;gt;
Encoded ASN.1 bitstrings have an extra metadata byte after the length but before the contents, which encodes the number of unused bits in the final byte.&amp;lt;br&amp;gt;
Diagram showing the complete encoding of a 3-bit bitstring. The length of 2 includes the unused-bits count byte which has a value of 5, indicating that only the 3 most-significant bits of the final byte are valid.&amp;lt;br&amp;gt;
Parsing ASN.1&amp;lt;br&amp;gt;
ASN.1 data always needs to be decoded in tandem with a template that tells the parser what data to expect and also provides output pointers to be filled in with the parsed output data. Here&amp;amp;#39;s the template my test program uses to exercise the bitstring code:&amp;lt;br&amp;gt;
const SecAsn1Template simple_bitstring_template [] = {&amp;lt;br&amp;gt;
SEC_ASN1_BIT_STRING | SEC_ASN1_MAY_STREAM , // kind: bit string,&amp;lt;br&amp;gt;
//  may be constructed&amp;lt;br&amp;gt;
0 , // offset: in dest/src&amp;lt;br&amp;gt;
NULL , // sub: subtemplate for indirection&amp;lt;br&amp;gt;
sizeof ( SecAsn1Item ) // size: of output structure&amp;lt;br&amp;gt;
A SecASN1Item is a very simple wrapper around a buffer. We can provide a SecAsn1Item for the parser to use to return the parsed bitstring then call the parser:&amp;lt;br&amp;gt;
SecAsn1Item decoded = { 0 };&amp;lt;br&amp;gt;
PLArenaPool * pool = PORT_NewArena ( 1024 );&amp;lt;br&amp;gt;
SECStatus status =&amp;lt;br&amp;gt;
SEC_ASN1Decode ( pool , // pool: arena for destination allocations&amp;lt;br&amp;gt;
&amp;amp;amp; decoded , // dest: decoded encoded items in to here&amp;lt;br&amp;gt;
&amp;amp;amp; simple_bitstring_template , // template&amp;lt;br&amp;gt;
asn1_bytes , // buf: asn1 input bytes&amp;lt;br&amp;gt;
asn1_bytes_len ); // len: input size&amp;lt;br&amp;gt;
NSS ASN.1 state machine&amp;lt;br&amp;gt;
The state machine has two core data structures:&amp;lt;br&amp;gt;
SEC_ASN1DecoderContext - the overall parsing context&amp;lt;br&amp;gt;
sec_asn1d_state - a single parser state, kept in a doubly-linked list forming a stack of nested states&amp;lt;br&amp;gt;
Here&amp;amp;#39;s a trimmed version of the state object showing the relevant fields:&amp;lt;br&amp;gt;
typedef struct sec_asn1d_state_struct {&amp;lt;br&amp;gt;
SEC_ASN1DecoderContext * top ;&amp;lt;br&amp;gt;
const SecAsn1Template * theTemplate ;&amp;lt;br&amp;gt;
void * dest ;&amp;lt;br&amp;gt;
struct sec_asn1d_state_struct * parent ;&amp;lt;br&amp;gt;
struct sec_asn1d_state_struct * child ;&amp;lt;br&amp;gt;
sec_asn1d_parse_place place ;&amp;lt;br&amp;gt;
unsigned long contents_length ;&amp;lt;br&amp;gt;
unsigned long pending ;&amp;lt;br&amp;gt;
unsigned long consumed ;&amp;lt;br&amp;gt;
int depth ;&amp;lt;br&amp;gt;
} sec_asn1d_state ;&amp;lt;br&amp;gt;
The main engine of the parsing state machine is the method …</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220407-161437/</link>
      <pubDate>Thu, 07 Apr 2022 16:14:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220407-161437/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/improving-software-supply-chain.html&amp;#34;&amp;gt;Improving software supply chain security with tamper-proof builds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Asra Ali and Laurent Simon, Google Open Source Security Team (GOSST)&amp;lt;br&amp;gt;
Many of the recent high-profile software attacks that have alarmed open-source users globally were consequences of supply chain integrity vulnerabilities: attackers gained control of a build server to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/&amp;#34;&amp;gt;use malicious source files&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/&amp;#34;&amp;gt;inject malicious artifacts&amp;lt;/a&amp;gt; into a compromised build platform, and bypass trusted builders to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://about.codecov.io/apr-2021-post-mortem/&amp;#34;&amp;gt;upload malicious artifacts&amp;lt;/a&amp;gt; . Each of these attacks could have been prevented if there were a way to detect that the delivered artifacts diverged from the expected origin of the software. But until now, generating verifiable information that described where, when, and how software artifacts were produced (information known as provenance) was difficult. This information allows users to trace artifacts verifiably back to the source and develop risk-based policies around what they consume. Currently, provenance generation is not widely supported, and solutions that do exist may require migrating build processes to services like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/tektoncd/chains&amp;#34;&amp;gt;Tekton Chains&amp;lt;/a&amp;gt; . This blog post describes a new method of generating non-forgeable provenance using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows&amp;#34;&amp;gt;GitHub Actions workflows&amp;lt;/a&amp;gt; for isolation and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sigstore.dev/&amp;#34;&amp;gt;Sigstore’s&amp;lt;/a&amp;gt; signing tools for authenticity. Using this approach, projects building on GitHub runners can achieve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/spec/v0.1/requirements&amp;#34;&amp;gt;SLSA 3&amp;lt;/a&amp;gt; (the third of four progressive SLSA “levels”), which affirms to consumers that your artifacts are authentic and trustworthy.&amp;lt;br&amp;gt;
Provenance&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/&amp;#34;&amp;gt;SLSA&amp;lt;/a&amp;gt; (&amp;amp;#34;Supply-chain Levels for Software Artifacts”) is a framework to help improve the integrity of your project throughout its development cycle, allowing consumers to trace the final piece of software you release all the way back to the source. Achieving a high SLSA level helps to improve the trust that your artifacts are what you say they are. This blog post focuses on build provenance, which gives users important information about the build: who performed the release process? Was the build artifact protected against malicious tampering? Source provenance describes how the source code was protected, which we’ll cover in future blog posts, so stay tuned.&amp;lt;br&amp;gt;
Go prototype to generate non-forgeable build provenance&amp;lt;br&amp;gt;
To create tamperless evidence of the build and allow consumer verification, you need to:&amp;lt;br&amp;gt;
Isolate the provenance generation from the build process;&amp;lt;br&amp;gt;
Isolate against maintainers interfering in the workflow;&amp;lt;br&amp;gt;
Provide a mechanism to identify the builder during provenance verification.&amp;lt;br&amp;gt;
The full isolation described in the first two points allows consumers to trust that the provenance was faithfully recorded; entities that provide this guarantee are called trusted builders. Our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa-github-generator-go&amp;#34;&amp;gt;Go prototype&amp;lt;/a&amp;gt; solves all three challenges. It also includes running the build inside the trusted builder, which provides a strong guarantee that the build achieves SLSA 3’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/spec/v0.1/requirements#ephemeral-environment&amp;#34;&amp;gt;ephemeral&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/spec/v0.1/requirements#isolated&amp;#34;&amp;gt;isolated&amp;lt;/a&amp;gt; requirement.&amp;lt;br&amp;gt;
How does it work?&amp;lt;br&amp;gt;
The following steps create the trusted builder that is necessary to generate provenance in isolation from the build and maintainer’s interference.&amp;lt;br&amp;gt;
Step One: Create a reusable workflow on GitHub runners Leveraging GitHub’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows/reusing-workflows&amp;#34;&amp;gt;reusable workflows&amp;lt;/a&amp;gt; provides the isolation mechanism from both maintainers’ caller workflows and from the build process. Within the workflow, Github Actions creates &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/learn-github-actions/understanding-github-actions#the-components-of-github-actions&amp;#34;&amp;gt;fresh instances of virtual machines (VMs), called runners, for each job&amp;lt;/a&amp;gt; . These separate VMs give the necessary isolation for a trusted builder, so that different VMs compile the project and generate and sign the SLSA provenance (see diagram below). Running the workflow on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-github-hosted-runners/about-github-hosted-runners&amp;#34;&amp;gt;GitHub-hosted runners&amp;lt;/a&amp;gt; gives the guarantee that the code run is in fact the intended workflow, which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners&amp;#34;&amp;gt;self-hosted runners&amp;lt;/a&amp;gt; do not. This prototype relies on GitHub to run the exact code defined in the workflow. The reusable workflow also protects against possible interference from maintainers, who could otherwise try to define the workflow in a way that interferes with the builder. The only way to interact with a reusable workflow is through the input parameters it exposes to the calling workflow, which stops maintainers from altering information via &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#env&amp;#34;&amp;gt;environment variables&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idsteps&amp;#34;&amp;gt;steps&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idservices&amp;#34;&amp;gt;services&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#defaults&amp;#34;&amp;gt;defaults&amp;lt;/a&amp;gt; . To protect against the possibility of one job (e.g. the build step) tampering with the other artifacts used by another job (the provenance step), this approach uses a trusted channel to protect the integrity of the data. We use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/using-jobs/defining-outputs-for-jobs&amp;#34;&amp;gt;job outputs&amp;lt;/a&amp;gt; to send hashes (due to size limitations) and then use the hashes to verify the binary received via the untrusted artifact registry.&amp;lt;br&amp;gt;
Step 2: Use OpenID Connect (OIDC) to prove the identity of the workflow to an external service (Sigstore) OpenID Connect (OIDC) is a standard used across the web for identity providers (e.g., Google) to attest to the identity of a user for a third party. GitHub now &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect&amp;#34;&amp;gt;supports&amp;lt;/a&amp;gt; OIDC in their workflows. Each time a workflow is run, a runner can mint a unique &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#understanding-the-oidc-token&amp;#34;&amp;gt;JWT token&amp;lt;/a&amp;gt; from GitHub’s OIDC provider. The token contains verifiable information of the workflow identity, including the caller repository, commit hash, trigger, and the current (reuseable) workflow path and reference. Using OIDC, the workflow proves its identity to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sigstore.dev/&amp;#34;&amp;gt;Sigstore&amp;amp;#39;s&amp;lt;/a&amp;gt; Fulcio root Certificate Authority, which acts as an external verification service. Fulcio signs a short-lived certificate attesting to an ephemeral signing key generated in the runner and tying it to the workload identity. A record of signing the provenance is kept in Sigstore’s transparency log &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/rekor&amp;#34;&amp;gt;Rekor&amp;lt;/a&amp;gt; . Users can use the signing certificate as a trust anchor to verify that the provenance was authenticated and non-forgeable; it must have been created inside the trusted builder.&amp;lt;br&amp;gt;
Verification&amp;lt;br&amp;gt;
The consumer can verify the artifact and its signed provenance with these steps:&amp;lt;br&amp;gt;
Look up the corresponding Rekor log entry and verify the signature;&amp;lt;br&amp;gt;
Verify the trusted builder identity by extracting it from the signing certificate;&amp;lt;br&amp;gt;
Check that the provenance information matches the expected source and build.&amp;lt;br&amp;gt;
See an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa-github-generator-go&amp;#34;&amp;gt;example in action&amp;lt;/a&amp;gt; in the official repository. Performing these steps guarantees to the consumer that the binary was produced in the trusted builder at a given commit hash attested to in the provenance. They can trust that the information in the provenance was non-forgeable, allowing them to trust the build “recipe” and trace their artifact verifiably back to the source.&amp;lt;br&amp;gt;
Extra Bonus: Keyless signing&amp;lt;br&amp;gt;
One extra benefit of this method is that maintainers don’t need to manage or distribute cryptographic keys for signing, avoiding the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://caremad.io/posts/2013/07/packaging-signing-not-holy-grail/&amp;#34;&amp;gt;notoriously difficult problem&amp;lt;/a&amp;gt; of key management. The OIDC protocol requires no hardcoded, long-term secrets be stored in GitHub&amp;amp;#39;s secrets, which sidesteps the potential problem of key mismanagement invalidating the SLSA provenance. Consumers simply use OIDC to verify that the binary artifact was built from a trusted builder that produced the expected provenance.&amp;lt;br&amp;gt;
Next Steps&amp;lt;br&amp;gt;
Utilizing the SLSA framework is a proven way for ensuring software supply-chain integrity at scale. This prototype shows  that achieving high SLSA levels is easier than ever thanks to the newest features of popular CI/CD systems and open-source tooling. Increased adoption of tamper-safe (SLSA 3&#43;) build services will contribute to a stronger open-source ecosystem and help close one easily exploited gap in the current supply chain. We encourage testing and adoption and welcome any improvements to the project. Please share feedback, comments and suggestions at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa-github-generator-go&amp;#34;&amp;gt;slsa-github-generator-go&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa-verifier&amp;#34;&amp;gt;slsa-verifier&amp;lt;/a&amp;gt; project repositories. We will officially release v1 in a few weeks! In follow-up posts, we will demonstrate adding non-forgeable source provenance attesting to secure repository settings, and showcase the same techniques for other build toolchains and package managers, etc. Stay tuned!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220407-121723/</link>
      <pubDate>Thu, 07 Apr 2022 12:17:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220407-121723/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/07/science/astronomers-distant-galaxy.html&amp;#34;&amp;gt;Out There Astronomers Find What Might Be the Most Distant Galaxy Yet Is the object a galaxy of primordial stars or a black hole knocking on the door of time? The Webb space telescope may help answer that question. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220406-200535/</link>
      <pubDate>Wed, 06 Apr 2022 20:05:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220406-200535/</guid>
      <description>Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics have put some of the world’s biggest corporations on edge.&amp;lt;br&amp;gt;
Since surfacing in late 2021, LAPSUS$ has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/&amp;#34;&amp;gt;gained access to the networks or contractors&amp;lt;/a&amp;gt; for some of the world’s largest technology companies, including Microsoft , NVIDIA , Okta and Samsung . LAPSUS$ typically threatens to release sensitive data unless paid a ransom, but with most victims the hackers ended up publishing any information they stole (mainly computer source code).&amp;lt;br&amp;gt;
Microsoft &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/&amp;#34;&amp;gt;blogged about its attack&amp;lt;/a&amp;gt; at the hands of LAPSUS$, and about the group targeting its customers. It found LAPSUS$ used a variety of old-fashioned techniques that seldom show up in any corporate breach post-mortems, such as:&amp;lt;br&amp;gt;
-targeting employees at their personal email addresses and phone numbers; -offering to pay $20,000 a week to employees who give up remote access credentials; -social engineering help desk and customer support employees at targeted companies; -bribing/tricking employees at mobile phone stores to hijack a target’s phone number; -intruding on their victims’ crisis communications calls post-breach.&amp;lt;br&amp;gt;
If these tactics sound like something you might sooner expect from spooky, state-sponsored “Advanced Persistent Threat” or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.mandiant.com/resources/apt-groups&amp;#34;&amp;gt;APT groups&amp;lt;/a&amp;gt; , consider that the core LAPSUS$ members are thought to range in age from 15 to 21. Also, LAPSUS$ operates on a shoestring budget and is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/BillDemirkapi/status/1508527487655067660&amp;#34;&amp;gt;anything but stealthy&amp;lt;/a&amp;gt; : According to Microsoft, LAPSUS$ doesn’t seem to cover its tracks or hide its activity. In fact, the group often announces its hacks on social media.&amp;lt;br&amp;gt;
ADVANCED PERSISTENT TEENAGERS&amp;lt;br&amp;gt;
This unusual combination makes LAPSUS$ something of an aberration that is probably more aptly referred to as “ Advanced Persistent Teenagers ,” said one CXO at a large organization that recently had a run-in with LAPSUS$.&amp;lt;br&amp;gt;
“There is a lot of speculation about how good they are, tactics et cetera, but I think it’s more than that,” said the CXO, who spoke about the incident on condition of anonymity. “They put together an approach that industry thought suboptimal and unlikely. So it’s their golden hour.”&amp;lt;br&amp;gt;
LAPSUS$ seems to have conjured some worst-case scenarios in the minds of many security experts, who worry what will happen when more organized cybercriminal groups start adopting these techniques.&amp;lt;br&amp;gt;
“LAPSUS$ has shown that with only $25,000, a group of teenagers could get into organizations with mature cybersecurity practices,” said Amit Yoran , CEO of security firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tenable.com&amp;#34;&amp;gt;Tenable&amp;lt;/a&amp;gt; and a former federal cybersecurity czar, testifying last week before the House Homeland Security Committee . “With much deeper pockets, focus, and mission, targeting critical infrastructure. That should be a sobering, if not terrifying, call to action.”&amp;lt;br&amp;gt;
My CXO source said LAPSUS$ succeeds because they simply refuse to give up, and just keep trying until someone lets them in.&amp;lt;br&amp;gt;
“They would just keep jamming a few individuals to get [remote] access, read some onboarding documents, enroll a new 2FA [two-factor authentication method] and exfiltrate code or secrets, like a smash-and-grab,” the CXO said. “These guys were not &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.networkworld.com/article/2333149/are-you-l33t-.html#:~:text=The%20word%20%22l33t%22%20itself%20(,(also%20%22llama%22).&amp;#34;&amp;gt;leet&amp;lt;/a&amp;gt; , just damn persistent.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/the-original-apt-advanced-persistent-teenagers/#more-59085&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/04/the-original-apt-advanced-persistent-teenagers/&amp;#34;&amp;gt;The Original APT: Advanced Persistent Teenagers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Deprocrastination Blog - Guides and digital tools on how to stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220406-080631/</link>
      <pubDate>Wed, 06 Apr 2022 08:06:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220406-080631/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-increase-your-attention-span-5-key-strategies&amp;#34;&amp;gt;How to increase your attention span: 5 key strategies&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/learn-to-tolerate-discomfort-or-suffer-escaping-from-it&amp;#34;&amp;gt;Learn to tolerate discomfort or suffer escaping from it&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;#39;t scrolling or watching&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/abstinence-isnt-recovery&amp;#34;&amp;gt;Abstinence isn’t recovery&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-go-back-to-things-you-used-to-be-addicted-to-in-the-past&amp;#34;&amp;gt;How to go back to things you used to be addicted to in the past&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220406-002029/</link>
      <pubDate>Wed, 06 Apr 2022 00:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220406-002029/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/04/podcast-episode-your-tax-dollars-work&amp;#34;&amp;gt;How to Fix the Internet: New Episode: Your Tax Dollars At Work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220406-001749/</link>
      <pubDate>Wed, 06 Apr 2022 00:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220406-001749/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/04/business/twitter-elon-musk-directors.html&amp;#34;&amp;gt;Elon Musk Joins Twitter’s Board, Pitching Ideas Big and Small Free speech, open-source algorithms — and an edit button: The world’s richest person will soon help steer the social media platform where he has a huge following. By Kate Conger, Mike Isaac and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220406-001223/</link>
      <pubDate>Wed, 06 Apr 2022 00:12:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220406-001223/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/04/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to another&amp;lt;br&amp;gt;
, selected pointers to long-form pieces that have added value to my semi-retired     days and one or two of which might reward you if you make time for them.  A few of this month’s pieces aren’t free; it’s a     bitter fact that the truth is paywalled but the lies are free. Sorry &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/04/04/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/26/Is-5G-BS&amp;#34;&amp;gt;5G Skeptic&amp;lt;/a&amp;gt; · When I was working at AWS, around 2017 we started getting excited pitches from companies who wanted to be part of the 5G build-out, saying     that obviously there’d be lots of opportunities for public-cloud providers. But I never walked away convinced. Either I didn’t     believe the supposed customers really needed what 5G offered, or I didn’t believe the opportunity was anywhere near big enough     to justify the trillion-dollar build-out investment. Six years later, I still don’t.  This is a report on a little online survey     I ran, looking     for actual real-world 5G impact to see if I was wrong &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/26/Is-5G-BS&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [24 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>DKB</title>
      <link>https://www.whatsupup.com/blog/niece/anatomized/20220405-202808/</link>
      <pubDate>Tue, 05 Apr 2022 20:28:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/niece/anatomized/20220405-202808/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dkb.io/post/the-next-google&amp;#34;&amp;gt;The Next Google&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dkb.io/post/the-next-google&amp;#34;&amp;gt;DuckDuckGo and Bing are not true alternatives – they’re just worse versions of Google. The next Google can’t just be an input box that spits out links. We need new thinking to create something much better than what came before.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220405-202318/</link>
      <pubDate>Tue, 05 Apr 2022 20:23:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220405-202318/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/04/podcast-episode-your-tax-dollars-work&amp;#34;&amp;gt;How to Fix the Internet: New Episode: Your Tax Dollars At Work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220405-161319/</link>
      <pubDate>Tue, 05 Apr 2022 16:13:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220405-161319/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/04/find-and-eek-increased-rewards-for.html&amp;#34;&amp;gt;Find and $eek! Increased rewards for Google Nest &amp;amp;amp; Fitbit devices&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Medha Jain, Program Manager, Devices &amp;amp;amp; Services Security&amp;lt;br&amp;gt;
At Google, we constantly invest in security research to raise the bar for our devices, keeping our users safe and building their trust in our products. In 2021, we published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://safety.google/nest/&amp;#34;&amp;gt;Google Nest security commitments&amp;lt;/a&amp;gt; , in which we committed to engage with the research community to examine our products and services and report vulnerabilities. We are now looking to deepen this relationship and accelerate the path toward building more secure devices. Starting today, we will introduce a new vulnerability rewards structure for submissions impacting &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://store.google.com/category/connected_home?e=SharedFeatureEnablePolarisNavTest%3A%3ALaunch&amp;amp;hl=en-US&amp;#34;&amp;gt;smart home&amp;lt;/a&amp;gt; (Google Nest) and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://store.google.com/category/fitbit?e=SharedFeatureEnablePolarisNavTest%3A%3ALaunch&amp;amp;hl=en-US&amp;#34;&amp;gt;wearables&amp;lt;/a&amp;gt; (Fitbit) devices through our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about&amp;#34;&amp;gt;Bug Hunters&amp;lt;/a&amp;gt; platform. Bonus!&amp;lt;br&amp;gt;
We are paying higher rewards retroactively for eligible Google Nest and Fitbit devices reports submitted in 2021. And, starting today, for the next six months, will double the reward amount for all new eligible reports applicable to Google Nest &amp;amp;amp; Fitbit devices in scope. We will continue to take reports on our web applications, services, and mobile apps at their existing reward levels. Please keep those coming! An enhanced rewards program&amp;lt;br&amp;gt;
Building on our previous programs to improve devices&amp;amp;#39; embedded security posture, we’re bringing all our first-party devices under a single program, starting with Google Nest, Fitbit, and Pixel. This program extends the Android Security Reward Program, making it easier for researchers to submit a vulnerability in first-party devices and improving consistency across our severity assignments. Refer to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/6171833274204160/android-security-rewards-program-rules&amp;#34;&amp;gt;Android and Google Devices Security Reward Program&amp;lt;/a&amp;gt; for more details. What interests us?&amp;lt;br&amp;gt;
We encourage researchers to report firmware, system software, and hardware vulnerabilities. Our wide diversity of platforms provides researchers with a smorgasbord of environments to explore. What&amp;amp;#39;s next?&amp;lt;br&amp;gt;
We will be at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://Hardwear.io&amp;#34;&amp;gt;Hardwear.io&amp;lt;/a&amp;gt; conference this year! The VRP team is looking forward to meeting our security peers in person. We’ll be talking about the architecture of a couple of our devices, hoping to give security researchers a head start in finding vulnerabilities. We’ll have plenty of swag, too! We will continue to enhance the researchers&amp;amp;#39; experience and participation. We intend to add training documentations and target areas that interest us as we grow the program. A huge thanks to Sarah Jacobus, Adam Bacchus,  Ankur Chakraborty, Eduardo&amp;amp;#39; Vela&amp;amp;#34; &amp;amp;lt;Nava&amp;amp;gt;, Jay Cox, and Nic Watson.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220405-002039/</link>
      <pubDate>Tue, 05 Apr 2022 00:20:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220405-002039/</guid>
      <description>The First Amendment guarantees the right to speak your own involvement about court proceedings. Yet the Stored Communications Act currently allows the government to prevent electronic communications companies from notifying their users when they receive law enforcement orders for customer data. These gag orders can silence the companies for any&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220405-001740/</link>
      <pubDate>Tue, 05 Apr 2022 00:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220405-001740/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/04/04/technology/elon-musk-twitter.html&amp;#34;&amp;gt;Elon Musk becomes Twitter’s largest shareholder. The Tesla chief executive, who has been critical of Twitter’s content moderation policies, has bought 9.2 percent of the social media company. By Mike Isaac and Lauren Hirsch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>https://dkb.io</title>
      <link>https://www.whatsupup.com/blog/niece/anatomized/000000-000000/</link>
      <pubDate>Mon, 04 Apr 2022 20:25:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/niece/anatomized/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>Deprocrastination Blog - Guides and digital tools on how to stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220402-200721/</link>
      <pubDate>Sat, 02 Apr 2022 20:07:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220402-200721/</guid>
      <description>&amp;lt;p&amp;gt;Books&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/guide&amp;#34;&amp;gt;How to finally stop procrastinating&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/dopamine-detox-guide&amp;#34;&amp;gt;Dopamine Detox Definitive Guide&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Programs&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/dopamine-detox-challenge&amp;#34;&amp;gt;Dopamine Detox Challenge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/course&amp;#34;&amp;gt;Predictably Productive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Resources&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/extension&amp;#34;&amp;gt;Extension&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Social media&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/deprocrastinate&amp;#34;&amp;gt;Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.instagram.com/deprocrastination/&amp;#34;&amp;gt;Instagram&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
© 2022 Leveled&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220401-201528/</link>
      <pubDate>Fri, 01 Apr 2022 20:15:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220401-201528/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html&amp;#34;&amp;gt;FORCEDENTRY: Sandbox Escape&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220401-161908/</link>
      <pubDate>Fri, 01 Apr 2022 16:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220401-161908/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2022/04/01/espanol/facebook-instagram-guerra-rusia.html&amp;#34;&amp;gt;La guerra en Ucrania ha generado confusión en Facebook e Instagram Las directrices sobre los contenidos de la guerra cambian constantemente en las redes sociales de Meta, lo que genera dudas entre los empleados. By Ryan Mac, Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220401-121914/</link>
      <pubDate>Fri, 01 Apr 2022 12:19:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220401-121914/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2022/04/01/espanol/facebook-instagram-guerra-rusia.html&amp;#34;&amp;gt;La guerra en Ucrania ha generado confusión en Facebook e Instagram Las directrices sobre los contenidos de la guerra cambian constantemente en las redes sociales de Meta, lo que genera dudas entre los empleados. By Ryan Mckay, Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220401-121833/</link>
      <pubDate>Fri, 01 Apr 2022 12:18:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220401-121833/</guid>
      <description>April 1, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/04/01/git-snail-mail.html&amp;#34;&amp;gt;Announcing git snail-mail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220401-120552/</link>
      <pubDate>Fri, 01 Apr 2022 12:05:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220401-120552/</guid>
      <description>On Tuesday, KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&amp;#34;&amp;gt;warned&amp;lt;/a&amp;gt; that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.&amp;lt;br&amp;gt;
At issue are forged “emergency data requests,” (EDRs) sent through hacked police or government agency email accounts. Tech companies usually require a search warrant or subpoena before providing customer or user data, but any police jurisdiction can use an EDR to request immediate access to data without a warrant, provided the law enforcement entity attests that the request is related to an urgent matter of life and death.&amp;lt;br&amp;gt;
As Tuesday’s story showed, hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. After all, there are roughly 18,000 distinct police organizations in the United States alone, and many thousands of government and police agencies worldwide.&amp;lt;br&amp;gt;
Criminal hackers exploiting that ambiguity are enjoying remarkable success rates gaining access to the data they’re after, and some are now selling EDRs as a service to other crooks online.&amp;lt;br&amp;gt;
This week’s piece included confirmation from social media platform Discord about a fraudulent EDR they recently processed. On Wednesday, Bloomberg &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests&amp;#34;&amp;gt;published a story&amp;lt;/a&amp;gt; confirming that both Apple and Meta/Facebook have recently complied with fake EDRs.&amp;lt;br&amp;gt;
Today, KrebsOnSecurity heard from Sen. Ron Wyden (D-Ore.), who said he was moved to action after reading this week’s coverage.&amp;lt;br&amp;gt;
“Recent news reports have revealed an enormous threat to Americans’ safety and national security,” Wyden said in a statement provided to KrebsOnSecurity. “I’m particularly troubled by the prospect that forged emergency orders may be coming from compromised foreign law enforcement agencies, and then used to target vulnerable individuals.”&amp;lt;br&amp;gt;
“I’m requesting information from tech companies and multiple federal agencies to learn more about how emergency data requests are being abused by hackers,” Wyden’s statement continues. “No one wants tech companies to refuse legitimate emergency requests when someone’s safety is at stake, but the current system has clear weaknesses that need to be addressed. Fraudulent government requests are a significant concern, which is why I’ve already authored legislation to stamp out forged warrants and subpoenas.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/fake-emergency-search-warrants-draw-scrutiny-from-capitol-hill/#more-59209&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/fake-emergency-search-warrants-draw-scrutiny-from-capitol-hill/&amp;#34;&amp;gt;Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20220401-080641/</link>
      <pubDate>Fri, 01 Apr 2022 08:06:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20220401-080641/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2022/03/31/finally.html&amp;#34;&amp;gt;A kitchen without “finally” blocks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220401-000647/</link>
      <pubDate>Fri, 01 Apr 2022 00:06:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220401-000647/</guid>
      <description>Stay productive despite distractions&amp;lt;br&amp;gt;
Get a practical newsletter with anti-procrastination blog posts, short tips, and visuals&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220331-161623/</link>
      <pubDate>Thu, 31 Mar 2022 16:16:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220331-161623/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html&amp;#34;&amp;gt;FORCEDENTRY: Sandbox Escape&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
We want to thank Citizen Lab for sharing a sample of the FORCEDENTRY exploit with us, and Apple’s Security Engineering and Architecture (SEAR) group for collaborating with us on the technical analysis. Any editorial opinions reflected below are solely Project Zero’s and do not necessarily reflect those of the organizations we collaborated with during this research.&amp;lt;br&amp;gt;
Late last year &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html&amp;#34;&amp;gt;we published a writeup&amp;lt;/a&amp;gt; of the initial remote code execution stage of FORCEDENTRY, the zero-click iMessage exploit attributed by Citizen Lab to NSO. By sending a .gif iMessage attachment (which was really a PDF) NSO were able to remotely trigger a heap buffer overflow in the ImageIO JBIG2 decoder. They used that vulnerability to bootstrap a powerful &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Weird_machine&amp;#34;&amp;gt;weird machine&amp;lt;/a&amp;gt; capable of loading the next stage in the infection process: the sandbox escape.&amp;lt;br&amp;gt;
In this post we&amp;amp;#39;ll take a look at that sandbox escape. It&amp;amp;#39;s notable for using only logic bugs. In fact it&amp;amp;#39;s unclear where the features that it uses end and the vulnerabilities which it abuses begin. Both current and upcoming state-of-the-art mitigations such as Pointer Authentication and Memory Tagging have no impact at all on this sandbox escape.&amp;lt;br&amp;gt;
An observation&amp;lt;br&amp;gt;
During our initial analysis of the .gif file Samuel noticed that rendering the image appeared to leak memory. Running the heap tool after releasing all the associated resources gave the following output:&amp;lt;br&amp;gt;
$ heap $pid&amp;lt;br&amp;gt;
------------------------------------------------------------&amp;lt;br&amp;gt;
All zones: 4631 nodes (826336 bytes)&amp;lt;br&amp;gt;
COUNT    BYTES     AVG   CLASS_NAME   TYPE   BINARY&amp;lt;br&amp;gt;
=====    =====     ===   ==========   ====   ======&amp;lt;br&amp;gt;
1969   469120   238.3   non-object&amp;lt;br&amp;gt;
825    26400    32.0   JBIG2Bitmap  C&#43;&#43;   CoreGraphics&amp;lt;br&amp;gt;
heap was able to determine that the leaked memory contained JBIG2Bitmap objects.&amp;lt;br&amp;gt;
Using the -address option we could find all the individual leaked bitmap objects:&amp;lt;br&amp;gt;
$ heap -address JBIG2Bitmap $pid&amp;lt;br&amp;gt;
and dump them out to files. One of those objects was quite unlike the others:&amp;lt;br&amp;gt;
$ hexdump -C dumpXX.bin | head&amp;lt;br&amp;gt;
00000000  62 70 6c 69 73 74 30 30  |bplist00|&amp;lt;br&amp;gt;
00000018        24 76 65 72 73 69  |  $versi|&amp;lt;br&amp;gt;
00000020  6f 6e 59 24 61 72 63 68  |onY$arch|&amp;lt;br&amp;gt;
00000028  69 76 65 72 58 24 6f 62  |iverX$ob|&amp;lt;br&amp;gt;
00000030  6a 65 63 74 73 54 24 74  |jectsT$t|&amp;lt;br&amp;gt;
00000038  6f 70                    |op      |&amp;lt;br&amp;gt;
00000040        4e 53 4b 65 79 65  |  NSKeye|&amp;lt;br&amp;gt;
00000048  64 41 72 63 68 69 76 65  |dArchive|&amp;lt;br&amp;gt;
It&amp;amp;#39;s clearly a serialized &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/foundation/nskeyedarchiver?language=objc&amp;#34;&amp;gt;NSKeyedArchiver&amp;lt;/a&amp;gt; . Definitely not what you&amp;amp;#39;d expect to see in a JBIG2Bitmap object. Running strings we see plenty of interesting things (noting that the URL below is redacted):&amp;lt;br&amp;gt;
Objective-C class and selector names:&amp;lt;br&amp;gt;
NSFunctionExpression&amp;lt;br&amp;gt;
NSConstantValueExpression&amp;lt;br&amp;gt;
NSConstantValue&amp;lt;br&amp;gt;
expressionValueWithObject:context:&amp;lt;br&amp;gt;
filteredArrayUsingPredicate:&amp;lt;br&amp;gt;
_web_removeFileOnlyAtPath:&amp;lt;br&amp;gt;
context:evaluateMobileSubscriberIdentity:&amp;lt;br&amp;gt;
performSelectorOnMainThread:withObject:waitUntilDone:&amp;lt;br&amp;gt;
The name of the file which delivered the exploit:&amp;lt;br&amp;gt;
XXX.gif&amp;lt;br&amp;gt;
Filesystems paths:&amp;lt;br&amp;gt;
/tmp/com.apple.messages&amp;lt;br&amp;gt;
/System/Library/PrivateFrameworks/SlideshowKit.framework/Frameworks/OpusFoundation.framework&amp;lt;br&amp;gt;
a URL:&amp;lt;br&amp;gt;
https://XXX.cloudfront.net/YYY/ZZZ/megalodon?AAA&amp;lt;br&amp;gt;
Using plutil we can convert the bplist00 binary format to XML. Performing some post-processing and cleanup we can see that the top-level object in the NSKeyedArchiver is a serialized NSFunctionExpression object.&amp;lt;br&amp;gt;
NSExpression NSPredicate NSExpression&amp;lt;br&amp;gt;
If you&amp;amp;#39;ve ever used Core Data or tried to filter a Objective-C collection you might have come across NSPredicates . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/foundation/nspredicate?language=objc&amp;#34;&amp;gt;According to Apple&amp;amp;#39;s public documentation&amp;lt;/a&amp;gt; they are used &amp;amp;#34; to define logical conditions for constraining a search for a fetch or for in-memory filtering &amp;amp;#34; .&amp;lt;br&amp;gt;
For example, in Objective-C you could filter an NSArray object like this:&amp;lt;br&amp;gt;
NSArray* names = @[@&amp;amp;#34;one&amp;amp;#34;, @&amp;amp;#34;two&amp;amp;#34;, @&amp;amp;#34;three&amp;amp;#34;];&amp;lt;br&amp;gt;
NSPredicate* pred;&amp;lt;br&amp;gt;
pred = [NSPredicate predicateWithFormat:&amp;lt;br&amp;gt;
@&amp;amp;#34; SELF beginswith[c] &amp;amp;#39;t&amp;amp;#39; &amp;amp;#34;];&amp;lt;br&amp;gt;
NSLog(@&amp;amp;#34;%@&amp;amp;#34;, [names filteredArrayUsingPredicate:pred]);&amp;lt;br&amp;gt;
The predicate is &amp;amp;#34; SELF beginswith[c] &amp;amp;#39;t&amp;amp;#39;&amp;amp;#34; . This prints an NSArray containing only &amp;amp;#34; two &amp;amp;#34; and &amp;amp;#34; three &amp;amp;#34;.&amp;lt;br&amp;gt;
[NSPredicate predicateWithFormat] builds a predicate object by parsing a small query language, a little like an SQL query.&amp;lt;br&amp;gt;
NSPredicates can be built up from NSExpressions , connected by NSComparisonPredicates (like less-than, greater-than and so on.)&amp;lt;br&amp;gt;
NSExpressions themselves can be fairly complex, containing aggregate expressions (like &amp;amp;#34; IN &amp;amp;#34; and &amp;amp;#34; CONTAINS &amp;amp;#34;), subqueries, set expressions, and, most interestingly, function expressions.&amp;lt;br&amp;gt;
Prior to 2007 (in OS X 10.4 and below) function expressions were limited to just the following five extra built-in methods: sum , count , min , max , and average .&amp;lt;br&amp;gt;
But starting in OS X 10.5 (which would also be around the launch of iOS in 2007) NSFunctionExpressions were extended &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/foundation/nsexpression&amp;#34;&amp;gt;to allow&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/foundation/nsexpression&amp;#34;&amp;gt;arbitrary&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/foundation/nsexpression&amp;#34;&amp;gt;method invocations&amp;lt;/a&amp;gt; with the FUNCTION keyword:&amp;lt;br&amp;gt;
&amp;amp;#34;FUNCTION(&amp;amp;#39;abc&amp;amp;#39;, &amp;amp;#39;stringByAppendingString&amp;amp;#39;, &amp;amp;#39;def&amp;amp;#39;)&amp;amp;#34; =&amp;amp;gt; @&amp;amp;#34;abcdef&amp;amp;#34;&amp;lt;br&amp;gt;
FUNCTION takes a target object, a selector and an optional list of arguments then invokes the selector on the object, passing the arguments. In this case it will allocate an NSString object @&amp;amp;#34;abc&amp;amp;#34; then invoke the stringByAppendingString: selector passing the NSString @&amp;amp;#34;def&amp;amp;#34; , which will evaluate to the NSString @&amp;amp;#34;abcdef&amp;amp;#34; .&amp;lt;br&amp;gt;
In addition to the FUNCTION keyword there&amp;amp;#39;s CAST which allows full reflection-based access to all Objective-C types (as opposed to just being able to invoke selectors on literal strings and integers):&amp;lt;br&amp;gt;
&amp;amp;#34; FUNCTION(CAST(&amp;amp;#39;NSFileManager&amp;amp;#39;, &amp;amp;#39;Class&amp;amp;#39;), &amp;amp;#39;defaultManager&amp;amp;#39;)&amp;amp;#34;&amp;lt;br&amp;gt;
Here we can get access to the NSFileManager class and call the defaultManager selector to get a reference to a process&amp;amp;#39;s shared file manager instance.&amp;lt;br&amp;gt;
These keywords exist in the string representation of NSPredicates and NSExpressions . Parsing those strings involves creating a graph of NSExpression objects, NSPredicate objects and their subclasses like NSFunctionExpression . It&amp;amp;#39;s a serialized version of such a graph which is present in the JBIG2 bitmap.&amp;lt;br&amp;gt;
NSPredicates using the FUNCTION keyword are effectively Objective-C scripts. With some tricks it&amp;amp;#39;s possible to build nested function calls which can do almost anything you could do in procedural Objective-C. Figuring out some of those tricks was the key to the 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://realworldctf.com/&amp;#34;&amp;gt;Real World CTF&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ChiChou/DezhouInstrumenz/&amp;#34;&amp;gt;DezhouInstrumenz&amp;lt;/a&amp;gt; challenge, which would evaluate an attacker supplied NSExpression format string. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chichou.me/2021/01/16/see-no-eval-runtime-code-execution-objc/&amp;#34;&amp;gt;writeup by the challenge author&amp;lt;/a&amp;gt; is a great introduction to these ideas and I&amp;amp;#39;d strongly recommend reading that now if you haven&amp;amp;#39;t. The rest of this post builds on the tricks described in that post.&amp;lt;br&amp;gt;
A tale of two parts&amp;lt;br&amp;gt;
The only job of the JBIG2 logic gate machine described in the previous blog post is to cause the deserialization and evaluation of an embedded NSFunctionExpression . No attempt is made to get native code execution, ROP, JOP or any similar technique.&amp;lt;br&amp;gt;
Prior to iOS 14.5 the isa field of an Objective-C object was not protected by Pointer Authentication Codes ( PAC) , so the JBIG2 machine builds a fake Objective-C object with a fake isa such that the invocation of the dealloc selector causes the deserialization and evaluation of the NSFunctionExpression . This is very similar to the technique used by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html&amp;#34;&amp;gt;Samuel in the 2020 SLOP post&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This NSFunctionExpression has two purposes:&amp;lt;br&amp;gt;
Firstly, it allocates and leaks an ASMKeepAlive object then tries to cover its tracks by finding and deleting the .gif file which delivered the exploit.&amp;lt;br&amp;gt;
Secondly, it builds a payload NSPredicate object then triggers a logic bug to get that NSPredicate object evaluated in the CommCenter process, reachable from the IMTranscoderAgent sandbox via the com.apple.commcenter.xpc NSXPC service.&amp;lt;br&amp;gt;
Let&amp;amp;#39;s look at those two parts separately:&amp;lt;br&amp;gt;
Covering tracks&amp;lt;br&amp;gt;
The outer level NSFunctionExpression calls performSelectorOnMainThread:withObject:waitUntilDone which in turn calls makeObjectsPerformSelector:@&amp;amp;#34;expressionValueWithObject:context:&amp;amp;#34; on an NSArray of four NSFunctionExpressions . This allows the four independent NSFunctionExpressions to be evaluated sequentially.&amp;lt;br&amp;gt;
With some manual cleanup we can recover pseudo-Objective-C versions of the serialized NSFunctionExpressions .&amp;lt;br&amp;gt;
The first one does this:&amp;lt;br&amp;gt;
[[AMSKeepAlive alloc] initWithName:&amp;amp;#34;KA&amp;amp;#34;]&amp;lt;br&amp;gt;
This allocates and then leaks an AppleMediaServices KeepAlive object . The exact purpose of this is unclear.&amp;lt;br&amp;gt;
The second entry does this:&amp;lt;br&amp;gt;
[[NSFileManager defaultManager] _web_removeFileOnlyAtPath:&amp;lt;br&amp;gt;
[@&amp;amp;#34;/tmp/com.apple.messages&amp;amp;#34; stringByAppendingPathComponent:&amp;lt;br&amp;gt;
[ [ [ [&amp;lt;br&amp;gt;
[NSFileManager defaultManager]&amp;lt;br&amp;gt;
enumeratorAtPath: @&amp;amp;#34;/tmp/com.apple.messages&amp;amp;#34;&amp;lt;br&amp;gt;
]&amp;lt;br&amp;gt;
allObjects&amp;lt;br&amp;gt;
[&amp;lt;br&amp;gt;
[NSPredicate predicateWithFormat:&amp;lt;br&amp;gt;
[@&amp;amp;#34;SELF ENDSWITH &amp;amp;#39;&amp;amp;#34;&amp;lt;br&amp;gt;
stringByAppendingString: &amp;amp;#34;XXX.gif&amp;amp;#34;]&amp;lt;br&amp;gt;
stringByAppendingString: &amp;amp;#34;&amp;amp;#39;&amp;amp;#34;&amp;lt;br&amp;gt;
]   ] ] ]&amp;lt;br&amp;gt;
firstObject&amp;lt;br&amp;gt;
Reading these single expression NSFunctionExpressions is a little tricky; breaking that down into a more procedural form it&amp;amp;#39;s equivalent to this:&amp;lt;br&amp;gt;
NSFileManager* fm = [NSFileManager defaultManager];&amp;lt;br&amp;gt;
NSDirectoryEnumerator* dir_enum;&amp;lt;br&amp;gt;
dir_enum = [fm enumeratorAtPath: @&amp;amp;#34;/tmp/com.apple.messages&amp;amp;#34;]&amp;lt;br&amp;gt;
NSArray* allTmpFiles = [dir_enum allObjects];&amp;lt;br&amp;gt;
NSString* filter;&amp;lt;br&amp;gt;
filter = [&amp;amp;#34;@&amp;amp;#34;SELF ENDSWITH &amp;amp;#39;&amp;amp;#34; stringByAppendingString: &amp;amp;#34;XXX.gif&amp;amp;#34;];&amp;lt;br&amp;gt;
filter = [filter stringByAppendingString: &amp;amp;#34;&amp;amp;#39;&amp;amp;#34;];&amp;lt;br&amp;gt;
pred = [NSPredicate predicateWithFormat: filter]&amp;lt;br&amp;gt;
NSArray* matches;&amp;lt;br&amp;gt;
matches = [allTmpFiles filteredArrayUsingPredicate: pred];&amp;lt;br&amp;gt;
NSString* gif_subpath = [matches firstObject];&amp;lt;br&amp;gt;
NSString* root = @&amp;amp;#34;/tmp/com.apple.messages&amp;amp;#34;;&amp;lt;br&amp;gt;
NSString* full_path;&amp;lt;br&amp;gt;
full_path = [root stringByAppendingPathComponent: gifSubpath];&amp;lt;br&amp;gt;
[fm _web_removeFileOnlyAtPath: full_path];&amp;lt;br&amp;gt;
This finds the XXX.gif file used to deliver the exploit which iMessage has stored somewhere under the /tmp/com.apple.messages folder and deletes it .&amp;lt;br&amp;gt;
The other …</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220331-041801/</link>
      <pubDate>Thu, 31 Mar 2022 04:18:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220331-041801/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/03/30/world/ukraine-russia-war-news/the-war-is-roiling-facebook-and-instagram&amp;#34;&amp;gt;The war is roiling Facebook and Instagram. This was featured in live coverage. By Ryan Mac, Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220331-001457/</link>
      <pubDate>Thu, 31 Mar 2022 00:14:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220331-001457/</guid>
      <description>The US president wants huge increases for clean energy and public health, but a divided Congress might not go along with the plan.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220330-201327/</link>
      <pubDate>Wed, 30 Mar 2022 20:13:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220330-201327/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Last month I and some family members entered the
Larson Family Winery’s annual St. Patrick’s Day &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.larsonfamilywinery.com/press-release-larson-limerick-contest-2022/&amp;#34;&amp;gt;limerick contest&amp;lt;/a&amp;gt; .
Here are our also-rans (the first by my mom, the others by me):&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220330-162614/</link>
      <pubDate>Wed, 30 Mar 2022 16:26:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220330-162614/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/performance-tool-in-firefox-devtools-reloaded/&amp;#34;&amp;gt;Performance Tool in Firefox DevTools Reloaded →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/performance-tool-in-firefox-devtools-reloaded/&amp;#34;&amp;gt;Performance Tool in Firefox DevTools Reloaded&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
In Firefox 98, we’re shipping a new version of the existing Performance panel. This panel is now based on the Firefox profiler tool that can be used to capture a performance profile for a web page, inspect visualized performance data and analyze it to identify slow areas.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220330-161548/</link>
      <pubDate>Wed, 30 Mar 2022 16:15:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220330-161548/</guid>
      <description>Stay productive with our newsletter!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220330-121940/</link>
      <pubDate>Wed, 30 Mar 2022 12:19:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220330-121940/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/30/technology/ukraine-russia-facebook-instagram.html&amp;#34;&amp;gt;How War in Ukraine Roiled Facebook and Instagram The rules over what war content is permitted on Facebook and Instagram keep changing, causing internal confusion. By Ryan Mac, Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220329-162036/</link>
      <pubDate>Tue, 29 Mar 2022 16:20:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220329-162036/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-securing-internet-things&amp;#34;&amp;gt;Podcast Episode - Securing the IoT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220329-162033/</link>
      <pubDate>Tue, 29 Mar 2022 16:20:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220329-162033/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-securing-internet-things&amp;#34;&amp;gt;Podcast Episode - Securing the IoT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Joseph Menn | Reuters</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220329-161632/</link>
      <pubDate>Tue, 29 Mar 2022 16:16:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220329-161632/</guid>
      <description>&amp;lt;p&amp;gt;Author&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/authors/joseph-menn/&amp;#34;&amp;gt;Joseph Menn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Follow&amp;lt;br&amp;gt;
70 results&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/&amp;#34;&amp;gt;Europe&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/no-lights-no-heat-no-money-thats-life-ukraine-during-cyber-warfare-2022-01-14/&amp;#34;&amp;gt;No lights, no heat, no money - that&amp;amp;#39;s life in Ukraine during cyber warfare , article with image&amp;lt;/a&amp;gt; January 14, 2022&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/major-tech-companies-struggle-plug-holes-logging-software-2021-12-16/&amp;#34;&amp;gt;Major tech companies struggle to plug holes in logging software , article with image&amp;lt;/a&amp;gt; December 16, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/&amp;#34;&amp;gt;United States&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;U.S. lawmakers call for sanctions against Israel&amp;amp;#39;s NSO, other spyware firms , article with gallery&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15/&amp;#34;&amp;gt;Gallery&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/&amp;#34;&amp;gt;U.S. Markets&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us/us-cybersecurity-officials-see-mainly-low-impact-attacks-logging-flaw-so-far-2021-12-15/&amp;#34;&amp;gt;U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far , article with image&amp;lt;/a&amp;gt; December 15, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-2021-12-13/&amp;#34;&amp;gt;Widely used software with key vulnerability sends cyber defenders scrambling , article with gallery&amp;lt;/a&amp;gt; December 13, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/ransomware-attack-australian-utility-claimed-by-russian-speaking-criminals-2021-12-08/&amp;#34;&amp;gt;Ransomware attack on Australian utility claimed by Russian-speaking criminals , article with image&amp;lt;/a&amp;gt; December 9, 2021&amp;lt;br&amp;gt;
Disrupted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/&amp;#34;&amp;gt;U.S. State Department phones hacked with Israeli company spyware - sources , article with gallery&amp;lt;/a&amp;gt; December 4, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/us-seizes-6-mln-ransom-payments-charge-ukrainian-over-cyberattack-cnn-2021-11-08/&amp;#34;&amp;gt;U.S. charges Ukrainian and Russian in major ransomware spree, seizes $6 mln , article with gallery&amp;lt;/a&amp;gt; November 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;EXCLUSIVE Governments turn tables on ransomware gang REvil by pushing it offline , article with gallery&amp;lt;/a&amp;gt; October 21, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-2021-10-19/&amp;#34;&amp;gt;China-linked hacking group accessing calling records worldwide, CrowdStrike says , article with image&amp;lt;/a&amp;gt; October 19, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/&amp;#34;&amp;gt;Government&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/us-authorities-disclose-ransomware-attacks-against-water-facilities-2021-10-14/&amp;#34;&amp;gt;U.S. authorities disclose ransomware attacks against water facilities , article with image&amp;lt;/a&amp;gt; October 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/&amp;#34;&amp;gt;United States&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/hackers-solarwinds-breach-stole-data-us-sanctions-policy-intelligence-probes-2021-10-07/&amp;#34;&amp;gt;Hackers of SolarWinds stole data on U.S. sanctions policy, intelligence probes , article with image&amp;lt;/a&amp;gt; October 8, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/expressvpn-employees-complain-about-ex-spys-top-role-company-2021-09-23/&amp;#34;&amp;gt;ExpressVPN employees complain about ex-spy&amp;amp;#39;s top role at company , article with gallery&amp;lt;/a&amp;gt; September 23, 2021&amp;lt;br&amp;gt;
Disrupted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-2021-09-13/&amp;#34;&amp;gt;Cyber arms dealer exploits new iPhone software vulnerability, affecting most versions, say researchers , article with video&amp;lt;/a&amp;gt; September 14, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-wide-ranging-solarwinds-probe-sparks-fear-corporate-america-2021-09-10/&amp;#34;&amp;gt;Exclusive: Wide-ranging SolarWinds probe sparks fear in Corporate America , article with gallery&amp;lt;/a&amp;gt; September 10, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/pro-china-social-media-campaign-expands-new-countries-blames-us-covid-2021-09-08/&amp;#34;&amp;gt;Pro-China social media campaign hits new countries, blames U.S. for COVID , article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/microsoft-warns-azure-customers-flaw-that-could-have-permitted-hackers-access-2021-09-08/&amp;#34;&amp;gt;Microsoft warns Azure customers of flaw that could have permitted hackers access to data , article with image&amp;lt;/a&amp;gt; September 9, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/researchers-cybersecurity-agency-urge-action-by-microsoft-cloud-database-users-2021-08-28/&amp;#34;&amp;gt;Researchers, cybersecurity agency urge action by Microsoft cloud database users , article with image&amp;lt;/a&amp;gt; August 30, 2021&amp;lt;br&amp;gt;
Disrupted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/&amp;#34;&amp;gt;EXCLUSIVE Microsoft warns thousands of cloud customers of exposed databases , article with video&amp;lt;/a&amp;gt; August 27, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-policy-groups-ask-apple-drop-plans-inspect-imessages-scan-abuse-images-2021-08-19/&amp;#34;&amp;gt;Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images , article with gallery&amp;lt;/a&amp;gt; August 19, 2021&amp;lt;br&amp;gt;
1 to 20 of 70&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220329-160527/</link>
      <pubDate>Tue, 29 Mar 2022 16:05:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220329-160527/</guid>
      <description>There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.&amp;lt;br&amp;gt;
In the United States, when federal, state or local law enforcement agencies wish to obtain information about who owns an account at a social media firm, or what Internet addresses a specific cell phone account has used in the past, they must submit an official court-ordered warrant or subpoena.&amp;lt;br&amp;gt;
Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and the request appears to come from an email address connected to an actual police department domain name.&amp;lt;br&amp;gt;
But in certain circumstances — such as a case involving imminent harm or death — an investigating authority may make what’s known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents.&amp;lt;br&amp;gt;
It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.&amp;lt;br&amp;gt;
In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR — and potentially having someone’s blood on their hands — or possibly leaking a customer record to the wrong person.&amp;lt;br&amp;gt;
“We have a legal process to compel production of documents, and we have a streamlined legal process for police to get information from ISPs and other providers,” said Mark Rasch , a former prosecutor with the U.S. Department of Justice .&amp;lt;br&amp;gt;
“And then we have this emergency process, almost like you see on [the television series] Law &amp;amp;amp; Order, where they say they need certain information immediately,” Rasch continued. “Providers have a streamlined process where they publish the fax or contact information for police to get emergency access to data. But there’s no real mechanism defined by most Internet service providers or tech companies to test the validity of a search warrant or subpoena. And so as long as it looks right, they’ll comply.”&amp;lt;br&amp;gt;
To make matters more complicated, there are tens of thousands of police jurisdictions around the world — including roughly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Law_enforcement_in_the_United_States#:~:text=There%20are%2017%2C985%20U.S.%20police,and%20federal%20law%20enforcement%20agencies.&amp;#34;&amp;gt;18,000 in the United States alone&amp;lt;/a&amp;gt; — and all it takes for hackers to succeed is illicit access to a single police email account.&amp;lt;br&amp;gt;
THE LAPSUS$ CONNECTION&amp;lt;br&amp;gt;
The reality that teenagers are now impersonating law enforcement agencies to subpoena privileged data on their targets at whim is evident in the dramatic backstory behind LAPSUS$ , the data extortion group that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/&amp;#34;&amp;gt;recently hacked into some of the world’s most valuable technology companies&amp;lt;/a&amp;gt; , including Microsoft , Okta , NVIDIA and Vodafone .&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; about their recent hack, Microsoft said LAPSUS$ succeeded against its targets through a combination of low-tech attacks, mostly involving old-fashioned social engineering — such as bribing employees at or contractors for the target organization.&amp;lt;br&amp;gt;
“Other tactics include phone-based social engineering; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=sim&#43;swapping&amp;#34;&amp;gt;SIM-swapping&amp;lt;/a&amp;gt; to facilitate account takeover; accessing personal email accounts of employees at target organizations; paying employees, suppliers, or business partners of target organizations for access to credentials and multi-factor authentication (MFA) approval; and intruding in the ongoing crisis-communication calls of their targets,” Microsoft wrote of LAPSUS$.&amp;lt;br&amp;gt;
The roster of the now-defunct “Infinity Recursion” hacking team, from which some members of LAPSUS$ allegedly hail.&amp;lt;br&amp;gt;
Researchers from security firms &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.unit221b.com&amp;#34;&amp;gt;Unit 221B&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.paloaltonetworks.com&amp;#34;&amp;gt;Palo Alto Networks&amp;lt;/a&amp;gt; say that prior to launching LAPSUS$, the group’s leader “White” (a.k.a. “WhiteDoxbin,” “Oklaqq”) was a founding member of a cybercriminal group calling itself the “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20210410013319/http://recursion.team/&amp;#34;&amp;gt;Recursion Team.&amp;lt;/a&amp;gt; ” This group specialized in SIM swapping targets of interest and participating in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=swatting&amp;#34;&amp;gt;“swatting” attacks&amp;lt;/a&amp;gt; , wherein fake bomb threats, hostage situations and other violent scenarios are phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address.&amp;lt;br&amp;gt;
The founder of the Recursion Team was a then 14-year-old from the United Kingdom who used the handle “ Everlynn .” On April 5, 2021, Everlynn posted a new sales thread to the cybercrime forum cracked[.]to titled, “Warrant/subpoena service (get law enforcement data from any service).” The price: $100 to $250 per request.&amp;lt;br&amp;gt;
Everlynn advertising a warrant/subpoena service based on fake EDRs. Image: Ke-la.com.&amp;lt;br&amp;gt;
“Services [include] Apple, Snapchat, Google (more expensive), not doing Discord, basically any site mostly,” read Everlynn’s ad, which was posted by the user account “InfinityRecursion.”&amp;lt;br&amp;gt;
A month prior on Cracked, Everlynn posted a sales thread, “1x Government Email Account || BECOME A FED!,” which advertised the ability to send email from a federal agency within the government of Argentina.&amp;lt;br&amp;gt;
“I would like to sell a government email that can be used for subpoena for many companies such as Apple, Uber, Instagram, etc.,” Everlynn’s sales thread explained, setting the price at $150. “You can breach users and get private images from people on SnapChat like nudes, go hack your girlfriend or something haha. You won’t get the login for the account, but you’ll basically obtain everything in the account if you play your cards right. I am not legally responsible if you mishandle this. This is very illegal and you will get raided if you don’t use a vpn. You can also breach into the government systems for this, and find LOTS of more private data and sell it for way, way more.”&amp;lt;br&amp;gt;
Last week, the BBC reported that authorities in the United Kingdom &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bbc.com/news/technology-60864283&amp;#34;&amp;gt;had detained seven individuals aged 16 to 21&amp;lt;/a&amp;gt; in connection with LAPSUS$. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/#more-59088&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&amp;#34;&amp;gt;Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220329-121546/</link>
      <pubDate>Tue, 29 Mar 2022 12:15:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220329-121546/</guid>
      <description>March 29, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/03/29/free-software-free-infrastructure.html&amp;#34;&amp;gt;It is important for free software to use free software infrastructure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220329-081318/</link>
      <pubDate>Tue, 29 Mar 2022 08:13:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220329-081318/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00897-8&amp;#34;&amp;gt;Biden bids again to boost science spending — but faces long odds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The US president wants huge increases for clean energy and public health, but a divided Congress might not go along.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ferns</title>
      <link>https://www.whatsupup.com/blog/incremental/comte/20220329-080647/</link>
      <pubDate>Tue, 29 Mar 2022 08:06:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/incremental/comte/20220329-080647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2022/03/29/A-20Software-20Estimation-20Method-20Where-20Every-20Task-20Is-20Estimated-20At-20Infinite-20Time.html&amp;#34;&amp;gt;My Software Estimation Method, Where Every Task Is Estimated At Infinite Time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220327-081941/</link>
      <pubDate>Sun, 27 Mar 2022 08:19:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220327-081941/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2015/05/12/pan-galactic-division-in-haskell/&amp;#34;&amp;gt;Pan-Galactic Division in Haskell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220327-081338/</link>
      <pubDate>Sun, 27 Mar 2022 08:13:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220327-081338/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/21/Prof-Dale-and-Me&amp;#34;&amp;gt;Professor Dale and Me&amp;lt;/a&amp;gt; · To misquote William Gibson: “The past is still here with us, just unevenly distributed.”     I have a story to tell that stars Sergei Rachmaninoff and me. It starts just before 1900 in Moscow.     My part ends around 1972 in the mountains of Lebanon, looking down over Beirut and the blue Mediterranean. It doesn’t     have to do with computers and nothing in it matters to anyone living except me, but maybe you’ll enjoy a faintly exotic musical     echo from a long time ago a long way away &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/21/Prof-Dale-and-Me&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [5 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20220327-002032/</link>
      <pubDate>Sun, 27 Mar 2022 00:20:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20220327-002032/</guid>
      <description>Diesmal bei &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/hashtag/ichgebeauf?src=hash&amp;amp;ref_src=twsrc%5Etfw&amp;#34;&amp;gt;#ichgebeauf&amp;lt;/a&amp;gt; von &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/kriegundfreitag?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;@kriegundfreitag&amp;lt;/a&amp;gt; : zeichnet bzw. malt eine Weihnachtskarte! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/hashtag/kleinekunstklasse?src=hash&amp;amp;ref_src=twsrc%5Etfw&amp;#34;&amp;gt;#kleinekunstklasse&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/isvmDbtaly&amp;#34;&amp;gt;pic.twitter.com/isvmDbtaly&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20220326-201956/</link>
      <pubDate>Sat, 26 Mar 2022 20:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20220326-201956/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/blog/archive/2022/03/note-taking-in-emacs-with-howm.html&amp;#34;&amp;gt;Note taking in Emacs with howm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Prelude and Motivation&amp;lt;br&amp;gt;
After trying out and fiddling with a plethora of existing and
self-written software to organize my notes, I have decided I need to
stop experimentation and choose a solution that is sufficient, but
most importantly, one that I actually will use and have migrated all
my existing notes to.  Note taking systems are not an end unto
themselves.&amp;lt;br&amp;gt;
Roughly speaking, my essential requirements are:&amp;lt;br&amp;gt;
Something that works with plain text, and ideally supports Markdown
as that is the syntax I publish most things in and I am most
familiar with.&amp;lt;br&amp;gt;
Something that can be used from Emacs, because that’s where I do
most my text editing and writing.&amp;lt;br&amp;gt;
Something that stores a note per file.
This has just proved to be the most future-proof way.&amp;lt;br&amp;gt;
Some basic means of connecting notes.&amp;lt;br&amp;gt;
I found I don’t need these things:&amp;lt;br&amp;gt;
Support for direct HTML publishing, as I realized that most of my
notes are written for myself and I’ll put them up somewhere else for
publishing.  (This usually involves prior editing anyway.)&amp;lt;br&amp;gt;
Having a fancy UI and graph displays.  I consider these goodies I
can easily go without.&amp;lt;br&amp;gt;
Specialized productivity features like to-do lists, date scheduling
or time tracking.  These are out of scope for my use: I use a
regular calendar for things with a deadline (which I’m blessed to
have very few of) and will stick to simple to-do lists for my
personal projects.&amp;lt;br&amp;gt;
Many people would recommend me &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://orgmode.org/&amp;#34;&amp;gt;org-mode&amp;lt;/a&amp;gt; now,
but I’ve never been a fan of its clunky syntax and I really don’t need
most of the features. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.orgroam.com/&amp;#34;&amp;gt;org-roam&amp;lt;/a&amp;gt; at first
looked promising but linking between notes is quite complicated and the
database dependency seems to be overkill for a personal note taking
system on modern hardware.&amp;lt;br&amp;gt;
I decided to settle on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://howm.osdn.jp/&amp;#34;&amp;gt;howm&amp;lt;/a&amp;gt; , an Emacs mode
that is not very well-known in the Western world but has gained a
certain following in Japan.&amp;lt;br&amp;gt;
It’s a roughly 20-year-old Emacs mode that’s still being used and
maintained by its original author Kazuyuki Hiraoka, so I have
confidence it will be around for some more time.  You can format notes
however you like, so I can use Markdown as I prefer.  Notes are one
file per note by default (but see below).  It actually has features
for date scheduling and to-do lists, but I won’t go deeper into them
for now.  Its code is reasonable simple and well structured, so I was
able to extend it in a few ways easily, as I’ll detail at the end of
this post.&amp;lt;br&amp;gt;
What really sold me was this quote I found on the mailing list:&amp;lt;br&amp;gt;
I cannot show a good general guide because I’m lazy, loose, and bad at
tidying.  I’ve already given up well-ordered notes.  Howm may be
suitable for those who are tired from strict systems.&amp;lt;br&amp;gt;
— Kazuyuki Hiraoka&amp;lt;br&amp;gt;
Such an undogmatic system is just right for my purposes.&amp;lt;br&amp;gt;
How howm works&amp;lt;br&amp;gt;
Since there are very few resources in English that explain howm
(apart from this &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20060409123241/http://dto.twu.net/HowmTutorial.howm.html&amp;#34;&amp;gt;2006 article&amp;lt;/a&amp;gt; that got lost in time), I shall give a quick introduction for the
interested reader:&amp;lt;br&amp;gt;
howm is short for “Hitori Otegaru Wiki Modoki”, which roughly
translates to “Single-user Easy Wiki Mode”.&amp;lt;br&amp;gt;
The basic feature set of howm is very simple, and can be condensed
into the mantra “write fragmentarily and read collectively”.
Essentially, howm provides an Emacs minor mode for marking text to
trigger certain searches.  Since it is a minor mode, you can use
whatever major mode you like to use for your writing (e.g., I currently use&amp;lt;br&amp;gt;
markdown-mode&amp;lt;br&amp;gt;
Howm notes are kept in a directory hierarchy that you can organize how
you wish; by default a date-based system is used and filenames include
the current timestamp at creation.  This provides unique and sensible
note identifiers, so I stick to it.  You also can create explicitly
named note files, but I haven’t found a use for them yet.&amp;lt;br&amp;gt;
There are two essential kinds of markup howm cares about:
note titles and links.  By default, titles are marked up
by putting a ‘&amp;lt;br&amp;gt;
=&amp;lt;br&amp;gt;
’ at the beginning of the line, but this can be configured
(and must be done so before loading&amp;lt;br&amp;gt;
howm-mode&amp;lt;br&amp;gt;
(!)).
The benefit of adding a title to a note is that you can have
the summary buffer show titles instead of matching lines,
which can be helpful to get a better overview of search results.
(The creator of howm is sceptical of titling all notes, I think it
very much depends the average length of your notes.
There is no requirement to use titles.)&amp;lt;br&amp;gt;
There are two kinds of links supported by howm, namely goto and come-from (in a nod to INTERCAL). goto links are forward
references and written like this:&amp;lt;br&amp;gt;
&amp;amp;gt;&amp;amp;gt;&amp;amp;gt; howm&amp;lt;br&amp;gt;
Pressing return on this line when&amp;lt;br&amp;gt;
is enabled will show a
list of all occurences of the word&amp;lt;br&amp;gt;
howm&amp;lt;br&amp;gt;
in your notes directory.&amp;lt;br&amp;gt;
In contrast, a come-from link is written like this:&amp;lt;br&amp;gt;
&amp;amp;lt;&amp;amp;lt;&amp;amp;lt; howm&amp;lt;br&amp;gt;
And this will cause the word&amp;lt;br&amp;gt;
in any howm-mode buffer to be
underlined and trigger a search where the buffer with&amp;lt;br&amp;gt;
will appear first.&amp;lt;br&amp;gt;
Thus, compared to most contemporary hypertext systems, we not only
have a means of explicitly linking to other notes, but also for
creating implicit contextual links—which can help you find connections
between your notes that you didn’t see yet…&amp;lt;br&amp;gt;
It is straightforward to implement something like&amp;lt;br&amp;gt;
#tags&amp;lt;br&amp;gt;
WikiWords&amp;lt;br&amp;gt;
using these features, if you wish to do so.&amp;lt;br&amp;gt;
Additionally, howm provides an inline link syntax&amp;lt;br&amp;gt;
[[...]]&amp;lt;br&amp;gt;
that works
like&amp;lt;br&amp;gt;
&amp;amp;gt;&amp;amp;gt;&amp;amp;gt;&amp;lt;br&amp;gt;
but can appear within a line.  I make a suggestion below how to turn
it into a direct link to the first page with the given title; but for
now I decided not to use this very much.&amp;lt;br&amp;gt;
The line-based nature of the&amp;lt;br&amp;gt;
syntax prevents usage for “inline”
links.  After giving it some thought, I consider it a strength for a
note-taking system to make forward links related to a paragraph and
not part of a sentence.  Additionally, it also makes the plain text
easier to read as the link target is not interleaved into the text.
(Compare with the use of reference-style links in Markdown.)&amp;lt;br&amp;gt;
An aside: howm actually supports multiple notes per file by having
multiple title lines in a file.  The search summary will always show
the title directly before the matching line.  You can use&amp;lt;br&amp;gt;
C-c , C&amp;lt;br&amp;gt;
to
create a new note in the current buffer.  I don’t use this much, but I
think it could be useful for glossary files that contain many short
notes.  Some people also use this for keeping multiple daily notes in
a single file.&amp;lt;br&amp;gt;
Using howm&amp;lt;br&amp;gt;
Howm provides two main features to access notes: the menu and the
summary buffer.  The howm menu (shown with&amp;lt;br&amp;gt;
C-c , ,&amp;lt;br&amp;gt;
) provides a very
customizable view into your howm notes.  By default it shows your
schedule, recent notes, and random notes.  You can access many howm
features with a single keypress from the menu.  Since I don’t use the
scheduling feature, I mostly access howm from the summary buffer
instead.&amp;lt;br&amp;gt;
The howm summary buffer shows the result of a search (&amp;lt;br&amp;gt;
C-c , g&amp;lt;br&amp;gt;
), a
list of recent notes (&amp;lt;br&amp;gt;
C-c , l&amp;lt;br&amp;gt;
), or an overview of all notes (&amp;lt;br&amp;gt;
C-c , a&amp;lt;br&amp;gt;
).
It is very convenient to see the matches and you get a preview
of the note when you move the cursor to a search result.  Typing RET
will open the note for editing.  Typing&amp;lt;br&amp;gt;
T&amp;lt;br&amp;gt;
will toggle between
displaying matching lines or the titles of notes with matches.&amp;lt;br&amp;gt;
In the summary buffer, you can also type&amp;lt;br&amp;gt;
@&amp;lt;br&amp;gt;
and read all matching
notes in a concatenated way, so you get the full context of all notes
at once.&amp;lt;br&amp;gt;
Setting up and customizing howm&amp;lt;br&amp;gt;
Basic setup is reasonably well documented in English, but I’ll
summarize it here.  You can get howm from ELPA these days, so
installing is very easy.  You should set some variables to configure
it according to your needs:&amp;lt;br&amp;gt;
;; Directory configuration
(setq howm-home-directory &amp;amp;#34;~/prj/howm/&amp;amp;#34;)
(setq howm-directory &amp;amp;#34;~/prj/howm/&amp;amp;#34;)
(setq howm-keyword-file (expand-file-name &amp;amp;#34;.howm-keys&amp;amp;#34; howm-home-directory))
(setq howm-history-file (expand-file-name &amp;amp;#34;.howm-history&amp;amp;#34; howm-home-directory))
(setq howm-file-name-format &amp;amp;#34;%Y/%m/%Y-%m-%d-%H%M%S.md&amp;amp;#34;)&amp;lt;br&amp;gt;
Here, we decide that&amp;lt;br&amp;gt;
~/prj/howm&amp;lt;br&amp;gt;
is the base directory for our howm
notes, and we also put the two auxiliary files howm uses there.
Additionally, we change the default name format to end with&amp;lt;br&amp;gt;
.md&amp;lt;br&amp;gt;
(which also turns on markdown-mode by default).&amp;lt;br&amp;gt;
Next, we want to use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/BurntSushi/ripgrep&amp;#34;&amp;gt;ripgrep&amp;lt;/a&amp;gt; for searching howm.  For my usage, plain GNU grep would be sufficient,
but I want to use ripgrep in the next step too, so for consistency
let’s use it for all searches:&amp;lt;br&amp;gt;
;; Use ripgrep as grep
(setq howm-view-use-grep t)
(setq howm-view-grep-command &amp;amp;#34;rg&amp;amp;#34;)
(setq howm-view-grep-option &amp;amp;#34;-nH --no-heading --color never&amp;amp;#34;)
(setq howm-view-grep-extended-option nil)
(setq howm-view-grep-fixed-option &amp;amp;#34;-F&amp;amp;#34;)
(setq howm-view-grep-expr-option nil)
(setq howm-view-grep-file-stdin-option nil)&amp;lt;br&amp;gt;
The next addition is interactive search with ripgrep (&amp;lt;br&amp;gt;
C-c , r&amp;lt;br&amp;gt;
).
This is the most useful feature I added to howm myself.
I think it provides a great way to interact with your notes, as you get
instant feedback from your search terms, and can stop searching as
soon as you found what you were looking for.
I used&amp;lt;br&amp;gt;
counsel-rg&amp;lt;br&amp;gt;
as an inspiration for this, and we turn the ripgrep matches
into a regular howm summary buffer for further consumption.&amp;lt;br&amp;gt;
;; counsel-rg for howm
(defun howm-list--counsel-rg (match)
  (if (string= match &amp;amp;#34;&amp;amp;#34;)
  (howm-list-all)
(if (or (null ivy--old-cands)
	(equal ivy--old-cands &amp;amp;#39;(&amp;amp;#34;No matches found&amp;amp;#34;)))
        (message &amp;amp;#34;No match&amp;amp;#34;)
  (let ((howm-view-use-grep
	 #&amp;amp;#39;(lambda (str file-list &amp;amp;amp;optional fixed-p force-case-fold)
                 (mapcar
                  (lambda (cand)
		(if (string-match &amp;amp;#34;\\`\\(.*\\):\\([0-9]&#43;\\):\\(.*\\)\\&amp;amp;#39;&amp;amp;#34; cand)
                        (let ((file (match-string-no-properties 1 cand))
			  (line (match-string-no-properties 2 cand))
			  (match-line (match-string-no-properties 3 cand)))
                          (list (expand-file-name file howm-directory)
                                (string-to-number line)
                                match-line))))
                  ivy--old-cands))))
        (howm-search ivy--old-re t)
        (riffle-set-place …</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220326-041515/</link>
      <pubDate>Sat, 26 Mar 2022 04:15:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220326-041515/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00845-6&amp;#34;&amp;gt;Exclusive: Documents reveal NASA’s internal struggles over renaming Webb telescope&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
E-mails show agency’s controversial response to astronomers concerned about past LGBT&#43; discrimination.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220326-000819/</link>
      <pubDate>Sat, 26 Mar 2022 00:08:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220326-000819/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-makes-a-great-component-library/&amp;#34;&amp;gt;In this article, we’ll look at some of the key factors you’ll need to consider if you’re planning on creating and maintaining an effective component library, from choosing the right component library development tools and best practices like testing and documentation.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220326-000545/</link>
      <pubDate>Sat, 26 Mar 2022 00:05:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220326-000545/</guid>
      <description>An Estonian man was sentenced today to more than five years in a U.S. prison for his role in at least 13 ransomware attacks that caused losses of approximately $53 million. Prosecutors say the accused also enjoyed a lengthy career of “cashing out” access to hacked bank accounts worldwide.&amp;lt;br&amp;gt;
Maksim Berezan , 37, is an Estonian national who was arrested nearly two years ago in Latvia. U.S. authorities alleged Berezan was a longtime member of DirectConnection , a closely-guarded Russian cybercriminal forum that existed until 2015. Berezan’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/03/berezanindict.pdf&amp;#34;&amp;gt;indictment&amp;lt;/a&amp;gt; (PDF) says he used his status at DirectConnection to secure cashout jobs from other vetted crooks on the exclusive crime forum.&amp;lt;br&amp;gt;
Berezan specialized in cashouts and “drops.” Cashouts refer to using stolen payment card data to make fraudulent purchases or to withdraw money from bank accounts without authorization. A drop is a location or individual able to securely receive and forward funds or goods obtained through cashouts or other types of fraud. Drops typically are used to make it harder for law enforcement to trace fraudulent transactions and to circumvent fraud detection measures used by banks and credit card companies.&amp;lt;br&amp;gt;
Acting on information from U.S. authorities, in November 2020 Latvian police searched Berezan’s residence there and found a red Porsche Carrera 911, a black Porsche Cayenne, a Ducati motorcycle, and an assortment of jewelry. They also seized $200,000 in currency, and $1.7 million in bitcoin.&amp;lt;br&amp;gt;
After Berezan was extradited to the United States in December 2020, investigators searching his electronic devices said they found “significant evidence of his involvement in ransomware activity.”&amp;lt;br&amp;gt;
“The post-extradition investigation determined that Berezan had participated in at least 13 ransomware attacks, 7 of which were against U.S. victims, and that approximately $11 million in ransom payments flowed into cryptocurrency wallets that he controlled,” reads &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-edva/pr/cybercriminal-connected-multimillion-dollar-ransomware-attacks-sentenced-online-fraud&amp;#34;&amp;gt;a statement&amp;lt;/a&amp;gt; from the U.S. Department of Justice .&amp;lt;br&amp;gt;
Berezan pleaded guilty in April 2021 to conspiracy to commit wire fraud. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/estonian-tied-to-13-ransomware-attacks-gets-66-months-in-prison/#more-59083&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/estonian-tied-to-13-ransomware-attacks-gets-66-months-in-prison/&amp;#34;&amp;gt;Estonian Tied to 13 Ransomware Attacks Gets 66 Months in Prison&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220325-162020/</link>
      <pubDate>Fri, 25 Mar 2022 16:20:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220325-162020/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/introducing-mdn-plus-make-mdn-your-own/&amp;#34;&amp;gt;Introducing MDN Plus: Make MDN your own →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MDN is one of the most trusted resources for information about web standards, code samples, tools, and everything you need as a developer to create websites. Today, we are launching MDN Plus, our first step to providing a personalized and more powerful experience while continuing to invest in our always free and open webdocs.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220325-041830/</link>
      <pubDate>Fri, 25 Mar 2022 04:18:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220325-041830/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2007/09/01/squarefree-numbers-in-haskell/&amp;#34;&amp;gt;Squarefree numbers in Haskell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220325-041552/</link>
      <pubDate>Fri, 25 Mar 2022 04:15:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220325-041552/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-antitrust-movement-is&amp;#34;&amp;gt;The Big Tech Antitrust Movement Is Finally Showing Results&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-antitrust-movement-is&amp;#34;&amp;gt;In one week, Google opened direct payments to Android developers and Europe passed the Digital Markets Act. It’s not the return of the free market, but it’s something.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220325-041413/</link>
      <pubDate>Fri, 25 Mar 2022 04:14:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220325-041413/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/03/racing-against-clock-hitting-tiny.html&amp;#34;&amp;gt;Racing against the clock &amp;amp;ndash; hitting a tiny kernel &amp;amp;hellip;&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220325-040800/</link>
      <pubDate>Fri, 25 Mar 2022 04:08:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220325-040800/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/snowflake-resource-optimization-app/&amp;#34;&amp;gt;You can now use Retool to not only view query results about your Snowflake resources, but also to take action on them—all from one easy-to-use UI.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220325-001345/</link>
      <pubDate>Fri, 25 Mar 2022 00:13:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220325-001345/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/03/racing-against-clock-hitting-tiny.html&amp;#34;&amp;gt;Racing against the clock &amp;amp;ndash; hitting a tiny kernel race window&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
TL;DR:&amp;lt;br&amp;gt;
How to make a tiny kernel race window really large even on kernels without CONFIG_PREEMPT :&amp;lt;br&amp;gt;
use a cache miss to widen the race window a little bit&amp;lt;br&amp;gt;
make a timerfd expire in that window (which will run in an interrupt handler - in other words, in hardirq context)&amp;lt;br&amp;gt;
make sure that the wakeup triggered by the timerfd has to churn through 50000 waitqueue items created by epoll&amp;lt;br&amp;gt;
Racing one thread against a timer also avoids accumulating timing variations from two threads in each race attempt - hence the title. On the other hand, it also means you now have to deal with how hardware timers actually work, which introduces its own flavors of weird timing variations.&amp;lt;br&amp;gt;
I recently discovered a race condition ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/project-zero/2247&amp;#34;&amp;gt;https://crbug.com/project-zero/2247&amp;lt;/a&amp;gt; ) in the Linux kernel. (While trying to explain to someone how &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca&amp;#34;&amp;gt;the fix for CVE-2021-0920&amp;lt;/a&amp;gt; worked - I was explaining why the Unix GC is now safe, and then got confused because I couldn&amp;amp;#39;t actually figure out why it&amp;amp;#39;s safe after that fix, eventually realizing that it actually isn&amp;amp;#39;t safe.) It&amp;amp;#39;s a fairly narrow race window, so I was wondering whether it could be hit with a small number of attempts - especially on kernels that aren&amp;amp;#39;t built with CONFIG_PREEMPT , which would make it possible to preempt a thread with another thread, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://static.sched.com/hosted_files/lsseu2019/04/LSSEU2019%20-%20Exploiting%20race%20conditions%20on%20Linux.pdf#page=12&amp;#34;&amp;gt;as I described at LSSEU2019&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This is a writeup of how I managed to hit the race on a normal Linux desktop kernel, with a hit rate somewhere around 30% if the proof of concept has been tuned for the specific machine. I didn&amp;amp;#39;t do a full exploit though, I stopped at getting evidence of use-after-free (UAF) accesses (with the help of a very large file descriptor table and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/819834/&amp;#34;&amp;gt;userfaultfd&amp;lt;/a&amp;gt; , which might not be available to normal users depending on system configuration) because that&amp;amp;#39;s the part I was curious about.&amp;lt;br&amp;gt;
This also demonstrates that even very small race conditions can still be exploitable if someone sinks enough time into writing an exploit, so be careful if you dismiss very small race windows as unexploitable or don&amp;amp;#39;t treat such issues as security bugs.&amp;lt;br&amp;gt;
The UAF reproducer is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2247#c6&amp;#34;&amp;gt;in our bugtracker&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
In the UNIX domain socket garbage collection code (which is needed to deal with reference loops formed by UNIX domain sockets that use SCM_RIGHTS file descriptor passing), the kernel tries to figure out whether it can account for all references to some file by comparing the file&amp;amp;#39;s refcount with the number of references from inflight SKBs (socket buffers). If they are equal, it assumes that the UNIX domain sockets subsystem effectively has exclusive access to the file because it owns all references.&amp;lt;br&amp;gt;
(The same pattern also appears for files as an optimization in __fdget_pos() , see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/lkml/CAG48ez1pnatAB095dnbrn9LbuQe4&#43;ENwh-WEW36pM40ozhpruw@mail.gmail.com/&amp;#34;&amp;gt;this LKML thread&amp;lt;/a&amp;gt; .)&amp;lt;br&amp;gt;
The problem is that struct file can also be referenced from an RCU read-side critical section (which you can&amp;amp;#39;t detect by looking at the refcount), and such an RCU reference can be upgraded into a refcounted reference using get_file_rcu() / get_file_rcu_many() by __fget_files() as long as the refcount is non-zero. For example, when this happens in the dup() syscall, the resulting reference will then be installed in the FD table and be available for subsequent syscalls.&amp;lt;br&amp;gt;
When the garbage collector (GC) believes that it has exclusive access to a file, it will perform operations on that file that violate the locking rules used in normal socket-related syscalls such as recvmsg() - unix_stream_read_generic() assumes that queued SKBs can only be removed under the -&amp;amp;gt;iolock mutex, but the GC removes queued SKBs without using that mutex. (Thanks to Xingyu Jin for explaining that to me.)&amp;lt;br&amp;gt;
One way of looking at this bug is that the GC is working correctly - here&amp;amp;#39;s a state diagram showing some of the possible states of a struct file , with more specific states nested under less specific ones and with the state transition in the GC marked:&amp;lt;br&amp;gt;
While __fget_files() is making an incorrect assumption about the state of the struct file while it is trying to narrow down its possible states - it checks whether get_file_rcu() / get_file_rcu_many() succeeds, which narrows the file&amp;amp;#39;s state down a bit but not far enough:&amp;lt;br&amp;gt;
And this directly leads to how &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9185d4f5eb9a90282d1ce74772969&amp;#34;&amp;gt;the bug was fixed&amp;lt;/a&amp;gt; (there&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e386dfc56f837da66d00a078e5314bc8382fab83&amp;#34;&amp;gt;another follow-up patch&amp;lt;/a&amp;gt; , but that one just tries to clarify the code and recoup some of the resulting performance loss) - the fix adds another check in __fget_files() to properly narrow down the state of the file such that the file is guaranteed to be live :&amp;lt;br&amp;gt;
The fix ensures that a live reference can only be derived from another live reference by comparing with an FD table entry, which is guaranteed to point to a live object.&amp;lt;br&amp;gt;
[Sidenote: This scheme is similar to the one used for struct page - gup_pte_range() also uses the &amp;amp;#34;grab pointer, increment refcount, recheck pointer&amp;amp;#34; pattern for locklessly looking up a struct page from a page table entry while ensuring that new refcounted references can&amp;amp;#39;t be created without holding an existing reference. This is really important for struct page because a page can be given back to the page allocator and reused while gup_pte_range() holds an uncounted reference to it - freed pages still have their struct page , so there&amp;amp;#39;s no need to delay freeing of the page - so if this went wrong, you&amp;amp;#39;d get a page UAF.]&amp;lt;br&amp;gt;
My initial suggestion was to instead fix the issue by changing how unix_gc() ensures that it has exclusive access, letting it set the file&amp;amp;#39;s refcount to zero to prevent turning RCU references into refcounted ones; this would have avoided adding any code in the hot __fget_files() path, but it would have only fixed unix_gc() , not the __fdget_pos() case I discovered later, so it&amp;amp;#39;s probably a good thing this isn&amp;amp;#39;t how it was fixed:&amp;lt;br&amp;gt;
[Sidenote: In my original bug report I wrote that you&amp;amp;#39;d have to wait an RCU grace period in the GC for this, but that wouldn&amp;amp;#39;t be necessary as long as the GC ensures that a reaped socket&amp;amp;#39;s refcount never becomes non-zero again.]&amp;lt;br&amp;gt;
The race&amp;lt;br&amp;gt;
There are multiple race conditions involved in exploiting this bug, but by far the trickiest to hit is that we have to race an operation into the tiny race window in the middle of __fget_files() (which can e.g. be reached via dup() ), between the file descriptor table lookup and the refcount increment:&amp;lt;br&amp;gt;
static struct file *__fget_files(struct files_struct *files, unsigned int fd,&amp;lt;br&amp;gt;
fmode_t mask, unsigned int refs)&amp;lt;br&amp;gt;
struct file *file;&amp;lt;br&amp;gt;
rcu_read_lock();&amp;lt;br&amp;gt;
loop:&amp;lt;br&amp;gt;
file = files_lookup_fd_rcu(files, fd) ; // race window start&amp;lt;br&amp;gt;
if (file) {&amp;lt;br&amp;gt;
/* File object ref couldn&amp;amp;#39;t be taken.&amp;lt;br&amp;gt;
* dup2() atomicity guarantee is the reason&amp;lt;br&amp;gt;
* we loop to catch the new file (or NULL pointer)&amp;lt;br&amp;gt;
*/&amp;lt;br&amp;gt;
if (file-&amp;amp;gt;f_mode &amp;amp;amp; mask)&amp;lt;br&amp;gt;
file = NULL;&amp;lt;br&amp;gt;
else if (! get_file_rcu_many(file, refs) ) // race window end&amp;lt;br&amp;gt;
goto loop;&amp;lt;br&amp;gt;
rcu_read_unlock();&amp;lt;br&amp;gt;
return file;&amp;lt;br&amp;gt;
In this race window , th e file descriptor must be closed (to drop the FD&amp;amp;#39;s reference to the file) and a unix_gc() run must get past the point where it checks the file&amp;amp;#39;s refcount (&amp;amp;#34; total_refs = file_count(u-&amp;amp;gt;sk.sk_socket-&amp;amp;gt;file) &amp;amp;#34;).&amp;lt;br&amp;gt;
In the Debian 5.10.0-9-amd64 kernel at version 5.10.70-1, that race window looks as follows:&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x1e&amp;amp;gt; cmp    r10,rax&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x21&amp;amp;gt; sbb    rax,rax&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x24&amp;amp;gt; mov    rdx,QWORD PTR [r11&#43;0x8]&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x28&amp;amp;gt; and    eax,r8d&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x2b&amp;amp;gt; lea    rax,[rdx&#43;rax*8]&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x2f&amp;amp;gt; mov    r12,QWORD PTR [rax] ; RACE WINDOW START&amp;lt;br&amp;gt;
; r12 now contains file*&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x32&amp;amp;gt; test   r12,r12&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x35&amp;amp;gt; je     ffffffff812e3df7 &amp;amp;lt;__fget_files&#43;0x77&amp;amp;gt;&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x37&amp;amp;gt; mov    eax,r9d&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x3a&amp;amp;gt; and    eax,DWORD PTR [r12&#43;0x44] ; LOAD (for -&amp;amp;gt;f_mode)&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x3f&amp;amp;gt; jne    ffffffff812e3df7 &amp;amp;lt;__fget_files&#43;0x77&amp;amp;gt;&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x41&amp;amp;gt; mov    rax,QWORD PTR [r12&#43;0x38] ; LOAD (for -&amp;amp;gt;f_count)&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x46&amp;amp;gt; lea    rdx,[r12&#43;0x38]&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x4b&amp;amp;gt; test   rax,rax&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x4e&amp;amp;gt; je     ffffffff812e3def &amp;amp;lt;__fget_files&#43;0x6f&amp;amp;gt;&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x50&amp;amp;gt; lea    rcx,[rsi&#43;rax*1]&amp;lt;br&amp;gt;
&amp;amp;lt;__fget_files&#43;0x54&amp;amp;gt; lock cmpxchg QWORD PTR [rdx],rcx ; RACE WINDOW END (on cmpxchg success)&amp;lt;br&amp;gt;
As you can see, the race window is fairly small - around 12 instructions, assuming that the cmpxchg succeeds.&amp;lt;br&amp;gt;
Missing some cache&amp;lt;br&amp;gt;
Luckily for us, the race window contains the first few memory accesses to the struct file ; therefore, by making sure that the struct file is not present in the fastest CPU caches, we can widen the race window by as much time as the memory accesses take. The standard way to do this is to use an eviction pattern / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cs.columbia.edu/~simha/spyjs.ccs15.pdf&amp;#34;&amp;gt;eviction set&amp;lt;/a&amp;gt; ; but instead we can also make the cache line dirty on another core (see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dreamsofastone.blogspot.com/2016/02/row-hammer-java-script-and-mesi.html&amp;#34;&amp;gt;Anders Fogh&amp;amp;#39;s blogpost&amp;lt;/a&amp;gt; for more detail). (I&amp;amp;#39;m not actually sure about the intricacies of how much latency this adds on different manufacturers&amp;amp;#39; CPU cores, or on different CPU generations - I&amp;amp;#39;ve only tested different versions of my proof-of-concept on Intel Skylake and Tiger Lake. Differences in cache coherency protocols or snooping might make a big difference.)&amp;lt;br&amp;gt;
For the cache line containing the flags and refcount of a struct file , this can be done by, on another CPU, temporarily bumping its refcount up and then changing it back down, e.g. with close(dup(fd)) (or just by accessing the FD in pretty much any way from a multithreaded process).&amp;lt;br&amp;gt;
However, when we&amp;amp;#39;re trying to hit the race in __fget_files() via dup() , we don&amp;amp;#39;t want any cache misses to occur before we hit the race window - that would slow us down and probably make us miss the race. To prevent that from happening, we can call dup() with a different FD number for a warm-up run shortly before attempting the race. Because we also want the relevant cache line in the FD table to be hot, we should choose the FD number for the warm-up run such that it uses the same cache line of the file descriptor table.&amp;lt;br&amp;gt;
An …</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220324-161923/</link>
      <pubDate>Thu, 24 Mar 2022 16:19:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220324-161923/</guid>
      <description>March 24, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/03/24/Netherlands-update.html&amp;#34;&amp;gt;The Netherlands so far&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220324-161917/</link>
      <pubDate>Thu, 24 Mar 2022 16:19:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220324-161917/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/introducing-mdn-plus-make-mdn-your-own/&amp;#34;&amp;gt;Introducing MDN Plus: Make MDN your own&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MDN is one of the most trusted resources for information about web standards, code samples, tools, and everything you need as a developer to create websites. In 2015, we explored how we could expand beyond documentation to provide a structured learning experience. Our first foray was the Learning Area, with the goal of providing a […]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220324-161508/</link>
      <pubDate>Thu, 24 Mar 2022 16:15:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220324-161508/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#celebration-of-mind&amp;#34;&amp;gt;celebration-of-mind&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The other week, I attended a book club on Kafka’s short story &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cpb-us-w2.wpmucdn.com/campuspress.yale.edu/dist/1/2391/files/2018/12/Kafka-The-Burrow-1jcjgv3.pdf&amp;#34;&amp;gt;The Burrow&amp;lt;/a&amp;gt; .
It’s a quite frankly brilliant portrayal of neuroticism. The titular burrow
reads like a metaphor for so many things at once: a house, a body of work,
a life history. The story (translated by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Willa_Muir&amp;#34;&amp;gt;Willa and Edwin Muir&amp;lt;/a&amp;gt; )
is quotable and yet, somehow, no pull quote could be satisfactory;
all I can recommend is that you go read it!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220324-160557/</link>
      <pubDate>Thu, 24 Mar 2022 16:05:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220324-160557/</guid>
      <description>Microsoft and identity management platform Okta both this week disclosed breaches involving LAPSUS$ , a relatively new cybercrime group that specializes in stealing data from big companies and threatening to publish it unless a ransom demand is paid. Here’s a closer look at LAPSUS$, and some of the low-tech but high-impact methods the group uses to gain access to targeted organizations.&amp;lt;br&amp;gt;
First surfacing in December 2021 with an extortion demand on Brazil’s Ministry of Health, LAPSUS$ made headlines more recently for posting screenshots of internal tools tied to a number of major corporations, including NVIDIA, Samsung, and Vodafone.&amp;lt;br&amp;gt;
On Tuesday, LAPSUS$ announced via its Telegram channel it was releasing source code stolen from Microsoft. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; published Mar. 22, Microsoft said it interrupted the LAPSUS$ group’s source code download before it could finish, and that it was able to do so because LAPSUS$ publicly discussed their illicit access on their Telegram channel before the download could complete.&amp;lt;br&amp;gt;
One of the LAPSUS$ group members admitted on their Telegram channel that the Microsoft source code download had been interrupted.&amp;lt;br&amp;gt;
“This public disclosure escalated our action allowing our team to intervene and interrupt the actor mid-operation, limiting broader impact,” Microsoft wrote. “No customer code or data was involved in the observed activities. Our investigation has found a single account had been compromised, granting limited access. Microsoft does not rely on the secrecy of code as a security measure and viewing source code does not lead to elevation of risk.”&amp;lt;br&amp;gt;
While it may be tempting to dismiss LAPSUS$ as an immature and fame-seeking group, their tactics should make anyone in charge of corporate security sit up and take notice. Microsoft says LAPSUS$ — which it boringly calls “ DEV-0537 ” — mostly gains illicit access to targets via “social engineering.” This involves bribing or tricking employees at the target organization or at its myriad partners, such as customer support call centers and help desks.&amp;lt;br&amp;gt;
“Microsoft found instances where the group successfully gained access to target organizations through recruited employees (or employees of their suppliers or business partners),” Microsoft wrote. The post continues:&amp;lt;br&amp;gt;
“DEV-0537 advertised that they wanted to buy credentials for their targets to entice employees or contractors to take part in its operation. For a fee, the willing accomplice must provide their credentials and approve the MFA prompt or have the user install AnyDesk or other remote management software on a corporate workstation allowing the actor to take control of an authenticated system. Such a tactic was just one of the ways DEV-0537 took advantage of the security access and business relationships their target organizations have with their service providers and supply chains.”&amp;lt;br&amp;gt;
The LAPSUS$ Telegram channel has grown to more than 45,000 subscribers, and Microsoft points to an ad LAPSUS$ posted there offering to recruit insiders at major mobile phone providers, large software and gaming companies, hosting firms and call centers.&amp;lt;br&amp;gt;
Sources tell KrebsOnSecurity that LAPSUS$ has been recruiting insiders via multiple social media platforms since at least November 2021. One of the core LAPSUS$ members who used the nicknames “Oklaqq” and “WhiteDoxbin” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://camas.github.io/reddit-search/#%7B%22author%22:%22oklaqq%22,%22searchFor%22:1,%22resultSize%22:100%7D&amp;#34;&amp;gt;posted recruitment messages to Reddit last year&amp;lt;/a&amp;gt; , offering employees at AT&amp;amp;amp;T, T-Mobile and Verizon up to $20,000 a week to perform “inside jobs.”&amp;lt;br&amp;gt;
LAPSUS$ leader Oklaqq a.k.a. “WhiteDoxbin” offering to pay $20,000 a week to corrupt employees at major mobile providers.&amp;lt;br&amp;gt;
Many of LAPSUS$’s recruitment ads are written in both English and Portuguese. According to cyber intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.flashpoint-intel.com&amp;#34;&amp;gt;Flashpoint&amp;lt;/a&amp;gt; , the bulk of the group’s victims (15 of them) have been in Latin America and Portugal.&amp;lt;br&amp;gt;
“LAPSUS$ currently does not operate a clearnet or darknet leak site or traditional social media accounts—it operates solely via Telegram and email,” Flashpoint wrote in an analysis of the group. “LAPSUS$ appears to be highly sophisticated, carrying out increasingly high-profile data breaches. The group has claimed it is not state-sponsored. The individuals behind the group are likely experienced and have demonstrated in-depth technical knowledge and abilities.”&amp;lt;br&amp;gt;
Microsoft said LAPSUS$ has been known to target the personal email accounts of employees at organizations they wish to hack, knowing that most employees these days use some sort of VPN to remotely access their employer’s network.&amp;lt;br&amp;gt;
“In some cases, [LAPSUS$] first targeted and compromised an individual’s personal or private (non-work-related) accounts giving them access to then look for additional credentials that could be used to gain access to corporate systems,” Microsoft wrote. “Given that employees typically use these personal accounts or numbers as their second-factor authentication or password recovery, the group would often use this access to reset passwords and complete account recovery actions.”&amp;lt;br&amp;gt;
In other cases, Microsoft said, LAPSUS$ has been seen calling a target organization’s help desk and attempting to convince support personnel to reset a privileged account’s credentials.&amp;lt;br&amp;gt;
“The group used the previously gathered information (for example, profile pictures) and had a native-English-sounding caller speak with the help desk personnel to enhance their social engineering lure,” Microsoft explained. “Observed actions have included DEV-0537 answering common recovery prompts such as “first street you lived on” or “mother’s maiden name” to convince help desk personnel of authenticity. Since many organizations outsource their help desk support, this tactic attempts to exploit those supply chain relationships, especially where organizations give their help desk personnel the ability to elevate privileges.”&amp;lt;br&amp;gt;
LAPSUS$ recruiting insiders via its Telegram channel.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/&amp;#34;&amp;gt;A Closer Look at the LAPSUS$ Data Extortion Group&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220324-041822/</link>
      <pubDate>Thu, 24 Mar 2022 04:18:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220324-041822/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2017/01/13/my-new-programming-languages-course/&amp;#34;&amp;gt;My new programming languages course&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220323-201314/</link>
      <pubDate>Wed, 23 Mar 2022 20:13:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220323-201314/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/persistent-disks-and-replication-9b9412fd9565?source=user_profile---------7-------------------------------&amp;#34;&amp;gt;Persistent Disks and Replication If you are a cloud user, you probably have seen how unconventional storage options can get. This is even true for disks you access from your virtual machines. There are not many ongoing conversations or references about the underlying details of core infrastructure. One such lacking conversation is how fundamentally…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220323-200609/</link>
      <pubDate>Wed, 23 Mar 2022 20:06:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220323-200609/</guid>
      <description>“Russia has strict regulations against processing for the gambling business,” Horohorin said. “While Russian banks can’t do it, Ukrainian ones can, so we have Ukrainian banks processing gambling and casinos, which mostly Russian gamblers use. What Pavel does is he blackmails those Ukrainian banks using his connections and knowledge. Some pay, some don’t. But some people are not very tolerant of that kind of abuse.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/spam-nation-villain-vrublevsky-charged-with-fraud/#more-58914&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220323-121419/</link>
      <pubDate>Wed, 23 Mar 2022 12:14:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220323-121419/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/04/Get-Computer-Glasses&amp;#34;&amp;gt;Get Computer Glasses&amp;lt;/a&amp;gt; · Let me guess: You spend a lot of time in front of a computer, to which is attached a large high-resolution outboard screen,     and you’re over 40, and you have glasses on your face.  A lot of you will already know this, but if you don’t, run not walk to     the nearest optometrist, get your eyes checked, and order a set of “computer glasses”.  Trust me on this &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/03/04/Get-Computer-Glasses&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [14 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220322-200556/</link>
      <pubDate>Tue, 22 Mar 2022 20:05:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220322-200556/</guid>
      <description>Pavel Vrublevsky , founder of the Russian payment technology firm ChronoPay and the antagonist in my 2014 book “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amazon.com/dp/B00L5QGBL0/ref=dp-kindle-redirect?_encoding=UTF8&amp;amp;btkr=1&amp;#34;&amp;gt;Spam Nation&amp;lt;/a&amp;gt; ,” was arrested in Moscow this month and charged with fraud. Russian authorities allege Vrublevsky operated several fraudulent SMS-based payment schemes, and facilitated money laundering for Hydra , the largest Russian darknet market. But according to information obtained by KrebsOnSecurity, it is equally likely Vrublevsky was arrested thanks to his propensity for carefully documenting the links between Russia’s state security services and the cybercriminal underground.&amp;lt;br&amp;gt;
An undated photo of Vrublevsky at his ChronoPay office in Moscow.&amp;lt;br&amp;gt;
ChronoPay specializes in providing access to the global credit card networks for “high risk” merchants — businesses involved in selling services online that tend to generate an unusually large number of chargebacks and reports of fraud, and hence have a higher risk of failure.&amp;lt;br&amp;gt;
When I first began writing about Vrublevsky &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://voices.washingtonpost.com/securityfix/2009/07/following_the_money_trail_of_r.html&amp;#34;&amp;gt;in 2009 as a reporter for The Washington Post&amp;lt;/a&amp;gt; , ChronoPay and its sister firm Red &amp;amp;amp; Partners (RNP) were earning millions setting up payment infrastructure &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/03/chronopays-scareware-diaries/&amp;#34;&amp;gt;for fake antivirus peddlers&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/02/russian-cops-crash-pill-pusher-party/&amp;#34;&amp;gt;spammers pimping male enhancement drugs&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Using the hacker alias “ RedEye ,” the ChronoPay CEO oversaw a burgeoning pharmacy spam affiliate program called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=rx-promotion&amp;#34;&amp;gt;Rx-Promotion&amp;lt;/a&amp;gt; , which paid some of Russia’s most talented spammers and virus writers to bombard the world with junk email promoting Rx-Promotion’s pill shops. RedEye also was the administrator of Crutop , a Russian language forum and affiliate program that catered to thousands of adult webmasters.&amp;lt;br&amp;gt;
In 2013, Vrublevsky was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2013/08/pavel-vrublevsky-sentenced-to-2-5-years/&amp;#34;&amp;gt;sentenced to 2.5 years in a Russian penal colony&amp;lt;/a&amp;gt; for convincing one of his top affiliates to launch a distributed denial-of-service (DDoS) attack against a competitor that shut down the ticketing system for the state-owned Aeroflot airline.&amp;lt;br&amp;gt;
Following his release from jail, Vrublevsky began working on a new digital payments platform based in Hong Kong called HPay Ltd (a.k.a. Hong Kong Processing Corporation). HPay appears to have had a great number of clients that were running schemes which bamboozled people with fake lotteries and prize contests.&amp;lt;br&amp;gt;
According to Russian prosecutors, the scam went like this: Consumers would receive an SMS with links to sites that falsely claimed a number of well-known companies were sponsoring drawings and lotteries for people who enrolled or agreed to answer surveys. All who responded were told they were winners, but also that they had to pay a commission to pick up the prize. That scheme allegedly stole 500 million rubles (~ USD $4.5 million) from over 100,000 consumers.&amp;lt;br&amp;gt;
There are scant public records that show a connection between ChronoPay and HPay, apart from the fact that the latter’s website — hpay[.]io — was originally hosted on the same server (185.111.218.63) along with a handful of other domains, including Vrublevsky’s personal website rnp[.]com .&amp;lt;br&amp;gt;
But then earlier this month, KrebsOnSecurity received a large amount of information that was stolen from ChronoPay recently when hackers managed to compromise the company’s Confluence server. Confluence is a web-based corporate wiki platform, and ChronoPay used their Confluence installation to document in exquisite detail how it creatively distributes the risk associated with high-risk processing by routing transactions through a myriad of shell companies and third-party processors.&amp;lt;br&amp;gt;
A Google-translated snippet of the hacked ChronoPay Confluence installation. Click to enlarge.&amp;lt;br&amp;gt;
Incredibly, Vrublevsky himself appears to have used ChronoPay’s Confluence wiki to document his entire 20&#43; years of personal and professional history in the high-risk payments space, including the company’s most recent forays with HPay. The latest document in the hacked archive is dated April 2021.&amp;lt;br&amp;gt;
These diary entries, interspersed between highly technical how-tos, are all written in Russian and in the third person. But they are unmistakably Vrublevsky’s words: Some of the elaborate stories in the wiki were identical to theories that Vrublevsky himself espoused to me throughout hundreds of hours of phone interviews. Also, in some of the entries the narrator switches from “he” to “I” when describing the actions of Vrublevsky.&amp;lt;br&amp;gt;
Vrublevsky’s memoire/wiki invokes the nicknames and real names of Russian hackers who worked with the protection of corrupt officials in the Russian Federal Security Service (FSB), the successor agency to the Soviet KGB. In several diary entries, Vrublevsky writes about various cybercriminals and Russian law enforcement officials involved in processing credit card payments tied to online gambling sites.&amp;lt;br&amp;gt;
Russian banks are prohibited from processing payments for online gambling, and as a result many online gaming sites catering to Russian speakers have chosen to process credit card payments through Ukrainian financial institutions.&amp;lt;br&amp;gt;
That’s according to Vladislav “BadB” Horohorin , the convicted cybercriminal who shared the ChronoPay Confluence data with KrebsOnSecurity. In February 2017, Horohorin was released after serving four years in a U.S. prison for his role in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Vladislav_Horohorin&amp;#34;&amp;gt;2009 theft of more than $9 million from RBS Worldpay&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Horohorin said Vrublevsky has been using his knowledge of the card processing networks to extort people in the online gambling industry who may run afoul of Russian laws.&amp;lt;br&amp;gt;
“Russia has strict regulations against processing for the gambling business,” Horohorin said. “While Russian banks can’t do it, Ukrainian ones can, so we have Ukrainian banks processing gambling and casinos, which mostly Russian gamblers use. What Pavel does is he blackmails those Ukrainian banks using his connections and knowledge. Some pay, some don’t. But some people are not very tolerant of that kind of abuse.”&amp;lt;br&amp;gt;
A native of Donetsk, Ukraine, Horohorin told KrebsOnSecurity he hacked and shared the ChronoPay Confluence installation because Vrublevsky had threatened a family member. Horohorin believes Vrublevsky secretly operated the “ bad bank ” channel on Telegram, which calls attention to online gambling operations that are violating Visa and MasterCard regulations (violations that can bring the violator hundreds of thousands of dollars in fines).&amp;lt;br&amp;gt;
“Pavel scrupulously wrote his diary for a long time, and there is a lot of information on the people he knows,” Horohorin told KrebsOnSecurity. “My understanding is he wrote this in order to blackmail people later. There is a lot of interesting stuff, a lot of names and a lot of very intimate info about Russian card processing market, as well as Pavel’s own escapades.”&amp;lt;br&amp;gt;
ChronoPay’s hacked Confluence server contains many diary entries about major players in the Russian online gambling and bookmaking industries.&amp;lt;br&amp;gt;
Among the escapades recounted in the ChronoPay founder’s diaries are multiple stories involving the self-proclaimed “King of Fraud!” Aleksandr “Nastra” Zhukov , a Russian national who ran an advertising fraud network dubbed “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/12/report-3-5m-in-ad-fraud-daily-from-methbot/&amp;#34;&amp;gt;Methbot&amp;lt;/a&amp;gt; ” that stole $7 million from publishers through bots made to look like humans watching videos online.&amp;lt;br&amp;gt;
The journal explains that Zhukov lived with a ChronoPay employee and had a great deal of interaction with ChronoPay’s high-risk department, so much so that Zhukov at one point gave Vrublevsky a $100,000 jeweled watch as a gift. Zukhov was arrested in Bulgaria in 2018 and extradited to the United States. Following a jury trial in New York that ended last year, Zhukov was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-edny/pr/russian-cybercriminal-sentenced-10-years-prison-digital-advertising-fraud-scheme&amp;#34;&amp;gt;sentenced to 10 years in prison&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
According to the Russian news outlet Kommersant , Vrublevsky and company operated “ Inferno Pay ,” a payments portal that worked with Hydra, the largest Russian darknet market for illicit goods, including drug trafficking, malware, and counterfeit money and documents.&amp;lt;br&amp;gt;
Inferno Pay, a cryptocurrency and payment API allegedly operated by the ChronoPay CEO.&amp;lt;br&amp;gt;
“The services of Inferno Pay, whose commission came to 30% of the transaction, were actively used by online casinos,” Kommersant &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kommersant.ru/doc/5251902&amp;#34;&amp;gt;wrote on Mar. 12&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
The drama surrounding Vrublevsky’s most recent arrest is reminiscent of events leading up to his imprisonment nearly a decade ago, when &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/06/organization-chart-reveals-chronopay%e2%80%99s-links-to-shady-internet-projects/&amp;#34;&amp;gt;several years’ worth of ChronoPay internal emails were leaked online&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Kommersant said Russian authorities also searched the dwelling of Dmitry Artimovich , a former ChronoPay director who along with his brother Igor was responsible for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2012/06/who-is-the-festi-botmaster/&amp;#34;&amp;gt;running the Festi botnet&amp;lt;/a&amp;gt; , the same spam botnet that was used for years to pump out junk emails promoting Vrublevsky’s pharmacy affiliate websites. Festi also was the botnet used in the DDoS attack that sent Vrubelvsky to prison for two years in 2013.&amp;lt;br&amp;gt;
Artimovich says he had a falling out with Vrublevsky roughly five years ago, and he’s been suing the company ever since. In a message to KrebsOnSecurity, Artimovich said while Vrublevsky was involved in a lot of shady activities, he doubts Vrublevksy’s arrest was really about SMS payment scams as the government claims.&amp;lt;br&amp;gt;
“I do not think that it was a reason for his arrest,” Artimovich said. “O ur law enforcement usually don’t give a shit about sites like this. And I don’t think that Vrublevsky made much money there. I believe he angered some high-ranking person. Because the scale of the case is much larger than Aeroflot. Police made search of 22 people. Illegal seizure of money, computers.”&amp;lt;br&amp;gt;
The Hydra darknet market. Image: bitcoin.com&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/spam-nation-villain-vrublevsky-charged-with-fraud/&amp;#34;&amp;gt;‘Spam Nation’ Villain Vrublevsky Charged With Fraud&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220322-082028/</link>
      <pubDate>Tue, 22 Mar 2022 08:20:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220322-082028/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-hack-future&amp;#34;&amp;gt;Podcast Episode: Hack to the Future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220322-082025/</link>
      <pubDate>Tue, 22 Mar 2022 08:20:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220322-082025/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-hack-future&amp;#34;&amp;gt;Podcast Episode: Hack to the Future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ferns</title>
      <link>https://www.whatsupup.com/blog/incremental/comte/20220320-120800/</link>
      <pubDate>Sun, 20 Mar 2022 12:08:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/incremental/comte/20220320-120800/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2022/03/20/Proportionate-20Growth-20Software-20Estimation.html&amp;#34;&amp;gt;Proportionate-Growth Software Estimation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220320-081252/</link>
      <pubDate>Sun, 20 Mar 2022 08:12:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220320-081252/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/correlation-in-latency-analysis-419357b93287?source=user_profile---------3-------------------------------&amp;#34;&amp;gt;Correlation in Latency Analysis This article was my response to Amazon’s writing assessment when I was interviewed. I answered the question of “What is the most inventive or innovative thing you’ve done? It doesn’t have to be something that’s patented. It could be a process change, product idea, a new metric or customer facing…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/health-availability-debuggability-5b0ab300b35c?source=user_profile---------8-------------------------------&amp;#34;&amp;gt;Health, Availability, Debuggability As we collect various observability signals from systems, it fosters a new conversation around the classification of the signals. There is a significant discussion on observability signals and even strong advocacy for one signal over the other. Metrics, events, logs, traces or others? In order to provide some structure…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220319-041214/</link>
      <pubDate>Sat, 19 Mar 2022 04:12:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220319-041214/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/how-does-spanner-avoid-single-point-of-failures-in-writes-4f7765cd894?source=user_profile---------5-------------------------------&amp;#34;&amp;gt;How Does Spanner Avoid Single Point of Failures in Writes? Google’s Spanner is a relational database with 99.999% availability which translates to 5 mins of downtime a year. Spanner is a distributed system and can span multiple machines, multiple datacenters (and even geographical regions when configured). It splits the records automatically among its replicas and provides automatic failover. Unlike traditional…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220319-001353/</link>
      <pubDate>Sat, 19 Mar 2022 00:13:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220319-001353/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/correlation-in-latency-analysis-419357b93287?source=user_profile---------3-------------------------------&amp;#34;&amp;gt;Correlation in Latency Analysis This article was my response to Amazon’s writing assessment when I was interviewed. I answered the question of “What is the most inventive or innovative thing you’ve done? It doesn’t have to be something that’s patented. …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/how-does-spanner-avoid-single-point-of-failures-in-writes-4f7765cd894?source=user_profile---------5-------------------------------&amp;#34;&amp;gt;How Does Spanner Avoid Single Point of Failures in Writes? Google’s Spanner is a relational database with 99.999% availability which translates to 5 mins of downtime a year. Spanner is a distributed system and can span multiple machines, multiple datacenters (and even geographical regions when configured). It splits the records automatically among its replicas and provides automatic failover. …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/persistent-disks-and-replication-9b9412fd9565?source=user_profile---------7-------------------------------&amp;#34;&amp;gt;Persistent Disks and Replication If you are a cloud user, you probably have seen how unconventional storage options can get. This is even true for disks you access from your virtual machines. There are not many ongoing conversations or references about the underlying details of core infrastructure. …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/health-availability-debuggability-5b0ab300b35c?source=user_profile---------8-------------------------------&amp;#34;&amp;gt;Health, Availability, Debuggability As we collect various observability signals from systems, it fosters a new conversation around the classification of the signals. There is a significant discussion on observability signals and even strong advocacy for one signal over the other. Metrics, events, logs, traces or others? …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220319-000925/</link>
      <pubDate>Sat, 19 Mar 2022 00:09:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220319-000925/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-react-navbar/&amp;#34;&amp;gt;Learn how to create a simple navbar in React, using Bootstrap and Tailwind.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220318-201558/</link>
      <pubDate>Fri, 18 Mar 2022 20:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220318-201558/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/18/technology/zuckerberg-meta-privacy-lawsuit.html&amp;#34;&amp;gt;A judge throws out D.C.’s attempt to name Zuckerberg in a privacy lawsuit. D.C.’s attorney general had waited too long to add Mark Zuckerberg as a defendant in the suit against Meta, the judge said. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220318-201223/</link>
      <pubDate>Fri, 18 Mar 2022 20:12:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220318-201223/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;Three Ways to Trace End-to-end Having end-to-end distributed traces is a huge challenge for any project. In distributed tracing, end-to-end tracing is a term often used to refer to traces that capture most components in a critical path. Imagine an HTTP request made to trigger a Lambda function. Being able to see the HTTP client…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/distributed-tracing?source=user_profile--------------------distributed_tracing--------------------&amp;#34;&amp;gt;Distributed Tracing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;4 min read&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/why-is-metric-collection-still-a-hard-problem-in-2020-a901ba1e028f?source=user_profile---------1-------------------------------&amp;#34;&amp;gt;Why is metric collection still a hard problem in 2020? Metric collection keeps being one of the hard problems. We’ve been collecting metrics for a very long time, so why is this a hard problem still in 2020? Our workloads are becoming larger and more sophisticated. In order to produce useful metric data, we are producing and collecting richer metric…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/monitoring?source=user_profile--------------------monitoring--------------------&amp;#34;&amp;gt;Monitoring&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/what-did-i-forget-by-working-for-the-same-company-c51b52ce2f8c?source=user_profile---------2-------------------------------&amp;#34;&amp;gt;What did I forget by working for the same company? My Saturday morning coffee is disrupted by this tweet: “xooglers always be like ‘at google we…’ — devonbl A month into my departure from Google, I can relate to this. It annoys me probably more than my current coworkers at AWS because they know it’s ok to make comparisons when…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/observability?source=user_profile--------------------observability--------------------&amp;#34;&amp;gt;Observability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/spanners-sql-story-79bda8bb632d?source=user_profile---------4-------------------------------&amp;#34;&amp;gt;Spanner’s SQL Story Spanner is a distributed database Google initiated a while ago to build a highly available and highly consistent database for its own workloads. Spanner was initially built to be a key/value and was in a completely different shape than it is today and it had different goals. Since the beginning…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/distributed-systems?source=user_profile--------------------distributed_systems--------------------&amp;#34;&amp;gt;Distributed Systems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/things-i-wished-more-developers-knew-about-databases-2d0178464f78?source=user_profile---------6-------------------------------&amp;#34;&amp;gt;Things I Wished More Developers Knew About Databases A large majority of computer systems have some state and are likely to depend on a storage system. My knowledge on databases accumulated over time, but along the way our design mistakes caused data loss and outages. In data-heavy systems, databases are at the core of system design goals and…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/database?source=user_profile--------------------database--------------------&amp;#34;&amp;gt;Database&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/cloud-computing?source=user_profile--------------------cloud_computing--------------------&amp;#34;&amp;gt;Cloud Computing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/google-cloud-run-for-go-ec09ddbba111?source=user_profile---------9-------------------------------&amp;#34;&amp;gt;Google Cloud Run for Go Google Cloud recently launched a fully managed container execution environment called Cloud Run. It is an environment specifically for request-driven workloads. It provides autoscaling, scaling down to zero, pretty fast deployments, automatic HTTPS support, global names and more. Google Cloud Run doesn’t have language runtime restrictions as soon as the…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/google-cloud?source=user_profile--------------------google_cloud--------------------&amp;#34;&amp;gt;Google Cloud&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220318-160617/</link>
      <pubDate>Fri, 18 Mar 2022 16:06:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220318-160617/</guid>
      <description>Researchers are tracking a number of open-source “ protestware ” projects on GitHub that have recently altered their code to display “Stand with Ukraine” messages for users, or basic facts about the carnage in Ukraine. The group also is tracking several code packages that were recently modified to erase files on computers that appear to be coming from Russian or Belarusian Internet addresses.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ThorgrimGrudgebearer/GreatBookOfGrudges/blob/main/README.md&amp;#34;&amp;gt;upstart tracking effort&amp;lt;/a&amp;gt; is being crowdsourced via Telegram , but the output of the Russian research group is centralized in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1H3xPB4PgWeFcHjZ7NOPtrcya_Ua4jUolWm-7z9-jSpQ/htmlview?pru=AAABf7z88MA*ITSp0EBrKinw0LjFWZ9tzQ#gid=2074850979&amp;#34;&amp;gt;a Google Spreadsheet that is open to the public&amp;lt;/a&amp;gt; . Most of the GitHub code repositories tracked by this group include relatively harmless components that will either display a simple message in support of Ukraine, or show statistics about the war in Ukraine — such as casualty numbers — and links to more information on the Deep Web.&amp;lt;br&amp;gt;
For example, the popular library ES5-ext hadn’t updated its code in nearly two years. But on March 7, the code project added a component “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/medikoo/es5-ext/commit/28de285ed433b45113f01e4ce7c74e9a356b2af2&amp;#34;&amp;gt;postinstall.js&amp;lt;/a&amp;gt; ,” which checks to see if the user’s computer is tied to a Russian Internet address. If so, the code broadcasts a “Call for peace:”&amp;lt;br&amp;gt;
A message that appears for Russian users of the popular es5-ext code library on GitHub. The message has been Google-Translated from Russian to English.&amp;lt;br&amp;gt;
A more concerning example can be found at the GitHub page for “ vue-cli ,” a popular Javascript framework for building web-based user interfaces. On March 15, users discovered &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/vuejs/vue-cli/issues/7054&amp;#34;&amp;gt;a new component had been added&amp;lt;/a&amp;gt; that was designed to wipe all files from any systems visiting from a Russian or Belarusian Internet address (the malicious code has since been removed):&amp;lt;br&amp;gt;
Readers complaining that an update to the popular Vue-Cli package sought to wipe files if the user was coming from a Russian IP address.&amp;lt;br&amp;gt;
“Man, I love politics in my APIs,” GitHub user “ MSchleckser ” commented wryly on Mar. 15. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/pro-ukraine-protestware-pushes-antiwar-ads-geo-targeted-malware/#more-58969&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/pro-ukraine-protestware-pushes-antiwar-ads-geo-targeted-malware/&amp;#34;&amp;gt;Pro-Ukraine ‘Protestware’ Pushes Antiwar Ads, Geo-Targeted Malware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220318-041641/</link>
      <pubDate>Fri, 18 Mar 2022 04:16:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220318-041641/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tiktoks-golden-opportunity&amp;#34;&amp;gt;TikTok’s Golden Opportunity&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tiktoks-golden-opportunity&amp;#34;&amp;gt;With Facebook beset by Apple’s tracking crackdown, TikTok can capitalize. But will it?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220318-001814/</link>
      <pubDate>Fri, 18 Mar 2022 00:18:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220318-001814/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/17/world/europe/ukraine-putin-nazis.html&amp;#34;&amp;gt;Why Vladimir Putin Invokes Nazis to Justify His Invasion of Ukraine The language of Russia’s invasion has been dominated by the word “Nazi” — a puzzling assertion about a country whose leader is Jewish. By Anton Troianovski&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220317-161857/</link>
      <pubDate>Thu, 17 Mar 2022 16:18:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220317-161857/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/mozilla-and-open-web-docs-working-together-on-mdn/&amp;#34;&amp;gt;Mozilla and Open Web Docs working together on MDN →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/mozilla-and-open-web-docs-working-together-on-mdn/&amp;#34;&amp;gt;Mozilla and Open Web Docs working together on MDN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
For both MDN and Open Web Docs (OWD), transparency is paramount to our missions. With the upcoming launch of MDN Plus, we believe it’s a good time to talk about how our two organizations work together, and if there is a financial relationship between us. Here is an overview of how our missions overlap and how they differ, and how a premium subscription service fits all this.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20220317-081112/</link>
      <pubDate>Thu, 17 Mar 2022 08:11:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20220317-081112/</guid>
      <description>There are always exceptions, but the costs of being flexible are considerable. ANSI X9.62, from 1998, specified how elliptic curves were encoded in ASN.1 and included not just 27 possible curves, but allowed the parameters to be inherited from the issuing CA and allowed completely arbitrary elliptic curves to be defined inside a public key. That specifies almost nothing and avoids really standardising on anything. Thankfully I&amp;#39;ve not seen parameter inheritance implemented for ECC (it would be a security mess) but support for custom elliptic curves does, sadly, exist.&amp;lt;br&amp;gt;
It&amp;#39;s not fair to just blame X9.62: don&amp;#39;t get me started about RSA PSS. The cost of having too many options is frequently underestimated. Why does AES-192 exist, for example, other than to inflate test matrices?&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20220317-002104/</link>
      <pubDate>Thu, 17 Mar 2022 00:21:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20220317-002104/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/&amp;#34;&amp;gt;MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220316-200914/</link>
      <pubDate>Wed, 16 Mar 2022 20:09:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220316-200914/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/wise-customer-story/&amp;#34;&amp;gt;Why the CloserIQ engineering team chose Retool for internal tools and how the WISE team manages a thriving virtual community.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220315-202123/</link>
      <pubDate>Tue, 15 Mar 2022 20:21:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220315-202123/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-watching-watchers&amp;#34;&amp;gt;Podcast Episode - Watching the Watchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220315-202121/</link>
      <pubDate>Tue, 15 Mar 2022 20:21:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220315-202121/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/03/podcast-episode-watching-watchers&amp;#34;&amp;gt;Podcast Episode - Watching the Watchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20220315-201024/</link>
      <pubDate>Tue, 15 Mar 2022 20:10:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20220315-201024/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2022/03/15/pickingparameters.html&amp;#34;&amp;gt;Picking parameters&amp;lt;/a&amp;gt; (15 Mar 2022)&amp;lt;br&amp;gt;
When taking something from cryptographic theory into practice, it&amp;#39;s very important to pick parameters. I don&amp;#39;t mean picking the right parameters — although that certainly helps. I mean picking parameters at all.&amp;lt;br&amp;gt;
That might seem obvious, but there are pressures pushing towards abdication: what if you get it wrong? Why not hedge bets and add another option? What about the two groups who already shipped something? We could just add options so that everyone&amp;#39;s happy.&amp;lt;br&amp;gt;
There are always exceptions, but the costs of being flexible are considerable. ANSI X9.62, from 1998, specified how elliptic curves were encoded in ASN.1 and included not just 27 possible curves, but allowed the parameters to be inherited from the issuing CA and allowed completely arbitrary elliptic curves to be defined inside a public key. That specifies almost nothing and avoids really standardising on anything. Thankfully I&amp;#39;ve not seen parameter inheriance implemented for ECC (it would be a security mess) but support for custom elliptic curves does, sadly, exist.&amp;lt;br&amp;gt;
A couple of years ago, Microsoft had a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0601&amp;#34;&amp;gt;signature bypass&amp;lt;/a&amp;gt; because of support for arbitrary curves [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/CasCremers/status/1217510293040844800&amp;#34;&amp;gt;details&amp;lt;/a&amp;gt; ]. Today, OpenSSL had an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mta.openssl.org/pipermail/openssl-announce/2022-March/000219.html&amp;#34;&amp;gt;infinite loop&amp;lt;/a&amp;gt; in certificate parsing because of the same. On the flip side, I&amp;#39;m not aware that anyone has ever used the ability to specify arbitrary curves for anything useful.&amp;lt;br&amp;gt;
It&amp;#39;s not fair to just blame X9.62: don&amp;#39;t get me started about RSA PSS. The cost of having too many options is frequently underestimated. Why does AES-192 exist, for example, other than to inflate test matrixes?&amp;lt;br&amp;gt;
As an aside, it&amp;#39;s interesting to wonder how many CPU decades have been spent fuzzing OpenSSL&amp;#39;s certificate parsing and yet today&amp;#39;s issue wasn&amp;#39;t reported before. This isn&amp;#39;t a 2 -128 fraction of state space that fuzzers couldn&amp;#39;t be expected to find, and I&amp;#39;m not sure that Tavis found it from fuzzing at all.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220315-160603/</link>
      <pubDate>Tue, 15 Mar 2022 16:06:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220315-160603/</guid>
      <description>Aleksei Burkov, seated second from right, attends a hearing in Jerusalem in 2015. Image: Andrei Shirokov / Tass via Getty Images.&amp;lt;br&amp;gt;
Aleksei Burkov , a cybercriminal who long operated two of Russia’s most exclusive underground hacking forums, was arrested in 2015 by Israeli authorities. The Russian government fought Burkov’s extradition to the U.S. for four years — even arresting and jailing an Israeli woman to force a prisoner swap. That effort failed: Burkov was sent to America, pleaded guilty, and was sentenced to nine years in prison. But a little more than a year later, he was quietly released and deported back to Russia. Now some Republican lawmakers are asking why a Russian hacker once described as “an asset of supreme importance” was allowed to shorten his stay.&amp;lt;br&amp;gt;
A native of St. Petersburg, Russia, Burkov admitted to running CardPlanet, a site that sold more than 150,000 stolen credit card accounts, and to being a founder of DirectConnection — a closely guarded online community that attracted some of the world’s most-wanted Russian hackers.&amp;lt;br&amp;gt;
But Burkov’s cybercriminal activities spanned far beyond mere credit card fraud. A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/11/why-were-the-russians-so-set-against-this-hacker-being-extradited/&amp;#34;&amp;gt;2019 deep dive into Burkov’s hacker alias “K0pa”&amp;lt;/a&amp;gt; revealed he also was co-administrator of the secretive Russian cybercrime forum “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/03/three-top-russian-cybercrime-forums-hacked/&amp;#34;&amp;gt;Mazafaka&amp;lt;/a&amp;gt; .” Like DirectConnection, Mazafaka’s member roster was a veritable “Who’s Who?” of the Russian hacker underground, and K0pa played a key role in vetting new members and settling disputes for both communities.&amp;lt;br&amp;gt;
K0pa’s elevated status in the Russian cybercrime community made him one of the most connected malicious hackers ever apprehended by U.S. authorities. As I wrote at the time of Burkov’s extradition, the Kremlin was probably concerned that he simply knew too much about Russia’s propensity to outsource certain activities to its criminal hacker community.&amp;lt;br&amp;gt;
“To my knowledge, no one has accused Burkov of being some kind of cybercrime fixer or virtual badguy Rolodex for the Russian government,” KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/11/why-were-the-russians-so-set-against-this-hacker-being-extradited/&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; in 2019. “On the other hand, from his onetime lofty perch atop some of the most exclusive Russian cybercrime forums, K0pa certainly would have fit that role nicely.”&amp;lt;br&amp;gt;
Burkov was arrested in December 2015 on an international warrant while visiting Israel, and over the ensuing four years the Russian government aggressively sought to keep him from being extradited to the United States.&amp;lt;br&amp;gt;
When Israeli authorities turned down requests to send him back to Russia — supposedly to face separate hacking charges there — the Russians imprisoned Israeli citizen Naama Issachar on trumped-up drug charges in a bid to trade prisoners. Nevertheless, Burkov was extradited to the United States in November 2019.&amp;lt;br&amp;gt;
And if there were any doubts Issachar was jailed for use as a political pawn, Russian President Vladimir Putin erased those by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bbc.com/news/world-europe-51301827&amp;#34;&amp;gt;pardoning her&amp;lt;/a&amp;gt; in January 2020, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/01/russian-cybercrime-boss-burkov-pleads-guilty/&amp;#34;&amp;gt;just hours after Burkov pleaded guilty in the United States&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
In June 2020, Burkov was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/06/russian-cybercrime-boss-burkov-gets-9-years/&amp;#34;&amp;gt;sentenced to nine years in prison&amp;lt;/a&amp;gt; . But a little more than a year later — Aug. 25, 2021 — Burkov was released and deported back to Russia. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gop-foreignaffairs.house.gov/wp-content/uploads/2022/03/Letter-to-Sullivan-on-Aleksei-Burkov.pdf&amp;#34;&amp;gt;a letter&amp;lt;/a&amp;gt; (PDF) sent Monday by four Republican House lawmakers to White House National Security Advisor Jake Sullivan , U.S. Immigration and Customs Enforcement (ICE) officials escorted Burkov onto a plane destined for Moscow shortly after his release. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/lawmakers-probe-early-release-of-top-ru-cybercrook/#more-58917&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/lawmakers-probe-early-release-of-top-ru-cybercrook/&amp;#34;&amp;gt;Lawmakers Probe Early Release of Top RU Cybercrook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20220315-080811/</link>
      <pubDate>Tue, 15 Mar 2022 08:08:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20220315-080811/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/christmas-magic/&amp;#34;&amp;gt;We&amp;#39;re responsible for the Christmas magic now&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220314-201929/</link>
      <pubDate>Mon, 14 Mar 2022 20:19:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220314-201929/</guid>
      <description>Can you tell I am on sabbatical? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/#fnref1&amp;#34;&amp;gt;↩︎&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220314-200856/</link>
      <pubDate>Mon, 14 Mar 2022 20:08:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220314-200856/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-lazy-loading-and-performance/&amp;#34;&amp;gt;Lazy loading is an optimization technique where the loading of an item is delayed until it’s absolutely required. It works well for common UX components and patterns like dialogs, warnings, and notifications.  Learn how to build and use lazily-loaded components in React.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220314-161819/</link>
      <pubDate>Mon, 14 Mar 2022 16:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220314-161819/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2016/04/05/the-network-reliability-problem-and-star-semirings/&amp;#34;&amp;gt;The network reliability problem and star semirings&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220314-161736/</link>
      <pubDate>Mon, 14 Mar 2022 16:17:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220314-161736/</guid>
      <description>March 14, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/03/14/It-takes-a-village.html&amp;#34;&amp;gt;It takes a village&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220314-042049/</link>
      <pubDate>Mon, 14 Mar 2022 04:20:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220314-042049/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/12/11/mgus-and-universal-properties/&amp;#34;&amp;gt;Mgu&amp;#39;s and universal properties&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220313-161854/</link>
      <pubDate>Sun, 13 Mar 2022 16:18:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220313-161854/</guid>
      <description>March 13, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/03/13/Why-am-I-working-in-private.html&amp;#34;&amp;gt;Why am I building a programming language in private?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220313-041658/</link>
      <pubDate>Sun, 13 Mar 2022 04:16:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220313-041658/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/science/physics-cern-russia.html&amp;#34;&amp;gt;Out There Russian Scientists Face Isolation Following Invasion of Ukraine International collaborations are unraveling as researchers, including many in Russia, speak out against the invasion of Ukraine. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220313-000602/</link>
      <pubDate>Sun, 13 Mar 2022 00:06:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220313-000602/</guid>
      <description>“While our overall traffic dropped in Kyiv — and slightly increased in Warsaw due to infrastructure outages inside of .ua — the ratio of (good queries):(blocked queries) has spiked in both cities,” he continued. “The spike in that blocking ratio [Wednesday] afternoon in Kyiv was around 10x the normal level when comparing against other cities in Europe (Amsterdam, Frankfurt.) While Ukraine always is slightly higher (20%-ish) than Western Europe, this order-of-magnitude jump is unprecedented.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/report-recent-10x-increase-in-cyberattacks-on-ukraine/#more-58886&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220312-121919/</link>
      <pubDate>Sat, 12 Mar 2022 12:19:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220312-121919/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/technology/ukraine-minister-war-digital.html&amp;#34;&amp;gt;Shaming Apple and Texting Musk, a Ukraine Minister Uses Novel War Tactics Mykhailo Fedorov, Ukraine’s youngest minister, has turned technology, cryptocurrency and social media into modern weapons of war. By Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220312-121837/</link>
      <pubDate>Sat, 12 Mar 2022 12:18:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220312-121837/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/science/physics-cern-russia.html&amp;#34;&amp;gt;Out There Make Science, Not War, Scientists Say International collaborations are unraveling as researchers, including many in Russia, speak out against the invasion of Ukraine. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220312-121633/</link>
      <pubDate>Sat, 12 Mar 2022 12:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220312-121633/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/12/business/rt-america-russian-tv.html&amp;#34;&amp;gt;What It Was Like to Work for Russian State Television Until RT America ended abruptly, life as a journalist there was “actually so normal.” By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220312-001957/</link>
      <pubDate>Sat, 12 Mar 2022 00:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220312-001957/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/11/technology/facebook-meta-perks.html&amp;#34;&amp;gt;Facebook’s Parent Company Will Make Employees Do Their Own Laundry The company told workers on Friday that it will reduce or eliminate some of its famous perks as it prepares for a return to the office. By Mike Isaac, Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220312-001613/</link>
      <pubDate>Sat, 12 Mar 2022 00:16:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220312-001613/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00727-x&amp;#34;&amp;gt;Russia’s invasion of Ukraine is redrawing the geopolitics of space&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The International Space Station is operating as normal, but other partnerships are unravelling.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220311-200541/</link>
      <pubDate>Fri, 11 Mar 2022 20:05:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220311-200541/</guid>
      <description>As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians.&amp;lt;br&amp;gt;
John Todd is general manager of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.quad9.net/news/blog/quad9-and-your-data/&amp;#34;&amp;gt;Quad9&amp;lt;/a&amp;gt; , a free “anycast” DNS platform. DNS stands for Domain Name System, which is like a globally distributed phone book for the Internet that maps human-friendly website names (example.com) to numeric Internet addresses (8.8.4.4.) that are easier for computers to manage. Your computer or mobile device generates DNS lookups each time you send or receive an email, or browse to a webpage.&amp;lt;br&amp;gt;
With anycast, one Internet address can apply to many servers, meaning that any one of a number of DNS servers can respond to DNS queries, and usually the one that is geographically closest to the customer making the request will provide the response.&amp;lt;br&amp;gt;
Quad9 insulates its users from a range of cyberattacks by blocking DNS requests for known-bad domain names, i.e., those confirmed to be hosting malicious software, phishing websites, stalkerware and other threats. And normally, the ratio of DNS queries coming from Ukraine that are allowed versus blocked by Quad9 is fairly constant.&amp;lt;br&amp;gt;
But Todd says that on March 9, Quad9’s systems blocked 10 times the normal number of DNS requests coming from Ukraine, and to a lesser extent Poland.&amp;lt;br&amp;gt;
Todd said Quad9 saw a significant drop in traffic reaching its Kyiv POP [point of presence] during the hostilities, presumably due to fiber cuts or power outages. Some of that traffic then shifted to Warsaw, which for much of Ukraine’s networking is the next closest significant interconnect site.&amp;lt;br&amp;gt;
Quad9’s view of a spike in malicious traffic targeting Ukrainian users this week. Click to enlarge.&amp;lt;br&amp;gt;
“While our overall traffic dropped in Kyiv — and slightly increased in Warsaw due to infrastructure outages inside of .ua — the ratio of (good queries):(blocked queries) has spiked in both cities,” he continued. “The spike in that blocking ratio [Wednesday] afternoon in Kyiv was around 10x the normal level when comparing against other cities in Europe (Amsterdam, Frankfurt.) While Ukraine always is slightly higher (20%-ish) than Western Europe, this order-of-magnitude jump is unprecedented.”&amp;lt;br&amp;gt;
Quad9 declined to further quantify the data that informed the Y axis in the chart above, but said there are some numbers the company is prepared to share as absolutes.&amp;lt;br&amp;gt;
“Looking three weeks ago on the same day of the week as yesterday, we had 118 million total block events, and of that 1.4 million were in Ukraine and Poland,” Todd said. “Our entire network saw yesterday on March 9th 121 million blocking events, worldwide. Of those 121 million events, 4.6 million were in Ukraine and Poland.”&amp;lt;br&amp;gt;
Bill Woodcock is executive director at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.pch.net&amp;#34;&amp;gt;Packet Clearing House&amp;lt;/a&amp;gt; , a nonprofit based in San Francisco that is one of several sponsors of Quad9. Woodcock said the spike in blocked DNS queries coming out of Ukraine clearly shows an increase in phishing and malware attacks against Ukrainians.&amp;lt;br&amp;gt;
“They’re being targeted by a huge amount of phishing, and a lot of malware that is getting onto machines is trying to contact malicious command-and-control infrastructure,” Woodcock said.&amp;lt;br&amp;gt;
Both Todd and Woodcock said the smaller spike in blocked DNS requests originating from Poland is likely the result of so many Ukrainians fleeing their country: Of the two million people who have fled Ukraine since the beginning of the Russian invasion, more than 1.4 million have made their way to Poland, according to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bbc.com/news/world-60555472&amp;#34;&amp;gt;the latest figures&amp;lt;/a&amp;gt; from the United Nations .&amp;lt;br&amp;gt;
The increase in malicious activity detected by Quad9 is the latest chapter in an ongoing series of cyberattacks against Ukrainian government and civilian systems since the outset of the war in the last week of February.&amp;lt;br&amp;gt;
As Russian military tanks and personnel began crossing the border into Ukraine last month, security experts tracked a series of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://zetter.substack.com/p/second-wiper-attack-strikes-systems&amp;#34;&amp;gt;destructive data “wiper” attacks&amp;lt;/a&amp;gt; aimed at Ukrainian government agencies and contractor networks. Security firms also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/white-house-pins-ukraine-ddos-attacks-on-russian-gru-hackers/&amp;#34;&amp;gt;attributed to Russia’s intelligence services&amp;lt;/a&amp;gt; a volley of distributed denial-of-service (DDoS) attacks against Ukrainian banks just prior to the invasion.&amp;lt;br&amp;gt;
Thus far, the much-feared large scale cyberattacks and retaliation from Russia &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/11/opinion/russia-ukraine-cyberattacks.html&amp;#34;&amp;gt;haven’t materialized&amp;lt;/a&amp;gt; (for a counterpoint here, see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theguardian.com/technology/2022/mar/10/us-russia-cyber-attack-prepared&amp;#34;&amp;gt;this piece&amp;lt;/a&amp;gt; from The Guardian ). But the data collected by Quad9 suggest that a great deal of low-level cyberattacks targeting Ukrainians remain ongoing.&amp;lt;br&amp;gt;
It is unclear to what extent — if any — Russia’s vaunted cyber prowess may be stymied by mounting economic sanctions enacted by both private companies and governments. In the past week, two major backbone Internet providers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/internet-backbone-giant-lumen-shuns-ru/&amp;#34;&amp;gt;said they would stop routing traffic for Russia&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Earlier today, the London Internet Exchange (LINX), one of the largest peering points where networks around the world exchange traffic, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/briankrebs/status/1502298540701323264&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; it would stop routing for Russian Internet service providers Rostelecom and MegaFon . Rostelecom is Russia’s largest ISP, while MegaFon is Russia’s second-largest mobile phone operator and third largest ISP.&amp;lt;br&amp;gt;
Doug Madory , director of research for Internet infrastructure monitoring firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kentik.com&amp;#34;&amp;gt;Kentik&amp;lt;/a&amp;gt; , said LINX’s actions will further erode the connectivity of these large Russia providers to the larger Internet.&amp;lt;br&amp;gt;
“If the other major European exchanges followed suit, it could be really problematic for Russian connectivity,” Madory said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/report-recent-10x-increase-in-cyberattacks-on-ukraine/&amp;#34;&amp;gt;Report: Recent 10x Increase in Cyberattacks on Ukraine&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220311-161445/</link>
      <pubDate>Fri, 11 Mar 2022 16:14:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220311-161445/</guid>
      <description>Visit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/news&amp;#34;&amp;gt;Nature news&amp;lt;/a&amp;gt; for the latest coverage and read &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.springernature.com/gp/advancing-discovery/springboard/blog/blogposts-open-research/springer-nature-condemns-russian-invasion/20191448&amp;#34;&amp;gt;Springer Nature&amp;#39;s statement on the Ukraine conflict&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220311-041542/</link>
      <pubDate>Fri, 11 Mar 2022 04:15:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220311-041542/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-reckoning-the-direct-to-consumer&amp;#34;&amp;gt;“A Reckoning.” The Direct To Consumer Craze Is Slamming Into Reality&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-reckoning-the-direct-to-consumer&amp;#34;&amp;gt;An industry built on cheap Facebook ad space and low shipping costs is crashing with no bottom in sight.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220310-201302/</link>
      <pubDate>Thu, 10 Mar 2022 20:13:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220310-201302/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/03/whats-up-with-in-wild-exploits-plus.html&amp;#34;&amp;gt;What&amp;#39;s up with in-the-wild exploits? Plus, what we&amp;#39;re doing about it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Adrian Taylor, Chrome Security Team&amp;lt;br&amp;gt;
If you are a regular reader of our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromereleases.googleblog.com/search/label/Stable%20updates&amp;#34;&amp;gt;Chrome release blog&amp;lt;/a&amp;gt; , you may have noticed that phrases like &amp;amp;#39;exploit for CVE-1234-567 exists in the wild&amp;amp;#39; have been appearing more often recently. In this post we&amp;amp;#39;ll explore why there seems to be such an increase in exploits, and clarify some misconceptions in the process. We&amp;amp;#39;ll then share how Chrome is continuing to make it harder for attackers to achieve their goals.&amp;lt;br&amp;gt;
How things work today&amp;lt;br&amp;gt;
While the increase may initially seem concerning, it’s important to understand the reason behind this trend. If it&amp;amp;#39;s because there are many more exploits in the wild, it could point to a worrying trend. On the other hand, if we’re simply gaining more visibility into exploitation by attackers, it&amp;amp;#39;s actually a good thing! It’s good because it means we can respond by providing bug fixes to our users faster, and we can learn more about how real attackers operate.&amp;lt;br&amp;gt;
So, which is it? It’s likely a little of both.&amp;lt;br&amp;gt;
Our colleagues at Project Zero &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1123292625&amp;#34;&amp;gt;publicly track all known in-the-wild “zero day” bugs&amp;lt;/a&amp;gt; . Here’s what they’ve reported for browsers:&amp;lt;br&amp;gt;
First, we don’t believe there was no exploitation of Chromium based browsers between 2015 and 2018. We recognize that we don’t have full view into active exploitation, and just because we didn’t detect any zero-days during those years, doesn’t mean exploitation didn’t happen. Available exploitation data suffers from sampling bias.&amp;lt;br&amp;gt;
Teams like Google’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/&amp;#34;&amp;gt;Threat Analysis Group&amp;lt;/a&amp;gt; are also becoming increasingly sophisticated in their efforts to protect users by discovering zero-days and in-the-wild attacks. A good example is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=g09EvzVsDbk&amp;#34;&amp;gt;a bug in our Portals feature&amp;lt;/a&amp;gt; that we fixed last fall. This bug was discovered by a team member in Switzerland and reported to Chrome through our bug tracker. While Chrome normally keeps each web page locked away in a box called the “renderer sandbox,” this bug allowed the code to break out, potentially allowing attackers to steal information. Working across multiple time zones and teams, it took the team three days to come up with a fix and roll it out, as detailed in our video on the process:&amp;lt;br&amp;gt;
Why so many exploits?&amp;lt;br&amp;gt;
There are a number of factors at play, from changes in vendor and attacker behavior, to changes in the software itself. Here are four in particular that we&amp;amp;#39;ve been discussing and exploring as a team.&amp;lt;br&amp;gt;
First, we believe we’re seeing more bugs thanks to vendor transparency. Historically, many browser makers didn’t announce that a bug was being exploited in the wild, even if they knew it was happening. Today, most major browser makers have increased transparency via publishing details in release communications, and that may account for more publicly tracked “in the wild” exploitation. These efforts have been spearheaded by both browser security teams and dedicated research groups, such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/&amp;#34;&amp;gt;Project Zero.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Second, we believe we’re seeing more exploits due to evolved attacker focus. There are two reasons to suspect attackers might be choosing to attack Chrome more than they did in the past.&amp;lt;br&amp;gt;
Flash deprecation : In 2015 and 2016, Flash was a primary exploitation target. Chrome gradually made Flash a less attractive target for attackers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/flash-roadmap/&amp;#34;&amp;gt;(for instance requiring user clicks to activate Flash content)&amp;lt;/a&amp;gt; before finally removing it in Chrome 88 in January last year. As Flash is no longer available, attackers have had to switch to a harder target: the browser itself.&amp;lt;br&amp;gt;
Chromium popularity : Attackers go for the most popular target. In early 2020, Edge switched to using the Chromium rendering engine. If attackers can find a bug in Chromium, they can now attack a greater percentage of users.&amp;lt;br&amp;gt;
Third, some attacks that could previously be accomplished with a single bug now require multiple bugs. Before 2015, only a single in-the-wild bug was required to steal a user’s secrets from other websites, because multiple web pages lived together in a single &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/developers/design-documents/multi-process-architecture&amp;#34;&amp;gt;renderer process&amp;lt;/a&amp;gt; . If an attacker could compromise the renderer process belonging to a malicious website that a user visited, they might have been able to access the credentials for some other more sensitive website.&amp;lt;br&amp;gt;
With Chrome’s multiyear &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/Home/chromium-security/site-isolation&amp;#34;&amp;gt;Site Isolation&amp;lt;/a&amp;gt; project largely complete, a single bug is almost never sufficient to do anything really bad. Attackers often need to chain at least two bugs: first, to compromise the renderer process, and second, to jump into the privileged Chrome browser process or directly into the device operating system. Sometimes multiple bugs are needed to achieve one or both of these steps.&amp;lt;br&amp;gt;
So, to achieve the same result, an attacker generally now has to use more bugs than they previously did. For exactly the same level of attacker success, we’d see more in-the-wild bugs reported over time, as we add more layers of defense that the attacker needs to bypass.&amp;lt;br&amp;gt;
Fourth, there’s simply the fact that software has bugs . Some fraction of those bugs are exploitable. Browsers increasingly mirror the complexity of operating systems — providing access to your peripherals, filesystem, 3D rendering, GPUs — and more complexity means more bugs.&amp;lt;br&amp;gt;
Ultimately, we believe data is an important part of the story, but the absolute number of exploited bugs isn&amp;amp;#39;t a sufficient measure of security risk. Since some security bugs are inevitable, how a software vendor architects their software (so that the impact of any single bug is limited) and responds to critical security bugs is often much more important than the specifics of any single bug.&amp;lt;br&amp;gt;
How Chrome is raising the bar&amp;lt;br&amp;gt;
The Chrome team works hard to both detect and fix bugs before releases and get bug fixes out to users as quickly as possible. We’re proud of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html&amp;#34;&amp;gt;our record at fixing serious bugs quickly&amp;lt;/a&amp;gt; , and we are continually working to do better.&amp;lt;br&amp;gt;
For example, one area of concern for us is the risk of n-day attacks: that is, exploitation of bugs we’ve already fixed, where the fixes are visible in our open-source code repositories. We have greatly reduced our “patch gap” from 35 days in Chrome 76 to an average of 18 days in subsequent milestones, and we expect this to reduce slightly further with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chromium.org/2021/03/speeding-up-release-cycle.html&amp;#34;&amp;gt;Chrome’s faster release cycle&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Irrespective of how quickly bugs are fixed, any in-the-wild exploitation is bad. Chrome is working hard to make it expensive and difficult for attackers to achieve their goals.&amp;lt;br&amp;gt;
Some examples of the projects ongoing:&amp;lt;br&amp;gt;
We continue to strengthen Site Isolation, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/protecting-more-with-site-isolation.html&amp;#34;&amp;gt;especially on Android&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/document/d/1FM4fQmIhEqPG8uGp5o9A-mnPB5BOeScZYpkHjo0KKA8/edit#heading=h.fg3qxf1x0p2q&amp;#34;&amp;gt;The V8 heap sandbox&amp;lt;/a&amp;gt; will prevent attackers using JavaScript just-in-time (JIT) compilation bugs to compromise the renderer process. This will require attackers to add a third bug to these exploit chains, which means increased security, but could increase the amount of in-the-wild exploits reported.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=gevcleRHRZ4&amp;#34;&amp;gt;MiraclePtr and *Scan&amp;lt;/a&amp;gt; projects aim to prevent exploitability of many of our largest class of browser process bugs, called “use-after-free”. We will be applying similar systematic solutions to other classes of bugs over time.&amp;lt;br&amp;gt;
Since “memory safety” bugs account for 70% of the exploitable security bugs, we aim to write new parts of Chrome in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/09/an-update-on-memory-safety-in-chrome.html&amp;#34;&amp;gt;memory-safe languages&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We continue to work on post-exploitation mitigations such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel.com/content/www/us/en/developer/articles/technical/technical-look-control-flow-enforcement-technology.html&amp;#34;&amp;gt;CET&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/secbp/control-flow-guard&amp;#34;&amp;gt;CFG&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We are well past the stage of having “easy wins” when it comes to raising the bar for security. All of these are long term projects with significant engineering challenges. But as we&amp;amp;#39;ve shown with Site Isolation, Chrome isn&amp;amp;#39;t afraid of making long term investments in major security engineering projects. One of the major challenges is performance: all of these technologies (except memory safe languages) could risk slowing the browser. Expect a series of blog posts over the coming months as we explore performance vs. security trade-offs. These decisions are really hard : we do not want to make Chrome slower for billions of people, especially as this disproportionately hits users with slower devices – we strive to make Chrome secure for all our users, not just those with the high end systems.&amp;lt;br&amp;gt;
How you can help&amp;lt;br&amp;gt;
Above all: if Chrome is reminding you to update, please do!&amp;lt;br&amp;gt;
If you’re an enterprise IT professional, keep your users up-to-date by keeping auto-update on, and familiarize yourself with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromeenterprise.google/browser/security/&amp;#34;&amp;gt;the added enterprise policies and controls&amp;lt;/a&amp;gt; that you can apply to Chrome within your organization. We strongly advise not focusing on zero-days when making decisions about updates, but instead to assume any Chrome security bug is under exploitation as an n-day.&amp;lt;br&amp;gt;
If you&amp;amp;#39;re a security researcher, you can report bugs you find to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://g.co/chrome/vrp&amp;#34;&amp;gt;Chrome Vulnerability Rewards Program&amp;lt;/a&amp;gt; — and thanks for helping us make Chrome safer for everyone!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220310-200745/</link>
      <pubDate>Thu, 10 Mar 2022 20:07:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220310-200745/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/gotchas-git-github-api/&amp;#34;&amp;gt;While building the Source Control feature in Retool, we hit a few gotchas working with the GitHub API, in particular with Git trees and API limits. We share those lessons in this post.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220310-200632/</link>
      <pubDate>Thu, 10 Mar 2022 20:06:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220310-200632/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/learn-to-tolerate-discomfort-or-suffer-escaping-from-it&amp;#34;&amp;gt;Learn to tolerate discomfort or suffer escaping from it&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;#39;t scrolling or watching&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/abstinence-isnt-recovery&amp;#34;&amp;gt;Abstinence isn’t recovery&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-go-back-to-things-you-used-to-be-addicted-to-in-the-past&amp;#34;&amp;gt;How to go back to things you used to be addicted to in the past&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220310-120707/</link>
      <pubDate>Thu, 10 Mar 2022 12:07:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220310-120707/</guid>
      <description>Like this post? Stay up to date&amp;lt;br&amp;gt;
Get practical anti-procrastination blog posts, short tips, and illustrations in your inbox.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220310-000634/</link>
      <pubDate>Thu, 10 Mar 2022 00:06:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220310-000634/</guid>
      <description>“I am trying to make a p2p network in Rust,” Van told “ Demon ” on Feb. 19, 2022 [Demon appears to be one of Stern’s aliases]. “I’m sorting it out and have already started writing code.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220309-201558/</link>
      <pubDate>Wed, 09 Mar 2022 20:15:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220309-201558/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/09/business/amazon-antitrust-investigation.html&amp;#34;&amp;gt;A House panel calls for a criminal investigation into Amazon. Members of the Judiciary Committee accused Amazon of obstructing its inquiry into how the company treats third-party sellers. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220309-200550/</link>
      <pubDate>Wed, 09 Mar 2022 20:05:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220309-200550/</guid>
      <description>Microsoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users, and relatively few “critical” fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here’s a look at the security weaknesses Microsoft says are most likely to be targeted first.&amp;lt;br&amp;gt;
Greg Wiseman , product manager at Rapid7 , notes that three vulnerabilities fixed this month have been previously disclosed, potentially giving attackers a head start in working out how to exploit them. Those include remote code execution bugs &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24512&amp;#34;&amp;gt;CVE-2022-24512&amp;lt;/a&amp;gt; , affecting .NET and Visual Studio , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21990&amp;#34;&amp;gt;CVE-2022-21990&amp;lt;/a&amp;gt; , affecting Remote Desktop Client . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24459&amp;#34;&amp;gt;CVE-2022-24459&amp;lt;/a&amp;gt; is a vulnerability in the Windows Fax and Scan service. All three publicly disclosed vulnerabilities are rated “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system?SilentAuth=1&amp;amp;wa=wsignin1.0&amp;#34;&amp;gt;Important&amp;lt;/a&amp;gt; ” by Microsoft.&amp;lt;br&amp;gt;
Just three of the fixes this month earned Microsoft’s most-dire “ Critical ” rating, which Redmond assigns to bugs that can be exploited to remotely compromise a Windows PC with little to no help from users. Two of those critical flaws involve Windows video codecs. Perhaps the most concerning critical bug quashed this month is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23277&amp;#34;&amp;gt;CVE-2022-23277&amp;lt;/a&amp;gt; , a  remote code execution flaw affecting Microsoft Exchange Server .&amp;lt;br&amp;gt;
“Thankfully, this is a post-authentication vulnerability, meaning attackers need credentials to exploit it,” Wiseman said. “Although passwords can be obtained via phishing and other means, this one shouldn’t be as rampantly exploited as the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/&amp;#34;&amp;gt;deluge of Exchange vulnerabilities we saw throughout 2021&amp;lt;/a&amp;gt; . Exchange administrators should still patch as soon as reasonably possible.”&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-24508&amp;#34;&amp;gt;CVE-2022-24508&amp;lt;/a&amp;gt; is a remote code execution bug affecting Windows SMBv3 , the technology that handles file sharing in Windows environments.&amp;lt;br&amp;gt;
“This has potential for widespread exploitation, assuming an attacker can put together a suitable exploit,” Wiseman said. “Luckily, like this month’s Exchange vulnerabilities, this, too, requires authentication.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/microsoft-patch-tuesday-march-2022-edition/#more-58876&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220309-161551/</link>
      <pubDate>Wed, 09 Mar 2022 16:15:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220309-161551/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/app?utm_campaign=app-marketing&amp;amp;utm_content=footer-button&amp;#34;&amp;gt;Get the Substack app&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220309-080609/</link>
      <pubDate>Wed, 09 Mar 2022 08:06:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220309-080609/</guid>
      <description>&amp;lt;p&amp;gt;Lumen Technologies , an American company that operates one of the largest Internet backbones and carries a significant percentage of the world’s Internet traffic, said today it will stop routing traffic for organizations based in Russia. Lumen’s decision comes just days after a similar exit by backbone provider Cogent , and amid a news media crackdown in Russia that has already left millions of Russians in the dark about what is really going on with their president’s war in Ukraine.&amp;lt;br&amp;gt;
Monroe, La. based Lumen [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/finance/quote/LUMN:NYSE&amp;#34;&amp;gt;NYSE: LUMN&amp;lt;/a&amp;gt; ] (formerly CenturyLink ) initially said it would halt all new business with organizations based in Russia, leaving open the possibility of continuing to serve existing clients there. But on Tuesday the company said it could no longer justify that stance.&amp;lt;br&amp;gt;
“Life has taken a turn in Russia and Lumen is unable to continue to operate in this market,” Lumen said in a published statement. “The business services we provide are extremely small and very limited as is our physical presence. However, we are taking steps to immediately stop business in the region.”&amp;lt;br&amp;gt;
“We decided to disconnect the network due to increased security risk inside Russia,” the statement continues. “We have not yet experienced network disruptions but given the increasingly uncertain environment and the heightened risk of state action, we took this move to ensure the security of our and our customers’ networks, as well as the ongoing integrity of the global Internet.”&amp;lt;br&amp;gt;
According to Internet infrastructure monitoring firm Kentik , Lumen is the top international transit provider to Russia, with customers including Russian telecom giants Rostelecom and TTK, as well as all three major mobile operators (MTS, Megafon and VEON).&amp;lt;br&amp;gt;
“A backbone carrier disconnecting its customers in a country the size of Russia is without precedent in the history of the internet and reflects the intense global reaction that the world has had over the invasion of Ukraine,” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kentik.com/blog/cogent-disconnects-from-russia/&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; Doug Madory , Kentik’s director of Internet analysis.&amp;lt;br&amp;gt;
It’s not clear whether any other Internet backbone providers — some of which are based outside of the United States — will follow the lead of Lumen and Cogent. But Madory notes that as economic sanctions continue to exact a toll on Russia’s economy, its own telecommunications firms may have difficulty paying foreign transit providers for service.&amp;lt;br&amp;gt;
Ukrainian leaders petitioned the Internet Corporation for Assigned Names and Numbers (ICANN) — the nonprofit organization charged with overseeing the global domain name system — to disconnect Russia’s top-level domain (.ru) from the Internet. ICANN respectfully declined that request, but many technology giants, including Amazon, Apple and Microsoft, have moved on their own to suspend new business in the country.&amp;lt;br&amp;gt;
Meanwhile, Russia recently cracked down on the last remaining vestiges of a free press within its borders, passing a new law that threatens up to 15 years in jail for anyone who publishes content that refers to the conflict in Ukraine as a “war” or “invasion.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/internet-backbone-giant-lumen-shuns-ru/#more-58854&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/internet-backbone-giant-lumen-shuns-ru/&amp;#34;&amp;gt;Internet Backbone Giant Lumen Shuns .RU&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/category/russias-war-on-ukraine/&amp;#34;&amp;gt;Russia&amp;amp;#39;s War on Ukraine&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220308-200540/</link>
      <pubDate>Tue, 08 Mar 2022 20:05:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220308-200540/</guid>
      <description>Three stories here last week pored over several years’ worth of internal chat records stolen from the Conti ransomware group, the most profitable ransomware gang in operation today. The candid messages revealed how Conti &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/&amp;#34;&amp;gt;evaded law enforcement and intelligence agencies&amp;lt;/a&amp;gt; , what it was like on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/&amp;#34;&amp;gt;a typical day at the Conti office&amp;lt;/a&amp;gt; , and how Conti &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/&amp;#34;&amp;gt;secured the digital weaponry used in their attacks&amp;lt;/a&amp;gt; . This final post on the Conti conversations explores different schemes that Conti pursued to invest in and steal cryptocurrencies.&amp;lt;br&amp;gt;
When you’re perhaps the most successful ransomware group around — Conti made $180 million last year in extortion payments, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/03/contistats-768x391.png&amp;#34;&amp;gt;well more than any other crime group&amp;lt;/a&amp;gt; , according to Chainalysis — you tend to have a lot digital currency like Bitcoin.&amp;lt;br&amp;gt;
This wealth allowed Conti to do things that regular investors couldn’t — such as moving the price of cryptocurrencies in one direction or the other. Or building a cryptocurrency platform and seeding it with loads of ill-gotten crypto from phantom investors.&amp;lt;br&amp;gt;
One Conti top manager — aptly-named “ Stern ” because he incessantly needled Conti underlings to complete their assigned tasks — was obsessed with the idea of creating his own crypto scheme for cross-platform blockchain applications.&amp;lt;br&amp;gt;
“I’m addicted right now, I’m interested in trading, defi, blockchain, new projects,” Stern told “ Bloodrush ” on Nov. 3, 2021. “Big companies have too many secrets that they hold on to, thinking that this is their main value, these patents and data.”&amp;lt;br&amp;gt;
In a discussion thread that spanned many months in Conti’s internal chat room, Stern said the plan was to create their own crypto universe.&amp;lt;br&amp;gt;
“Like Netherium, Polkadot and Binance smart chain, etc.,” Stern wrote. “Does anyone know more about this? Study the above systems, code, principles of work. To build our own, where it will already be possible to plug in NFT, DEFI, DEX and all the new trends that are and will be. For others to create their own coins, exchanges and projects on our system.”&amp;lt;br&amp;gt;
It appears that Stern has been paying multiple developers to pursue the notion of building a peer-to-peer (P2P) based system for “smart contracts” — programs stored on a blockchain that run whenever predetermined conditions are met.&amp;lt;br&amp;gt;
It’s unclear under what context the Conti gang was interested in smart contracts, but the idea of a ransomware group insisting on payments via smart contracts is not entirely new. In 2020, researchers from Athens University School of Information Sciences and Technology in Greece &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arxiv.org/pdf/2003.04426.pdf&amp;#34;&amp;gt;showed&amp;lt;/a&amp;gt; (PDF) how ransomware-as-a-service offerings might one day be executed through smart contracts.&amp;lt;br&amp;gt;
Before that, Jeffrey Ladish , an information security consultant based in Oakland, Calif., penned a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/reserve-currency/smart-contracts-will-make-ransomware-more-profitable-part-1-a687fc370320&amp;#34;&amp;gt;two-part analysis&amp;lt;/a&amp;gt; on why smart contracts will make ransomware more profitable.&amp;lt;br&amp;gt;
“By using a smart contract, an operator can trustlessly sell their victims a decryption key for money,” Ladish wrote. “That is, a victim can send some money to a smart contract with a guarantee that they will either receive the decryption key to their data or get their money back. The victim does not have to trust the person who hacked their computer because they can verify that the smart contract will fairly handle the exchange.”&amp;lt;br&amp;gt;
The Conti employee “ Van ” appears to have taken the lead on the P2P crypto platform, which he said was being developed using the Rust programming language.&amp;lt;br&amp;gt;
“I am trying to make a p2p network in Rust,” Van told a co-worker “ Demon ” on Feb. 19, 2022. “I’m sorting it out and have already started writing code.”&amp;lt;br&amp;gt;
“It’s cool you like Rust,” Demon replied. “I think it will help us with smart contracts.”&amp;lt;br&amp;gt;
Stern apparently believed in his crypto dreams so much that he sponsored a $100,000 article writing contest on the Russian language cybercrime forum Exploit, asking interested applicants to put forth various ideas for crypto platforms. Such contests are an easy way to buy intellectual property for ongoing projects, and they’re also effective recruiting tools for cybercriminal organizations.&amp;lt;br&amp;gt;
“Cryptocurrency article contest! [100.000$],” wrote mid-level Conti manager “Mango,” to boss Stern, copying the title of the post on the Exploit forum. “What the hell are you doing there…”&amp;lt;br&amp;gt;
A few days later Mango reports to Stern that he has “prepared everything for both the social network and articles for crypto contests.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime/#more-58766&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iv-cryptocrime/&amp;#34;&amp;gt;Conti Ransomware Group Diaries, Part IV: Cryptocrime&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220308-081828/</link>
      <pubDate>Tue, 08 Mar 2022 08:18:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220308-081828/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2015/11/15/a-strange-representation-of-z6/&amp;#34;&amp;gt;A strange representation of Z6&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220307-201318/</link>
      <pubDate>Mon, 07 Mar 2022 20:13:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220307-201318/</guid>
      <description>nullopt_t&amp;lt;br&amp;gt;
is not equality-comparable, but&amp;lt;br&amp;gt;
monostate&amp;lt;br&amp;gt;
is&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#ranges&amp;#34;&amp;gt;ranges&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#standard-library-trivia&amp;#34;&amp;gt;standard-library-trivia&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#today-i-learned&amp;#34;&amp;gt;today-i-learned&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#value-semantics&amp;#34;&amp;gt;value-semantics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
On &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;Slack&amp;lt;/a&amp;gt; ,
Kilian Henneberger asked for some STL types that are copyable but not
equality-comparable. One example is&amp;lt;br&amp;gt;
std::function&amp;amp;lt;int()&amp;amp;gt;&amp;lt;br&amp;gt;
; see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/05/10/function-ref-vs-string-view/&amp;#34;&amp;gt;“On function_ref and string_view ”&amp;lt;/a&amp;gt; (2019-05-10).
The simplest example is&amp;lt;br&amp;gt;
struct S {};&amp;lt;br&amp;gt;
— for compatibility with C, C&#43;&#43;98 provided
every class type with a copy constructor, but none of them with comparison operators.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220307-080839/</link>
      <pubDate>Mon, 07 Mar 2022 08:08:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220307-080839/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/the-react-lifecycle-methods-and-hooks-explained/&amp;#34;&amp;gt;Learn more about the React component lifecycle and the different methods within each phase (for class-based components), focusing particularly on methods and hooks.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220306-040556/</link>
      <pubDate>Sun, 06 Mar 2022 04:05:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220306-040556/</guid>
      <description>Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/&amp;#34;&amp;gt;dealt with its own internal breaches&amp;lt;/a&amp;gt; . Part II explored what it’s like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/&amp;#34;&amp;gt;to be an employee of Conti’s sprawling organization&amp;lt;/a&amp;gt; . Today’s Part III looks at how Conti abused popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220305-042014/</link>
      <pubDate>Sat, 05 Mar 2022 04:20:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220305-042014/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/04/world/europe/russia-facebook-ukraine.html&amp;#34;&amp;gt;Russia blocks Facebook inside the country, as the Kremlin moves to stifle dissent. By Mike Isaac and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220305-040618/</link>
      <pubDate>Sat, 05 Mar 2022 04:06:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220305-040618/</guid>
      <description>Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/&amp;#34;&amp;gt;dealt with its own internal breaches&amp;lt;/a&amp;gt; . Part II explored what it’s like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/&amp;#34;&amp;gt;to be an employee of Conti’s sprawling organization&amp;lt;/a&amp;gt; . Today’s Part III looks at how Conti abused a panoply of popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims.&amp;lt;br&amp;gt;
Conti is by far the most aggressive and profitable ransomware group in operation today. Image: Chainalysis&amp;lt;br&amp;gt;
Conti is by far the most successful ransomware group in operation today, routinely pulling in multi-million dollar payments from victim organizations. That’s because more than perhaps any other ransomware outfit, Conti has chosen to focus its considerable staff and talents on targeting companies with more than $100 million in annual revenues.&amp;lt;br&amp;gt;
As it happens, Conti itself recently joined the $100 million club. According to the latest &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://go.chainalysis.com/rs/503-FAP-074/images/Crypto-Crime-Report-2022.pdf&amp;#34;&amp;gt;Crypto Crime Report&amp;lt;/a&amp;gt; (PDF) published by virtual currency tracking firm Chainalysis , Conti generated at least $180 million in revenue last year.&amp;lt;br&amp;gt;
On Feb. 27, a Ukrainian cybersecurity researcher who is currently in Ukraine leaked almost two years’ worth of internal chat records from Conti, which had just posted a press release to its victim shaming blog saying it fully supported Russia’s invasion of his country. Conti warned it would use its cyber prowess to strike back at anyone who interfered in the conflict.&amp;lt;br&amp;gt;
The leaked chats show that the Conti group — which fluctuated in size from 65 to more than 100 employees — budgeted several thousand dollars each month to pay for a slew of security and antivirus tools. Conti sought out these tools both for continuous testing (to see how many products detected their malware as bad), but also for their own internal security.&amp;lt;br&amp;gt;
A chat between Conti upper manager “ Reshaev ” and subordinate “ Pin ” on Aug. 8, 2021 shows Reshaev ordering Pin to quietly check on the activity of the Conti network administrators once a week — to ensure they’re not doing anything to undermine the integrity or security of the group’s operation. Reshaev tells Pin to install endpoint detection and response (EDR) tools on every administrator’s computer.&amp;lt;br&amp;gt;
“Check admins’ activity on servers each week,” Reshaev said. “Install EDR on every computer (for example, Sentinel, Cylance, CrowdStrike); set up more complex storage system; protect LSAS dump on all computers; have only 1 active accounts; install latest security updates; install firewall on all network.”&amp;lt;br&amp;gt;
Conti managers were hyper aware that their employees handled incredibly sensitive and invaluable data stolen from companies, information that would sell like hotcakes on the underground cybercrime forums. But in a company run by crooks, trust doesn’t come easily.&amp;lt;br&amp;gt;
“You check on me all the time, don’t you trust me?,” asked mid-level Conti member “ Bio ” of “ Tramp ” (a.k.a. “ Trump “), a top Conti overlord. Bio was handling a large bitcoin transfer from a victim ransom payment, and Bio detected that Trump was monitoring him.&amp;lt;br&amp;gt;
“When that kind of money and people from the street come in who have never seen that kind of money, how can you trust them 1,000%?” Trump replied. “I’ve been working here for more than 15 years and haven’t seen anything else.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/#more-58724&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-iii-weaponry/&amp;#34;&amp;gt;Conti Ransomware Group Diaries, Part III: Weaponry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220305-001647/</link>
      <pubDate>Sat, 05 Mar 2022 00:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220305-001647/</guid>
      <description>Ukraine: visit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/news&amp;#34;&amp;gt;Nature news&amp;lt;/a&amp;gt; for the latest coverage and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.springernature.com/gp/advancing-discovery/springboard/blog/blogposts-open-research/springer-nature-condemns-russian-invasion/20191448&amp;#34;&amp;gt;click here for Springer Nature&amp;#39;s statement&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220304-201948/</link>
      <pubDate>Fri, 04 Mar 2022 20:19:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220304-201948/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/03/04/world/russia-ukraine/russia-facebook-ukraine&amp;#34;&amp;gt;Russia blocks Facebook inside the country, as the Kremlin moves to stifle dissent. This was featured in live coverage. By Mike Isaac and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
March 4, 2022&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220304-201518/</link>
      <pubDate>Fri, 04 Mar 2022 20:15:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220304-201518/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#access-control&amp;#34;&amp;gt;access-control&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#wg21-folkloristics&amp;#34;&amp;gt;wg21-folkloristics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Thanks to Jody Hagins for inspiring this blog post, for digging up some
old wordings, and for reviewing a draft of this post. Also thanks to Pal Balog
for P1847; its historical details were indispensable in writing this post.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#stl-classic&amp;#34;&amp;gt;stl-classic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#overload-resolution&amp;#34;&amp;gt;overload-resolution&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#war-stories&amp;#34;&amp;gt;war-stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220304-201426/</link>
      <pubDate>Fri, 04 Mar 2022 20:14:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220304-201426/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/26/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to another curation of long-form pieces, the kind of thing that I, as a semi-retired person, have time for.     While you probably don’t have the space for all of these, one or two might reward an investment of your attention.     These are obviously grim times and indeed there’s grim stuff here but I’ve tried to add some smiles for balance &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/26/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [3 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220304-200622/</link>
      <pubDate>Fri, 04 Mar 2022 20:06:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220304-200622/</guid>
      <description>On July 30, 2021, Mango tells stern the payroll has increased to 87 salaried employees, with more hires on the way. But trying to accurately gauge the size of the Conti organization is problematic, in part because cybersecurity experts have long held that Conti is merely a rebrand of another ransomware strain and affiliate program known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Ryuk_(ransomware)&amp;#34;&amp;gt;Ryuk&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
First spotted in 2018, Ryuk was just as ruthless and mercenary as Conti, and the FBI says that in the first year of its operation Ryuk earned more than $61 million in ransom payouts.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220304-161721/</link>
      <pubDate>Fri, 04 Mar 2022 16:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220304-161721/</guid>
      <description>Ukraine: visit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/news&amp;#34;&amp;gt;Nature news&amp;lt;/a&amp;gt; for the latest coverage and click &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.springernature.com/gp/advancing-discovery/springboard/blog/blogposts-open-research/springer-nature-condemns-russian-invasion/20191448&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; for Springer Nature&amp;#39;s statement&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220304-042107/</link>
      <pubDate>Fri, 04 Mar 2022 04:21:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220304-042107/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/07/24/introducing-math-combinatorics-species/&amp;#34;&amp;gt;Introducing Math.Combinatorics.Species!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220304-041817/</link>
      <pubDate>Fri, 04 Mar 2022 04:18:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220304-041817/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/ukraine-and-the-limits-of-russias&amp;#34;&amp;gt;Ukraine And The Limits Of Russia’s Social Media Power&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/ukraine-and-the-limits-of-russias&amp;#34;&amp;gt;The Kremlin is pulling its usual tricks. Here&amp;#39;s why they&amp;#39;re falling flat.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220303-201947/</link>
      <pubDate>Thu, 03 Mar 2022 20:19:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220303-201947/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/interop-2022/&amp;#34;&amp;gt;Announcing Interop 2022 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/interop-2022/&amp;#34;&amp;gt;Announcing Interop 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Writing high quality standards is a necessary first step to an interoperable web platform, but ensuring that browsers are consistent in their behavior requires an ongoing process. Browsers must work to ensure that they have a shared understanding of web standards, and that their implementation matches that understanding.
&amp;lt;p&amp;gt;Interop 2022 is a cross-browser initiative to find and address the most important interoperability pain points on the web platform. The end result is a public metric that will assess progress toward fixing these interoperability issues.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220303-201539/</link>
      <pubDate>Thu, 03 Mar 2022 20:15:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220303-201539/</guid>
      <description>vector&amp;amp;lt;T&amp;amp;gt;::iterator&amp;lt;br&amp;gt;
were just&amp;lt;br&amp;gt;
T*&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Every major C&#43;&#43; standard library vendor defines wrappers for their
contiguous iterator types —&amp;lt;br&amp;gt;
and so on. You might
think that they should just define these iterators as aliases for&amp;lt;br&amp;gt;
instead.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220303-040630/</link>
      <pubDate>Thu, 03 Mar 2022 04:06:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220303-040630/</guid>
      <description>Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti , one of the more rapacious and ruthless ransomware gangs in operation today. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/&amp;#34;&amp;gt;Tuesday’s story&amp;lt;/a&amp;gt; examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.&amp;lt;br&amp;gt;
The Conti group’s chats reveal a great deal about its internal structure and hierarchy. Conti maintains many of the same business units as a legitimate, small- to medium-sized enterprise, including a Human Resources department that is in charge of constantly interviewing potential new hires.&amp;lt;br&amp;gt;
Other Conti departments with their own distinct budgets, staff schedules, and senior leadership include:&amp;lt;br&amp;gt;
– Coders: Programmers hired to write malicious code, integrate disparate technologies – Testers: Workers in charge of testing Conti malware against security tools and obfuscating it – Administrators: Workers tasked with setting up, tearing down servers, other attack infrastructure – Reverse Engineers: Those who can disassemble computer code, study it, find vulnerabilities or weaknesses – Penetration Testers/Hackers: Those on the front lines battling against corporate security teams to steal data, and plant ransomware.&amp;lt;br&amp;gt;
Conti appears to have contracted out much of its spamming operations, or at least there was no mention of “Spammers” as direct employees. Conti’s leaders seem to have set strict budgets for each of its organizational units, although it occasionally borrowed funds allocated for one department to address the pressing cashflow needs of another.&amp;lt;br&amp;gt;
A great many of the more revealing chats concerning Conti’s structure are between “ Mango ” — a mid-level Conti manager to whom many other Conti employees report each day — and “ Stern ,” a sort of cantankerous taskmaster who can be seen constantly needling the staff for reports on their work.&amp;lt;br&amp;gt;
In July 2021, Mango told Stern that the group was placing ads on several Russian-language cybercrime forums to hire more workers. “The salary is $2k in the announcement, but there are a lot of comments that we are recruiting galley slaves,” Mango wrote. “Of course, we dispute that and say those who work and bring results can earn more, but there are examples of coders who work normally and earn $5-$10k salary.”&amp;lt;br&amp;gt;
The Conti chats show the gang primarily kept tabs on the victim bots infected with their malware via both the Trickbot and Emotet crimeware-as-a-service platforms, and that it employed dozens of people to continuously test, maintain and expand this infrastructure 24 hours a day, 7 days a week.&amp;lt;br&amp;gt;
Conti members referred to Emotet as “ Booz ” or “ Buza ,” and it is evident from reading these chat logs that Buza had its own stable of more than 50 coders, and likely much of the same organizational structure as Conti.&amp;lt;br&amp;gt;
According to Mango, as of July 18, 2021 the Conti gang employed 62 people, mostly low-level malware coders and software testers. However, Conti’s employee roster appears to have fluctuated wildly from one month to the next. For example, on multiple occasions the organization was forced to fire many employees as a security precaution in the wake of its own internal security breaches.&amp;lt;br&amp;gt;
In May 2021, Stern told Mango he wanted his underlings to hire 100 more “encoders” to work with the group’s malware before the bulk of the gang returns from their summer vacations in Crimea. Most of these new hires, Stern says, will join the penetration testing/hacking teams headed by Conti leaders “ Hof ” and “ Reverse .” Both Hof and Reverse appear to have direct access to the Emotet crimeware platform.&amp;lt;br&amp;gt;
Trying to accurately gauge the size of the Conti organization is problematic, in part because cybersecurity experts have long held that Conti is merely a rebrand of another ransomware strain and affiliate program known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Ryuk_(ransomware)&amp;#34;&amp;gt;Ryuk&amp;lt;/a&amp;gt; . First spotted in 2018, Ryuk was just as ruthless and mercenary as Conti, and the FBI says that in the first year of its operation Ryuk earned more than $61 million in ransom payouts.&amp;lt;br&amp;gt;
“Conti is a Targeted version of Ryuk, which comes from Trickbot and Emotet which we’ve been monitoring for some time,” researchers at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.paloaltonetworks.com/blog/security-operations/conti-or-so-i-am-told/&amp;#34;&amp;gt;Palo Alto Networks wrote about Ryuk last year&amp;lt;/a&amp;gt; . “A heavy focus was put on hospital systems, likely due to the necessity for uptime, as these systems were overwhelmed with handling the ongoing COVID-19 pandemic. We observed initial Ryuk ransom requests ranging from US$600,000 to $10 million across multiple industries.”&amp;lt;br&amp;gt;
On May 14, 2021, Ireland’s Health Service Executive (HSE) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/inside-irelands-public-healthcare-ransomware-scare/&amp;#34;&amp;gt;suffered a major ransomware attack at the hands of Conti&amp;lt;/a&amp;gt; . The attack would disrupt services at several Irish hospitals, and resulted in the near complete shutdown of the HSE’s national and local networks, forcing the cancellation of many outpatient clinics and healthcare services. It took the HSE until Sept. 21, 2021 to fully restore all of its systems from the attack, at an estimated cost of more than $600 million.&amp;lt;br&amp;gt;
It remains unclear from reading these chats how many of Conti’s staff understood how much of the organization’s operations overlapped with that of Ryuk. Lawrence Abrams at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com&amp;#34;&amp;gt;Bleeping Computer&amp;lt;/a&amp;gt; pointed to an October 2020 Conti chat in which the Emotet representative “Buza” posts a link to a security firm’s analysis of Ryuk’s return.&amp;lt;br&amp;gt;
“ Professor ,” the nickname chosen by one of Conti’s most senior generals, replies that indeed Ryuk’s tools, techniques and procedures are nearly identical to Conti’s.&amp;lt;br&amp;gt;
“adf.bat — this is my fucking batch file,” Professor writes, evidently surprised at having read the analysis and spotting his own code being re-used in high-profile ransomware attacks by Ryuk.&amp;lt;br&amp;gt;
“Feels like [the] same managers were running both Ryuk and Conti, with a slow migration to Conti in June 2020,” Abrams &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/LawrenceAbrams/status/1499046186942144523&amp;#34;&amp;gt;wrote on Twitter&amp;lt;/a&amp;gt; . “However, based on chats, some affiliates didn’t know that Ryuk and Conti were run by the same people.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/#more-58690&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/&amp;#34;&amp;gt;Conti Ransomware Group Diaries, Part II: The Office&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220303-001725/</link>
      <pubDate>Thu, 03 Mar 2022 00:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220303-001725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/03/02/technology/tiktok-states-investigation.html&amp;#34;&amp;gt;A coalition of state attorneys general opens an investigation into TikTok. The group is looking into the Chinese-owned video site for the harms it may pose to younger users. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220302-120628/</link>
      <pubDate>Wed, 02 Mar 2022 12:06:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220302-120628/</guid>
      <description>A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti , an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. The records also provide insight into how Conti has dealt with its own internal breaches and attacks from private security firms and foreign governments.&amp;lt;br&amp;gt;
Conti’s threatening message this week regarding international interference in Ukraine.&amp;lt;br&amp;gt;
Conti makes international news headlines each week when it publishes to its dark web blog new information stolen from ransomware victims who refuse to pay an extortion demand. In response to Russia’s invasion of Ukraine, Conti &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/russia-based-ransomware-group-conti-issues-warning-kremlin-foes-2022-02-25/&amp;#34;&amp;gt;published a statement&amp;lt;/a&amp;gt; announcing its “full support.”&amp;lt;br&amp;gt;
“If anybody will decide to organize a cyberattack or any war activities against Russia, we are going to use all our possible resources to strike back at the critical infrastructures of an enemy,” the Conti blog post read.&amp;lt;br&amp;gt;
On Sunday, Feb. 27, a new Twitter account “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/contileaks&amp;#34;&amp;gt;Contileaks&amp;lt;/a&amp;gt; ” posted links to an archive of chat messages taken from Conti’s private communications infrastructure, dating from January 29, 2021 to the present day. Shouting “Glory for Ukraine,” the Contileaks account has since published additional Conti employee conversations from June 22, 2020 to Nov. 16, 2020.&amp;lt;br&amp;gt;
The Contileaks account did not respond to requests for comment. But Alex Holden , the Ukrainian-born founder of the Milwaukee-based cyber intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.holdsecurity.com&amp;#34;&amp;gt;Hold Security&amp;lt;/a&amp;gt; , said the person who leaked the information is not a former Conti affiliate — as many on Twitter have assumed. Rather, he said, the leaker is a Ukrainian security researcher who has chosen to stay in his country and fight.&amp;lt;br&amp;gt;
“The person releasing this is a Ukrainian and a patriot,” Holden said. “He’s seeing that Conti is supporting Russia in its invasion of Ukraine, and this is his way to stop them in his mind at least.”&amp;lt;br&amp;gt;
GAP #1&amp;lt;br&amp;gt;
The temporal gaps in these chat records roughly correspond to times when Conti’s IT infrastructure was dismantled and/or infiltrated by security researchers, private companies, law enforcement, and national intelligence agencies. The holes in the chat logs also match up with periods of relative quiescence from the group, as it sought to re-establish its network of infected systems and dismiss its low-level staff as a security precaution.&amp;lt;br&amp;gt;
On Sept. 22, 2020, the U.S. National Security Agency (NSA) began &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/10/report-u-s-cyber-command-behind-trickbot-tricks/&amp;#34;&amp;gt;a weeks-long operation&amp;lt;/a&amp;gt; in which it seized control over the Trickbot botnet , a malware crime machine that has infected millions of computers and is often used to spread ransomware. Conti is one of several cybercrime groups that has regularly used Trickbot to deploy malware.&amp;lt;br&amp;gt;
Once in control over Trickbot, the NSA’s hackers sent all infected systems a command telling them to disconnect themselves from the Internet servers the Trickbot overlords used to control compromised Microsoft Windows computers. On top of that, the NSA &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/10/attacks-aimed-at-disrupting-the-trickbot-botnet/&amp;#34;&amp;gt;stuffed millions of bogus records about new victims into the Trickbot database&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
News of the Trickbot compromise was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/10/attacks-aimed-at-disrupting-the-trickbot-botnet/&amp;#34;&amp;gt;first published here on Oct. 2, 2020&amp;lt;/a&amp;gt; , but the leaked Conti chats show that the group’s core leadership detected something was seriously wrong with their crime machine just a few hours after the initial compromise of Trickbot’s infrastructure on Sept. 22.&amp;lt;br&amp;gt;
“The one who made this garbage did it very well,” wrote “ Hof ,” the handle chosen by a top Conti leader, commenting on the Trickbot malware implant that was supplied by the NSA and quickly spread to the rest of the botnet. “He knew how the bot works, i.e. he probably saw the source code, or reversed it. Plus, he somehow encrypted the config, i.e. he had an encoder and a private key, plus uploaded it all to the admin panel. It’s just some kind of sabotage.”&amp;lt;br&amp;gt;
“Moreover, the bots have been flooded with such a config that they will simply work idle,” Hof explained to his team on Sept. 23, 2020. Hof noted that the intruder even kneecapped Trickbot’s built-in failsafe recovery mechanism. Trickbot was configured so that if none of the botnet’s control servers were reachable, the bots could still be recaptured and controlled by registering a pre-computed domain name on EmerDNS , a decentralized domain name system based on the Emercoin virtual currency.&amp;lt;br&amp;gt;
“After a while they will download a new config via emercoin, but they will not be able to apply this config, because this saboteur has uploaded the config with the maximum [version] number, and the bot is checking that the new config [version number] should be larger than the old one,” Hof wrote. “Sorry, but this is fucked up. I don’t know how to get them back.”&amp;lt;br&amp;gt;
It would take the Conti gang several weeks to rebuild its malware infrastructure, and infect tens of thousands of new Microsoft Windows systems. By late October 2020, Conti’s network of infected systems had grown to include 428 medical facilities throughout the United States. The gang’s leaders saw an opportunity to create widespread panic — if not also chaos — by deploying their ransomware simultaneously to hundreds of American healthcare organizations already struggling amid a worldwide pandemic.&amp;lt;br&amp;gt;
“Fuck the clinics in the USA this week,” wrote Conti manager “Target” on Oct. 26, 2020. “There will be panic. 428 hospitals.”&amp;lt;br&amp;gt;
On October 28, the FBI and the U.S. Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/10/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/&amp;#34;&amp;gt;imminent cybercrime threat to U.S. hospitals and healthcare providers&amp;lt;/a&amp;gt; .”&amp;lt;br&amp;gt;
Follow-up reporting confirmed that at least a dozen healthcare organizations were hit with ransomware that week, but the carnage apparently was not much worse than a typical week in the healthcare sector. One information security leader in the healthcare industry told KrebsOnSecurity at the time that it wasn’t uncommon for the industry to see at least one hospital or health care facility hit with ransomware each day. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/#more-58685&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/&amp;#34;&amp;gt;Conti Ransomware Group Diaries, Part I: Evasion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220301-161930/</link>
      <pubDate>Tue, 01 Mar 2022 16:19:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220301-161930/</guid>
      <description>March 1, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/03/01/Open-source-is-defined-by-the-OSD.html&amp;#34;&amp;gt;Open Source is defined by the OSI&amp;#39;s Open Source Definition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220301-161927/</link>
      <pubDate>Tue, 01 Mar 2022 16:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220301-161927/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/a-new-year-a-new-mdn/&amp;#34;&amp;gt;A new year, a new MDN →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/03/a-new-year-a-new-mdn/&amp;#34;&amp;gt;A new year, a new MDN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
If you’ve accessed the MDN website today, you probably noticed that it looks quite different. We hope it’s a good different. Let us explain!
&amp;lt;p&amp;gt;In mid-2021 we started to think about modernizing MDN’s design, to create a clean and inviting website that makes navigating our 44,000 articles as easy as possible. We wanted to create a more holistic experience for our users, with an emphasis on improved navigability and a universal look and feel across all our pages.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220301-001827/</link>
      <pubDate>Tue, 01 Mar 2022 00:18:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220301-001827/</guid>
      <description>Sign in&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220228-201834/</link>
      <pubDate>Mon, 28 Feb 2022 20:18:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220228-201834/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/28/technology/whole-foods-amazon-automation.html&amp;#34;&amp;gt;Here Comes the Full Amazonification of Whole Foods A newly revamped store in Washington shows how thoroughly Amazon has woven itself into the grocery shopping experience. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220228-201805/</link>
      <pubDate>Mon, 28 Feb 2022 20:18:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220228-201805/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00542-4&amp;#34;&amp;gt;Space junk heading for Moon will add to 60&#43; years of lunar debris&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In an upcoming collision, a spent rocket booster will be the first long-circulating piece of human-made debris to smash into the lunar surface.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220228-161802/</link>
      <pubDate>Mon, 28 Feb 2022 16:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220228-161802/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/28/technology/whole-foods-amazon-automation.html&amp;#34;&amp;gt;Your Old Whole Foods Is Fading. Here Comes the Amazon Whole Foods. A newly revamped store in Washington shows how thoroughly Amazon has woven itself into the grocery shopping experience. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220228-082028/</link>
      <pubDate>Mon, 28 Feb 2022 08:20:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220228-082028/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/02/27/world/russia-ukraine-war/facebooks-parent-company-says-it-shut-down-digital-operations-targeting-ukraine&amp;#34;&amp;gt;Facebook’s parent company says it shut down digital operations targeting Ukraine. This was featured in live coverage. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220228-080929/</link>
      <pubDate>Mon, 28 Feb 2022 08:09:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220228-080929/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-native-component-library-roundup/&amp;#34;&amp;gt;Here is our roundup of React native component libraries—both general and special purpose ones—with most important characteristics and helpful links.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220228-041959/</link>
      <pubDate>Mon, 28 Feb 2022 04:19:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220228-041959/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/10/17/and-now-back-to-your-regularly-scheduled-combinatorial-species/&amp;#34;&amp;gt;And now, back to your regularly scheduled combinatorial species&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220228-001438/</link>
      <pubDate>Mon, 28 Feb 2022 00:14:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220228-001438/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#wordle&amp;#34;&amp;gt;wordle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Has it been a week since &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/wordle-clone/birdle/&amp;#34;&amp;gt;Birdle&amp;lt;/a&amp;gt; already?
Wow. Anyway, I’ve made another Wordle variant. I call this one &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/wordle-clone/evirdle/&amp;#34;&amp;gt;Evirdle&amp;lt;/a&amp;gt; ,
because it is evil. It tries to make your Wordle experience as challenging as possible.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#wordle&amp;#34;&amp;gt;wordle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220227-201341/</link>
      <pubDate>Sun, 27 Feb 2022 20:13:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220227-201341/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/26/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to another curation of long-form pieces, the kind of thing that I, as a semi-retired person, have time for.     While you probably don’t have the space for all of these, one or two might reward an investment of your attention.     These are obviously grim times and indeed there’s grim stuff here but I’ve tried to add some smiles for balance &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/26/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Beatles documentary. I’m a pretty intense music geek and while I     gather there were some for whom this was Too Much Beatles, there was hardly a moment I wanted to look away.     I found the whole thing intense and feel like  sharing a few purely     musical take-aways: If you care about will-George-quit or the-meaning-of-Yoko drama, I got nothing for you &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/18/Get-Back&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220226-160629/</link>
      <pubDate>Sat, 26 Feb 2022 16:06:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220226-160629/</guid>
      <description>Want tips to overcome procrastination?&amp;lt;br&amp;gt;
Get blog posts, short tips, and illustrations in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/newsletter&amp;#34;&amp;gt;the Deprocrastination newsletter&amp;lt;/a&amp;gt; about once a week.&amp;lt;br&amp;gt;
Found the article helpful?&amp;lt;br&amp;gt;
For practical tips:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220226-000607/</link>
      <pubDate>Sat, 26 Feb 2022 00:06:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220226-000607/</guid>
      <description>President Biden joined European leaders this week in enacting economic sanctions against Russia in response to its invasion of Ukraine. The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure.&amp;lt;br&amp;gt;
Michael Daniel is a former cybersecurity advisor to the White House during the Obama administration who now heads the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cyberthreatalliance.org&amp;#34;&amp;gt;Cyber Threat Alliance&amp;lt;/a&amp;gt; , an industry group focused on sharing threat intelligence among members. Daniel said there are two primary types of cyber threats the group is concerned about potentially coming in response to sanctions on Russia.&amp;lt;br&amp;gt;
The first involves what Daniel called “spillover and collateral damage” — a global malware contagion akin to a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/&amp;#34;&amp;gt;NotPeyta event&amp;lt;/a&amp;gt; — basically some type of cyber weapon that has self-propagating capabilities and may even leverage a previously unknown security flaw in a widely-used piece of hardware or software.&amp;lt;br&amp;gt;
Russia has been suspected of releasing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Petya_(malware)&amp;#34;&amp;gt;NotPetya&amp;lt;/a&amp;gt; , a large-scale cyberattack in 2017 initially aimed at Ukrainian businesses that mushroomed into an extremely disruptive and expensive global malware outbreak.&amp;lt;br&amp;gt;
“The second level [is that] in retaliation for sanctions or perceived interference, Russia steps up more direct attacks on Western organizations,” Daniel said. “The Russians have shown themselves to be incredibly ingenious and creative in terms of how they come up with targets that seem to catch us by surprise. If the situation escalates in cyberspace, there could be some unanticipated organizations that end up in the crosshairs.”&amp;lt;br&amp;gt;
What kinds of attacks are experts most concerned about? In part because the Russian economy is so dependent on energy exports, Russia has invested heavily in probing for weaknesses in the cyber systems that support bulk power production and distribution.&amp;lt;br&amp;gt;
Ukraine has long been used as the testing grounds for Russian offensive hacking capabilities targeting power infrastructure. State-backed Russian hackers have been blamed for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/&amp;#34;&amp;gt;the Dec. 23, 2015 cyberattack on Ukraine’s power grid&amp;lt;/a&amp;gt; that left 230,000 customers shivering in the dark.&amp;lt;br&amp;gt;
Experts warn that Russia could just as easily use its arsenal of sneaky cyber exploits against energy systems that support U.S. and European nations. In 2014, then National Security Agency Director Mike Roger s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bloomberg.com/news/articles/2014-11-20/foreign-governments-have-hacked-u-s-power-system-nsa-head-says&amp;#34;&amp;gt;told lawmakers&amp;lt;/a&amp;gt; that hackers had been breaking into U.S. power utilities to probe for weaknesses, and that Russia had been caught planting malware in the same kind of industrial computers used by power utilities.&amp;lt;br&amp;gt;
“All of that leads me to believe it is only a matter of when, not if, we are going to see something dramatic,” Rogers said at the time.&amp;lt;br&amp;gt;
That haunting prophecy is ringing anew as European leaders work on hammering out additional sanctions, which the European Commission president says will restrict the Russian economy’s ability to function by starving it of important technology and access to finance.&amp;lt;br&amp;gt;
A draft of the new penalties obtained by The New York Times would see the European Union ban the export of aircraft and spare parts that are necessary for the maintenance of Russian fleets.&amp;lt;br&amp;gt;
“The bloc will also ban the export of specialized oil-refining technology as well as semiconductors, and it will penalize more banks — although it will stop short of targeting VTB, Russia’s second-largest bank, which is already crippled by American and British sanctions,” The Times &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/25/world/europe/eu-russian-sanctions.html&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Dmitri Alperovitch is co-founder and former chief technology officer at the security firm CrowdStrike . Writing for The Economist , Alperovitch said America must tailor its response carefully to avoid initiating a pattern of escalation that could result in a potentially devastating hot war with Russia.&amp;lt;br&amp;gt;
“The proposed combination of sanctions on top Russian banks and implementation of export controls on semiconductors would be likely to severely debilitate the Russian economy,” Alperovitch &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.economist.com/by-invitation/2022/02/23/dmitri-alperovitch-on-the-risks-of-escalation&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; . “And although many in the West may initially cheer this outcome as righteous punishment for Russia’s blatant violation of Ukrainian sovereignty, these measures will probably trigger significant Russian retaliation against America. That prospect all but guarantees that the conflict will not come to an end with an invasion of Ukraine.”&amp;lt;br&amp;gt;
Faced with a potentially existential threat to its economic well-being — and seeing itself as having nothing more to lose — Russia will have several tools at its disposal with which to respond, he said: One of those will be carrying out cyber-attacks against American and European financial institutions and energy infrastructure.&amp;lt;br&amp;gt;
“Having already exhausted the power of economic sanctions, America and its European allies would have few choices other than to respond to these attacks with offensive cyber-strikes of their own,” Alperovitch wrote. “This pattern of tit-for-tat cyber retaliation could place Russia and the West on a worrying path. It could end with the conflict spilling out of cyberspace and into the realm of a hot conflict. This outcome—a hot conflict between two nuclear powers with extensive cyber capabilities—is one that everyone in the world should be anxious to avoid.”&amp;lt;br&amp;gt;
In May 2021, Russian cybercriminals unleashed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/&amp;#34;&amp;gt;a ransomware attack against Colonial Pipeline&amp;lt;/a&amp;gt; , a major fuel distributor in the United States. The resulting outage caused fuel shortages and price spikes across the nation. Alperovitch says a retaliation from Russia in response to sanctions could make the Colonial Pipeline attack seem paltry by comparison.&amp;lt;br&amp;gt;
“The colonial pipeline is going to be like child’s play if the Russians truly unleash all their capability,” Alperovitch told CNBC this week.&amp;lt;br&amp;gt;
For example, having your organization’s computers and servers locked by ransomware may seem like a day at the park compared to getting hit with “wiper” malware that simply overwrites or corrupts data on infected systems.&amp;lt;br&amp;gt;
Kim Zetter , a veteran Wired reporter who now runs her own &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/&amp;#34;&amp;gt;cybersecurity-focused Substack newsletter&amp;lt;/a&amp;gt; , has painstakingly documented two separate wiper attacks launched in the lead-up to the Russian invasion that targeted Ukrainian government and contractor networks, as well as systems in Latvia and Lithuania.&amp;lt;br&amp;gt;
One contractor interviewed by Zetter said the wiper attacks appeared to be extremely targeted, going after organizations that support the Ukrainian government — regardless of where those organizations are physically located. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/russia-sanctions-may-spark-escalating-cyber-conflict/#more-58650&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/russia-sanctions-may-spark-escalating-cyber-conflict/&amp;#34;&amp;gt;Russia Sanctions May Spark Escalating Cyber Conflict&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220224-001630/</link>
      <pubDate>Thu, 24 Feb 2022 00:16:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220224-001630/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/ex-washington-post-owner-don-graham&amp;#34;&amp;gt;Ex-Washington Post Owner Don Graham On Doing Business With Zuckerberg And Bezos&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/ex-washington-post-owner-don-graham&amp;#34;&amp;gt;Plus: Big Technology Podcast is joining LinkedIn Podcast Network.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive&amp;#34;&amp;gt;Archive&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about?sort=people&amp;#34;&amp;gt;Authors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220223-201346/</link>
      <pubDate>Wed, 23 Feb 2022 20:13:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220223-201346/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/02/mitigating-kernel-risks-on-32-bit-arm.html&amp;#34;&amp;gt;Mitigating kernel risks on 32-bit ARM&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ard Biesheuvel, Google Open Source Security Team Linux kernel support for the 32-bit ARM architecture was contributed in the late 90s, when there was little corporate involvement in Linux development, and most contributors were students or hobbyists, tinkering with development boards, often without much in the way of documentation.&amp;lt;br&amp;gt;
Now 20&#43; years later, 32-bit ARM&amp;amp;#39;s maintainer has downgraded its support level to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/linus/18bd49043caa8b272649d4868c29133eb0a3d143&amp;#34;&amp;gt;&amp;amp;#39;odd fixes&amp;lt;/a&amp;gt; ,&amp;amp;#39; while remaining active as a kernel contributor. This is a common pattern for aging and obsolete architectures: corporate funding for Linux kernel development has tremendously increased the pace of development, but only for architectures with a high return on investment. As a result, the 32-bit ARM port of Linux is essentially in maintenance-only mode, and lacks core Linux advancements such as THREAD_INFO_IN_TASK or VMAP_STACK, which protect against stack overflow attacks. The lack of developer attention does not imply that the 32-bit ARM port has ceased to make economic sense, though. Instead, it has evolved from being one of the spearheads of Linux innovation to a stable and mature platform, and while funding its upstream development may not make sense in the long term, deploying 32-bit ARM into the field today most certainly still makes economic sense when margins are razor thin and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Bill_of_materials&amp;#34;&amp;gt;BOM&amp;lt;/a&amp;gt; costs need to be kept to an absolute minimum. This is why 32-bit ARM is still widely used in embedded systems like set-top boxes and wireless routers.&amp;lt;br&amp;gt;
Running 32-bit Linux on 64-bit ARM systems Ironically, at these low price points, the DRAM is actually the dominant component in terms of BOM cost, and many of these 32-bit ARM systems incorporate a cheap ARMv8 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/System_on_a_chip&amp;#34;&amp;gt;SoC&amp;lt;/a&amp;gt; that happens to be capable of running in 64-bit mode as well. The reason for running 32-bit applications nonetheless is that these generally use less of the expensive DRAM, and can be deployed directly without the need to recompile the binaries. As 32-bit applications don&amp;amp;#39;t need a 64-bit kernel (which itself uses more memory due to its internal use of 64-bit pointers), the product ships with a 32-bit kernel instead. If you&amp;amp;#39;re choosing to use a 32-bit kernel for its smaller memory footprint, it&amp;amp;#39;s not without risks. You&amp;amp;#39;ll likely experience performance issues, unpatched vulnerabilities, and unexpected misbehaviors such as:&amp;lt;br&amp;gt;
32-bit kernels generally cannot manage more than 1 GiB of physical memory without resorting to HIGHMEM bouncing, and cannot provide a full virtual address space of 4 GiB to user space, as 64-bit kernels can.&amp;lt;br&amp;gt;
Side channels or other flaws caused by silicon errata may exist that haven&amp;amp;#39;t been mitigated in 32-bit kernels. For example, the hardening against Spectre and Meltdown vulnerabilities were only done for ARMv7 32-bit only CPUs, and many ARMv8 cores running in 32-bit mode may still be vulnerable (only Cortex-A73 and A75 are handled specifically). And in general, silicon flaws in 64-bit parts that affect the 32-bit kernel are less likely to be found or documented, simply because the silicon validation teams don’t prioritize them.&amp;lt;br&amp;gt;
The 32-bit ARM kernel does not implement the elaborate &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/CUAXCeRjw3c?t=2687&amp;#34;&amp;gt;alternatives patching framework&amp;lt;/a&amp;gt; that is used by other architectures to implement handling of silicon errata, which are particular to certain revisions of certain CPUs. Instead, on 32-bit multiplatform kernels, we simply enable all errata workarounds that may be needed by any of the cores that may ever run the image in question, potentially affecting performance unnecessarily on cores that have no need for them.&amp;lt;br&amp;gt;
Silicon vendors are phasing out 32-bit support in the longer term. Given an ecosystem containing a handful of operating systems and thousands of applications, support for 32-bit operating systems (which is more complex technically) is highly likely to be dropped first. For products with longer life cycles, long-term procurement contracts for components available today are usually much more costly than adjusting the BOM over time and using newer, cheaper parts.&amp;lt;br&amp;gt;
The 32-bit kernel does not implement &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f80fb3a3d50843a401dac4b566b3b131da8077a2&amp;#34;&amp;gt;kernel address space randomization&amp;lt;/a&amp;gt; , and even if it did, its comparatively tiny address space simply leaves very little space for randomization. Other hardening features, such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c55191e96caa9&amp;#34;&amp;gt;rodata=full&amp;lt;/a&amp;gt; or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=87143f404f338&amp;#34;&amp;gt;hierarchical eXecute Never attributes&amp;lt;/a&amp;gt; , are missing as well on 32-bit, and are not likely to be implemented, either due to lack of support in the architecture, or because of the complexity of the 32-bit memory management code, which still supports all of the different architecture revisions dating back to the initial Linux port running on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Risc_PC&amp;#34;&amp;gt;Risc PC&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Keeping the 32-bit ARM kernel secure There are cases, though, where using the 32-bit kernel is the only option, e.g., if the CPUs are in fact 32-bit only (which is the case even for some ARMv8 cores such as Cortex-A32), or when relying on an existing 32-bit only codebase running in the kernel (drivers for legacy peripherals). Note that in such cases, it still makes sense to use the most recent kernel version compatible with the hardware, since we are in fact making an effort to enable some of the existing hardening features on 32-bit ARM as well.&amp;lt;br&amp;gt;
THREAD_INFO_IN_TASK for v7 SMP cores&amp;lt;br&amp;gt;
The v5.16 release of the Linux kernel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=18ed1c01a7dd3d7c780b06a49124da237a4c1790&amp;#34;&amp;gt;implements&amp;lt;/a&amp;gt; support for THREAD_INFO_IN_TASK when running on ARMv7 SMP systems. This protects the kernel&amp;amp;#39;s per-task bookkeeping (called thread_info), which lives on the far (and normally unused) end of the stack, against stack overflows which may occur in rare -yet sometimes exploitable- cases where the control flow of the program simply ends up accumulating more state than the stack can hold. (Note that a stack overflow is not the same as a stack buffer overflow, where the overflow happens in the opposite direction.)&amp;lt;br&amp;gt;
By moving thread_info off the stack and into the kernel heap, and by using a special SMP CPU register to keep track of its location, we can mitigate the risk of stack overflows resulting in thread_info corruption. However, it does not prevent stack overflows themselves: these may still occur, and result in corruption of other data structures that happen to be adjacent to the task stack in memory.&amp;lt;br&amp;gt;
THREAD_INFO_IN_TASK for other cores&amp;lt;br&amp;gt;
For CPUs that lack this special SMP CPU register, we also proposed an implementation of THREAD_INFO_IN_TASK that is expected to land in v5.18. Instead of a special register, it uses a global variable to keep track of the location of thread_info.&amp;lt;br&amp;gt;
VMAP_STACK support&amp;lt;br&amp;gt;
Preventing stack overflows from corrupting unrelated memory contents is the goal of VMAP_STACK, which we are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/linux-arm-kernel/20211122092816.2865873-1-ardb@kernel.org/&amp;#34;&amp;gt;enabling for 32-bit ARM&amp;lt;/a&amp;gt; as well. When VMAP_STACK is enabled, kernel mode stacks are allocated from the kernel heap as before, but mapped into a different part of the kernel&amp;amp;#39;s address space, and surrounded by guard regions, which are guaranteed to be kept unpopulated. Given that accesses to such unpopulated regions will trigger an exception, the kernel&amp;amp;#39;s memory management layer can step in and terminate the program as soon as a stack overflow occurs, and prevent it from causing memory corruption.&amp;lt;br&amp;gt;
Support for IRQ stacks Coming up with a bounded worst case on which to base the size of the kernel stack is rather hard, especially given the fact that it is shared between the program itself and any exception handling routines that may be called on its behalf, including interrupt handlers. To mitigate the risk of a pathological worst case occurring, where an interrupt fires that needs a lot of stack space right at a time when most of the stack is already being used by the program, we are also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/linux-arm-kernel/20211115084732.3704393-1-ardb@kernel.org/&amp;#34;&amp;gt;enabling IRQ_STACKS for 32-bit ARM&amp;lt;/a&amp;gt; , which will run handlers of both hard and soft interrupts from a dedicated stack, one for each CPU. By decoupling the task and interrupt contexts like this, the likelihood that a well-behaved program needs to be terminated due to stack overflow should be all but eliminated.&amp;lt;br&amp;gt;
Conclusion With &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/linux-arm-kernel/20211208092611.1012773-1-ardb@kernel.org/&amp;#34;&amp;gt;these changes&amp;lt;/a&amp;gt; in place, kernel stack overflow protection will be available for all ARM systems supported by Linux, including ancient ones like the Risc PC or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/linux-arm-kernel/874k7pn923.wl-maz@kernel.org/&amp;#34;&amp;gt;Netwinder&amp;lt;/a&amp;gt; , provided that it runs a Linux distribution that is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html&amp;#34;&amp;gt;keeping up with the times.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
However, relying on legacy hardware and software comes with a risk, and even though we try to help keep users of the 32-bit kernel as safe as we reasonably can, it is not the right choice for new designs that incorporate 64-bit capable hardware.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220223-081921/</link>
      <pubDate>Wed, 23 Feb 2022 08:19:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220223-081921/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/02/20/math-combinatorics-multiset/&amp;#34;&amp;gt;Math.Combinatorics.Multiset&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220223-041945/</link>
      <pubDate>Wed, 23 Feb 2022 04:19:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220223-041945/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/01/30/fad-diets-are-like-burrito-tutorials/&amp;#34;&amp;gt;Fad diets are like burrito tutorials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/06/29/2009-icfp-programming-contest-reflections/&amp;#34;&amp;gt;2009 ICFP programming contest reflections&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220223-001349/</link>
      <pubDate>Wed, 23 Feb 2022 00:13:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220223-001349/</guid>
      <description>Get Back&amp;lt;br&amp;gt;
Beatles documentary. I’m a pretty intense music geek and while I     gather there were some for whom this was Too Much Beatles, there was hardly a moment I wanted to look away.     I found the whole thing intense and feel like  sharing a few purely     musical take-aways: If you care about will-George-quit or the-meaning-of-Yoko drama, I got nothing for you &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/18/Get-Back&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220222-200606/</link>
      <pubDate>Tue, 22 Feb 2022 20:06:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220222-200606/</guid>
      <description>&amp;lt;p&amp;gt;The U.S. Internal Revenue Service (IRS) said Monday that taxpayers are no longer required to provide facial scans to create an account online at irs.gov. In lieu of providing biometric data, taxpayers can now opt for a live video interview with ID.me , the privately-held Virginia company that runs the agency’s identity proofing system. The IRS also said any biometric data already shared with ID.me would be permanently deleted over the next few weeks, and any biometric data provided for new signups will be destroyed after an account is created.&amp;lt;br&amp;gt;
“Taxpayers will have the option of verifying their identity during a live, virtual interview with agents; no biometric data – including facial recognition – will be required if taxpayers choose to authenticate their identity through a virtual interview,” the IRS said in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.irs.gov/newsroom/irs-statement-new-features-put-in-place-for-irs-online-account-registration-process-strengthened-to-ensure-privacy-and-security&amp;#34;&amp;gt;a Feb. 21 statement&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“Taxpayers will still have the option to verify their identity automatically through the use of biometric verification through ID.me’s self-assistance tool if they choose,” the IRS explained. “For taxpayers who select this option, new requirements are in place to ensure images provided by taxpayers are deleted for the account being created. Any existing biometric data from taxpayers who previously created an IRS Online Account that has already been collected will also be permanently deleted over the course of the next few weeks.”&amp;lt;br&amp;gt;
In addition, the IRS said it planned to roll out Login.gov as an authentication tool for those seeking access to their tax records online. Login.gov is a single sign-on solution already used to access 200 websites run by 28 federal agencies.&amp;lt;br&amp;gt;
“The General Services Administration is currently working with the IRS to achieve the security standards and scale required of Login.Gov, with the goal of moving toward introducing this option after the 2022 filing deadline,” the agency wrote. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/irs-selfies-now-optional-biometric-data-to-be-deleted/#more-58627&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Missouri Governor Mike Parson made headlines last year when he &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/&amp;#34;&amp;gt;vowed to criminally prosecute a journalist&amp;lt;/a&amp;gt; for reporting a security flaw in a state website that exposed personal information of more than 100,000 teachers. But Missouri prosecutors now say they will not pursue charges following revelations that the data had been exposed since 2011 — two years after responsibility for securing the state’s IT systems was centralized within Parson’s own Office of Administration.&amp;lt;br&amp;gt;
In October 2021, St. Louis Post-Dispatch reporter &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.stltoday.com/users/profile/jrenaud&amp;#34;&amp;gt;Josh Renaud&amp;lt;/a&amp;gt; alerted Missouri education department officials that their website was exposing the Social Security numbers of more than 100,000 primary and secondary teachers in the state. Renaud found teachers’ SSNs were accessible in the HTML source code of some Missouri education department webpages.&amp;lt;br&amp;gt;
After confirming that state IT officials had secured the exposed teacher data, the Post-Dispatch &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.stltoday.com/news/local/education/missouri-teachers-social-security-numbers-at-risk-on-state-agencys-website/article_f3339700-ece0-54a1-9a45-f300321b7c82.html&amp;#34;&amp;gt;ran a story about their findings&amp;lt;/a&amp;gt; . Gov. Parson responded by holding a press conference in which he vowed his administration would seek to prosecute and investigate “the hackers” and anyone who aided the publication in its “attempt to embarrass the state and sell headlines for their news outlet.”&amp;lt;br&amp;gt;
“The state is committed to bringing to justice anyone who hacked our systems or anyone who aided them to do so,” Parson said in October. “A hacker is someone who gains unauthorized access to information or content. This individual did not have permission to do what they did. They had no authorization to convert or decode, so this was clearly a hack.”&amp;lt;br&amp;gt;
Parson tasked the Missouri Highway Patrol to produce a report on their investigation into “the hackers.”  On Monday, Feb. 21, The Post-Dispatch published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://s3.documentcloud.org/documents/21271820/redacted-information-for-sunshine-request.pdf&amp;#34;&amp;gt;the 158-page report&amp;lt;/a&amp;gt; (PDF), which concluded after 175 hours of investigation that Renaud did nothing wrong and only accessed information that was publicly available.&amp;lt;br&amp;gt;
Emails later obtained by the Post-Dispatch showed that the FBI told state cybersecurity officials that there was “not an actual network intrusion” and the state database was “misconfigured.” The emails also revealed the proposed message when education department leaders initially prepared to respond in October:&amp;lt;br&amp;gt;
“We are grateful to the member of the media who brought this to the state’s attention,” was the proposed quote attributed to the state’s education commissioner before Parson began shooting the messenger. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/report-missouri-governors-office-responsible-for-teacher-data-leak/#more-58607&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/irs-selfies-now-optional-biometric-data-to-be-deleted/&amp;#34;&amp;gt;IRS: Selfies Now Optional, Biometric Data to Be Deleted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/report-missouri-governors-office-responsible-for-teacher-data-leak/&amp;#34;&amp;gt;Report: Missouri Governor’s Office Responsible for Teacher Data Leak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220221-200649/</link>
      <pubDate>Mon, 21 Feb 2022 20:06:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220221-200649/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/find-go-to-activities-that-arent-scrolling-or-watching&amp;#34;&amp;gt;Find go-to activities that aren&amp;#39;t scrolling or watching&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/abstinence-isnt-recovery&amp;#34;&amp;gt;Abstinence isn’t recovery&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-go-back-to-things-you-used-to-be-addicted-to-in-the-past&amp;#34;&amp;gt;How to go back to things you used to be addicted to in the past&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220221-001353/</link>
      <pubDate>Mon, 21 Feb 2022 00:13:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220221-001353/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
From the “committing to the bit” department, I present: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/wordle-clone/birdle/&amp;#34;&amp;gt;Birdle&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220220-201909/</link>
      <pubDate>Sun, 20 Feb 2022 20:19:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220220-201909/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/08/28/creating-documents-with-embedded-diagrams/&amp;#34;&amp;gt;Creating documents with embedded diagrams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220220-161948/</link>
      <pubDate>Sun, 20 Feb 2022 16:19:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220220-161948/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2011/05/17/announcing-diagrams-preview-release/&amp;#34;&amp;gt;Announcing diagrams preview release&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220219-161836/</link>
      <pubDate>Sat, 19 Feb 2022 16:18:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220219-161836/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/07/07/new-haxr-release/&amp;#34;&amp;gt;New haxr release&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220219-161734/</link>
      <pubDate>Sat, 19 Feb 2022 16:17:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220219-161734/</guid>
      <description>February 19, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/02/19/Plaid-is-an-evil-nightmare-product.html&amp;#34;&amp;gt;Plaid is an evil nightmare product from Security Hell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220219-081121/</link>
      <pubDate>Sat, 19 Feb 2022 08:11:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220219-081121/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HXRnlcGyQx&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HXRnlcGyQx&amp;#34;&amp;gt;https://t.co/HXRnlcGyQx&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/nE211Iyu8t&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/nE211Iyu8t&amp;#34;&amp;gt;https://t.co/nE211Iyu8t&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220219-080832/</link>
      <pubDate>Sat, 19 Feb 2022 08:08:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220219-080832/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-markdown-component-the-easy-way-to-create-rich-text/&amp;#34;&amp;gt;React-markdown is a React component that safely renders Markdown into HTML. It lets you create rich content without having to worry about all the formatting and code placement. In this blog post, we explore how react-markdown works and why you should start using it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220219-041205/</link>
      <pubDate>Sat, 19 Feb 2022 04:12:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220219-041205/</guid>
      <description>Friday night AMA &amp;amp;ndash; ask me anything!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220218-201626/</link>
      <pubDate>Fri, 18 Feb 2022 20:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220218-201626/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104285199/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$9,900 JetSurf Race TITANIUM EFI Board 2020&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104293116/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$80,298 2015 BMW i8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays - Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20220218-201402/</link>
      <pubDate>Fri, 18 Feb 2022 20:14:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20220218-201402/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/how-on-earth/&amp;#34;&amp;gt;How on earth I became an entrepreneur&amp;lt;/a&amp;gt; : 2022&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220218-201153/</link>
      <pubDate>Fri, 18 Feb 2022 20:11:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220218-201153/</guid>
      <description>&amp;amp;quot;The manager of a fruit-and-vegetable shop places in his window the slogan: &amp;#39;Workers of the world, unite!&amp;#39; Why does he do it? What is he trying to communicate to the world? Is he genuinely enthusiastic about the idea of unity among the workers of the world?&amp;amp;quot;&amp;lt;br&amp;gt;
Interpretation: Essentially everything happening around us is an Availability Cascade, sparked by one or more Availability Entrepreneurs. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MeN5vNltnz&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MeN5vNltnz&amp;#34;&amp;gt;https://t.co/MeN5vNltnz&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220218-041557/</link>
      <pubDate>Fri, 18 Feb 2022 04:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220218-041557/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-el-salvadors-wild-bitcoin-experiment&amp;#34;&amp;gt;Why El Salvador’s Wild Bitcoin Experiment Just Might Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-el-salvadors-wild-bitcoin-experiment&amp;#34;&amp;gt;Last fall, El Salvador made Bitcoin legal tender. Here’s what it looks like on the ground.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220218-041117/</link>
      <pubDate>Fri, 18 Feb 2022 04:11:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220218-041117/</guid>
      <description>Interpretation: History can only move forward. History cannot move backward, since you can&amp;#39;t remove the information and experience that caused the change from how things were before. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/UWcj6EYI7e&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/UWcj6EYI7e&amp;#34;&amp;gt;https://t.co/UWcj6EYI7e&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“There is no question of returning to the pre-1968 situation, if only for the reason that the pre-1968 situation included the conditions that led to 1968.” —Valéry Giscard d’Estaing HT @bgmasters&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220218-001739/</link>
      <pubDate>Fri, 18 Feb 2022 00:17:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220218-001739/</guid>
      <description>February 17, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2022/02/17/tar-is-good-actually.gmi&amp;#34;&amp;gt;tar is good actually&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220218-001516/</link>
      <pubDate>Fri, 18 Feb 2022 00:15:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220218-001516/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00469-w&amp;#34;&amp;gt;A year on Mars: How NASA’s Perseverance hit a geological jackpot&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The rover collected exciting rock samples on the first leg of its epic journey. Next, it will turn towards an ancient river delta to look for past life.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220218-001132/</link>
      <pubDate>Fri, 18 Feb 2022 00:11:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220218-001132/</guid>
      <description>&amp;amp;quot;’Tis better to have tweeted and deleted, than never to have tweeted at all.&amp;amp;quot; &amp;amp;ndash;Alfred Lord Tennyson&amp;lt;br&amp;gt;
But those beliefs of six years ago did not anticipate all the changes of the last six years. So they were, nearly across the board, wrong? Many things are clearer now, aren&amp;#39;t they? @BretWeinstein &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/4ydfr8J9eX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/4ydfr8J9eX&amp;#34;&amp;gt;https://t.co/4ydfr8J9eX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Andreessen&amp;#39;s Corollary to Buffett&amp;#39;s Principle: It&amp;#39;s virtually impossible to insulate your thoughts and behavior from the super-contagious emotions that swirl about the marketplace. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/P3Bh8Q9oSv&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/P3Bh8Q9oSv&amp;#34;&amp;gt;https://t.co/P3Bh8Q9oSv&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220217-201725/</link>
      <pubDate>Thu, 17 Feb 2022 20:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220217-201725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/17/arts/music/spotify-joe-rogan-misinformation.html&amp;#34;&amp;gt;Spotify Bet Big on Joe Rogan. It Got More Than It Counted On. The deal that brought his podcast to Spotify is said to be worth over $200 million, more than was previously known. Accusations that he spreads misinformation have roiled the company. By Katherine Rosman, Ben Sisario, Mike Isaac and Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220217-161853/</link>
      <pubDate>Thu, 17 Feb 2022 16:18:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220217-161853/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2014/05/13/unique-isomorphism-and-generalized-the/&amp;#34;&amp;gt;Unique isomorphism and generalized &amp;amp;quot;the&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220217-161755/</link>
      <pubDate>Thu, 17 Feb 2022 16:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220217-161755/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/version-100-in-chrome-and-firefox/&amp;#34;&amp;gt;Version 100 in Chrome and Firefox →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220217-121053/</link>
      <pubDate>Thu, 17 Feb 2022 12:10:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220217-121053/</guid>
      <description>Democracy (via the Iron Law of Oligarchy) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/ud7SPBzQEi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/ud7SPBzQEi&amp;#34;&amp;gt;https://t.co/ud7SPBzQEi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Autonomy - Oligarchy - Monarchy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/RklckzSTT9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/RklckzSTT9&amp;#34;&amp;gt;https://t.co/RklckzSTT9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
TENET was a &amp;lt;em&amp;gt;great&amp;lt;/em&amp;gt; movie. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7VyUJDAJPy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7VyUJDAJPy&amp;#34;&amp;gt;https://t.co/7VyUJDAJPy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220217-081111/</link>
      <pubDate>Thu, 17 Feb 2022 08:11:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220217-081111/</guid>
      <description>&amp;amp;quot;Would it shock you to know that two people, one with the traits of Extreme-Altruism (X-Altruism) and the other the traits of a sociopath, could be related? Even siblings? And that their personality traits are very similar, with only a few features to distinguish them?&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220217-080815/</link>
      <pubDate>Thu, 17 Feb 2022 08:08:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220217-080815/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/supabase-tutorial-admin-panel/&amp;#34;&amp;gt;For this tutorial we are going to set up a Supabase user database and build an admin panel that allows us to create, read, update and delete the entries. We’ll display the data in a table, and use a panel on the right-hand side to tab between create and update forms, all in less than 20 minutes.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220217-041143/</link>
      <pubDate>Thu, 17 Feb 2022 04:11:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220217-041143/</guid>
      <description>&amp;amp;quot;Motion to rename &amp;#39;online advertising&amp;#39; to &amp;#39;small business customer discovery and economic growth technology&amp;#39;.&amp;amp;quot; &amp;amp;ndash;Aaron Levie @levie &amp;amp;ndash; credit where credit is due, that&amp;#39;s spot on.&amp;lt;br&amp;gt;
&amp;amp;quot;The world of the future. The world I want. A world of obedience and unity. A world where the thought of each man will not be his own, but an attempt to guess the thought of his neighbor, who&amp;#39;ll have no thought of his own but an attempt to guess&amp;amp;hellip;and so on, around the globe.&amp;amp;quot;&amp;lt;br&amp;gt;
Present day politics totally aside, everyone should read Junger&amp;#39;s 1997 post-apocalyptic science fiction novel &amp;amp;quot;Eumeswil&amp;amp;quot;&amp;amp;ndash;how to preserve one&amp;#39;s soul under tyranny, a subject Junger knew well. It will stay with you. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/BWn1a3DVfG&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/BWn1a3DVfG&amp;#34;&amp;gt;https://t.co/BWn1a3DVfG&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/KEilXznpwD&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/KEilXznpwD&amp;#34;&amp;gt;https://t.co/KEilXznpwD&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220217-002216/</link>
      <pubDate>Thu, 17 Feb 2022 00:22:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220217-002216/</guid>
      <description>In a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/02/victory-irs-wont-require-facial-recognition-idme&amp;#34;&amp;gt;victory for privacy and security,&amp;lt;/a&amp;gt; the Internal Revenue Service &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/07/us/politics/irs-idme-facial-recognition.html&amp;#34;&amp;gt;reversed course&amp;lt;/a&amp;gt; from its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2022/01/27/irs-face-scans/&amp;#34;&amp;gt;recent announcement&amp;lt;/a&amp;gt; that it was partnering with ID.me, a third-party identity verification service, to use facial recognition for verification of users managing many aspects of their taxes online. Importantly, this change only&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220217-000614/</link>
      <pubDate>Thu, 17 Feb 2022 00:06:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220217-000614/</guid>
      <description>Update, 2:00 p.m., ET: The ICRC just published an update to its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.icrc.org/en/document/cyber-attack-icrc-what-we-know&amp;#34;&amp;gt;FAQ on the breach&amp;lt;/a&amp;gt; . The ICRC now says the hackers broke in on Nov. 9, 2021, using an unpatched critical vulnerability (CVE-2021-40539). “This vulnerability allows malicious cyber actors to place web shells and conduct post-exploitation activities such as compromising administrator credentials, conducting lateral movement, and exfiltrating registry hives and Active Directory files. Once inside our network, the hackers were able to deploy offensive security tools which allowed them to disguise themselves as legitimate users or administrators. This in turn allowed them to access the data, despite this data being encrypted.”&amp;lt;br&amp;gt;
Original story:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220216-201541/</link>
      <pubDate>Wed, 16 Feb 2022 20:15:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220216-201541/</guid>
      <description>© 2022 Alex Kantrowitz&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/privacy&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt; ∙ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/tos&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt; ∙ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/ccpa#personal-data-collected&amp;#34;&amp;gt;Collection notice&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com&amp;#34;&amp;gt;Substack&amp;lt;/a&amp;gt; is the home for great writing&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220216-201508/</link>
      <pubDate>Wed, 16 Feb 2022 20:15:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220216-201508/</guid>
      <description>Sort by:&amp;lt;br&amp;gt;
Relevance&amp;lt;br&amp;gt;
Date published (new to old)&amp;lt;br&amp;gt;
Date published (old to new)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220216-201134/</link>
      <pubDate>Wed, 16 Feb 2022 20:11:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220216-201134/</guid>
      <description>&amp;amp;quot;Vaguely redpilled.&amp;amp;quot; &amp;amp;ndash;@vgr&amp;lt;br&amp;gt;
Wednesday energy. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/40vT2B6W0k&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/40vT2B6W0k&amp;#34;&amp;gt;https://t.co/40vT2B6W0k&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220216-200558/</link>
      <pubDate>Wed, 16 Feb 2022 20:05:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220216-200558/</guid>
      <description>A network intrusion at the International Committee for the Red Cross (ICRC) in January led to the theft of personal information on more than 500,000 people receiving assistance from the group. KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to register multiple domain names the FBI says are tied to a sprawling media influence operation originating from Iran.&amp;lt;br&amp;gt;
On Jan. 19, the ICRC disclosed the compromise of servers hosting the personal information of more than 500,000 people receiving services from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/International_Red_Cross_and_Red_Crescent_Movement&amp;#34;&amp;gt;Red Cross and Red Crescent Movement&amp;lt;/a&amp;gt; . The ICRC said the hacked servers contained data relating to the organization’s Restoring Family Links services, which works to reconnect people separated by war, violence, migration and other causes.&amp;lt;br&amp;gt;
The same day the ICRC went public with its breach, someone using the nickname “ Sheriff ” on the English-language cybercrime forum RaidForums advertised the sale of data from the Red Cross and Red Crescent Movement. Sheriff’s sales thread suggests the ICRC was asked to pay a ransom to guarantee the data wouldn’t be leaked or sold online.&amp;lt;br&amp;gt;
“Mr. Mardini, your words have been heard,” Sheriff wrote, posting a link to the Twitter profile of ICRC General Director Robert Mardini and urging forum members to tell him to check his email. “Check your email and send a figure you can pay.”&amp;lt;br&amp;gt;
RaidForums member “unindicted” aka Sheriff selling access to the International Red Cross and Red Crescent Movement data. Image: Ke-la.com&amp;lt;br&amp;gt;
In their &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.icrc.org/en/document/cyber-attack-icrc-what-we-know&amp;#34;&amp;gt;online statement about the hack&amp;lt;/a&amp;gt; (updated on Feb. 7) the ICRC said it had not had any contact with the hackers, and no ransom demand had been made.&amp;lt;br&amp;gt;
“In line with our standing practice to engage with any actor who can facilitate or impede our humanitarian work, we are willing to communicate directly and confidentially with whoever may be responsible for this operation to impress upon them the need to respect our humanitarian action,” the ICRC statement reads.&amp;lt;br&amp;gt;
Asked to comment on Sheriff’s claims, the ICRC issued the following statement:&amp;lt;br&amp;gt;
“Right now, we do not have any conclusive evidence that this information from the data breach has been published or is being traded. Our cybersecurity team has looked into any reported allegation of data being available on the dark web.”&amp;lt;br&amp;gt;
The email address that Sheriff used to register at RaidForums — &amp;lt;a href=&amp;#34;mailto:kelvinmiddelkoop@hotmail.com&amp;#34;&amp;gt;kelvinmiddelkoop@hotmail.com&amp;lt;/a&amp;gt; — appears in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-ndca/press-release/file/1334571/download&amp;#34;&amp;gt;an affidavit for a search warrant filed by the FBI&amp;lt;/a&amp;gt; roughly a year ago. That FBI warrant came on the heels of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.mandiant.com/resources/report-suspected-iranian-influence-operation&amp;#34;&amp;gt;an investigation published by security firm FireEye&amp;lt;/a&amp;gt; , which examined an Iranian-based network of inauthentic news sites and social media accounts aimed at the United States., U.K. and other western audiences.&amp;lt;br&amp;gt;
“This operation is leveraging a network of inauthentic news sites and clusters of associated accounts across multiple social media platforms to promote political narratives in line with Iranian interests,” FireEye researchers wrote. “These narratives include anti-Saudi, anti-Israeli, and pro-Palestinian themes, as well as support for specific U.S. policies favorable to Iran.”&amp;lt;br&amp;gt;
The FBI says the domains registered by the email address tied to Sheriff’s RaidForums account were used in service of the Liberty Front Press, a network of phony news sites thought to originate from Iran.&amp;lt;br&amp;gt;
According to the FBI affidavit, the address &amp;lt;a href=&amp;#34;mailto:kelvinmiddelkoop@hotmail.com&amp;#34;&amp;gt;kelvinmiddelkoop@hotmail.com&amp;lt;/a&amp;gt; was used to register at least three different domains for phony news sites, including awdnews[.]com, sachtimes[.]com, and whatsupic[.]com. A reverse WHOIS search on that email address at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.domaintools.com&amp;#34;&amp;gt;DomainTools.com&amp;lt;/a&amp;gt; (an advertiser on this site) shows it was used to register 17 domains between 2012 and 2021, including moslimyouthmedia[.]com, moslempress[.]com, and realneinovosti[.]net. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/red-cross-hack-linked-to-iranian-influence-operation/#more-58533&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/red-cross-hack-linked-to-iranian-influence-operation/&amp;#34;&amp;gt;Red Cross Hack Linked to Iranian Influence Operation?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220216-121720/</link>
      <pubDate>Wed, 16 Feb 2022 12:17:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220216-121720/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290152/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$49,000 1967 Chevrolet Impala&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104288058/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$300 DJI Drone Mavic 2 pro Flying Foldable Drone With HD Camera A&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220216-121211/</link>
      <pubDate>Wed, 16 Feb 2022 12:12:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220216-121211/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Ak7hQ4owON&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Ak7hQ4owON&amp;#34;&amp;gt;https://t.co/Ak7hQ4owON&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/QFmUAjHIiB&amp;#34;&amp;gt;https://t.co/QFmUAjHIiB&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/ScNgrCT214&amp;#34;&amp;gt;https://t.co/ScNgrCT214&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20220216-120823/</link>
      <pubDate>Wed, 16 Feb 2022 12:08:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20220216-120823/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/otr4&amp;#34;&amp;gt;Off-The-Record Messaging part 4: key insights&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/otr3&amp;#34;&amp;gt;Off-The-Record Messaging part 3: how OTR works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/otr2&amp;#34;&amp;gt;Off-The-Record Messaging part 2: deniability and forward secrecy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/otr1&amp;#34;&amp;gt;Off-The-Record Messaging part 1: the problem with PGP&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220216-081150/</link>
      <pubDate>Wed, 16 Feb 2022 08:11:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220216-081150/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/8ypBz5NISr&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/8ypBz5NISr&amp;#34;&amp;gt;https://t.co/8ypBz5NISr&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/wVxzFM8nuf&amp;#34;&amp;gt;https://t.co/wVxzFM8nuf&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7WWzxjBQq8&amp;#34;&amp;gt;https://t.co/7WWzxjBQq8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220216-001841/</link>
      <pubDate>Wed, 16 Feb 2022 00:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220216-001841/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/15/technology/metamates-meta-facebook.html&amp;#34;&amp;gt;Out With the Facebookers. In With the Metamates. Now that Facebook has renamed itself Meta, that’s what employees will be known as, the company said. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220216-001345/</link>
      <pubDate>Wed, 16 Feb 2022 00:13:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220216-001345/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/08/Crocuses&amp;#34;&amp;gt;2022 Crocuses&amp;lt;/a&amp;gt; · It is an annual tradition on this blog to celebrate the early-spring arrival, in our front yard, of the first     crocuses. Winters suck everywhere in Canada and while Vancouver’s don’t freeze your ass they do subtract light from life for way     too many months. Thus, giving the little purple fellas a hearty greeting is therapeutic.  With notes on photography and dead     leaves &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/02/08/Crocuses&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220216-001202/</link>
      <pubDate>Wed, 16 Feb 2022 00:12:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220216-001202/</guid>
      <description>&amp;amp;quot;The soul is that which can&amp;#39;t be ruled. It must be broken. Drive a wedge in, get your fingers on it&amp;amp;ndash;and the man is yours. You won&amp;#39;t need a whip&amp;amp;ndash;he&amp;#39;ll bring it to you and ask to be whipped. Set him in reverse&amp;amp;ndash;and his own mechanism will do your work for you.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/L681l9iRLc&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/L681l9iRLc&amp;#34;&amp;gt;https://t.co/L681l9iRLc&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Overheard in Silicon Valley: &amp;amp;#34;Ayn Rand&amp;amp;#39;s heroes are fake, but her villains are real.&amp;amp;#34;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220215-201820/</link>
      <pubDate>Tue, 15 Feb 2022 20:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220215-201820/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/version-100-in-chrome-and-firefox/&amp;#34;&amp;gt;Version 100 in Chrome and Firefox&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Chrome and Firefox will reach version 100 in a couple of months. This has the potential to cause breakage on sites that rely on identifying the browser version to perform business logic.  This post covers the timeline of events, the strategies that Chrome and Firefox are taking to mitigate the impact, and how you can help.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220215-081206/</link>
      <pubDate>Tue, 15 Feb 2022 08:12:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220215-081206/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/LTgfJcb674&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/LTgfJcb674&amp;#34;&amp;gt;https://t.co/LTgfJcb674&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/k32r6bYb3H&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/k32r6bYb3H&amp;#34;&amp;gt;https://t.co/k32r6bYb3H&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MgmvHHRTP2&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MgmvHHRTP2&amp;#34;&amp;gt;https://t.co/MgmvHHRTP2&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/gvY2qgjRrb&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/gvY2qgjRrb&amp;#34;&amp;gt;https://t.co/gvY2qgjRrb&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220215-041631/</link>
      <pubDate>Tue, 15 Feb 2022 04:16:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220215-041631/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/&amp;#34;&amp;gt;New&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/&amp;#34;&amp;gt;Top&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220215-041151/</link>
      <pubDate>Tue, 15 Feb 2022 04:11:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220215-041151/</guid>
      <description>&amp;amp;quot;A Breastplate of Righteousness is &amp;#39;a protective shield of [fake] superpropriety with a shining quality, blinding [surrounding people to certain of the wearer’s practices&amp;#39;.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220214-231744/</link>
      <pubDate>Mon, 14 Feb 2022 23:17:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220214-231744/</guid>
      <description>Log in&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/&amp;#34;&amp;gt;Home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More&amp;lt;br&amp;gt;
return ;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220214-231256/</link>
      <pubDate>Mon, 14 Feb 2022 23:12:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220214-231256/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/KEEQEddZpw&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/KEEQEddZpw&amp;#34;&amp;gt;https://t.co/KEEQEddZpw&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/sKZROCjVal&amp;#34;&amp;gt;https://t.co/sKZROCjVal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/PMQaoclT4n&amp;#34;&amp;gt;https://t.co/PMQaoclT4n&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220214-201538/</link>
      <pubDate>Mon, 14 Feb 2022 20:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220214-201538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/14/technology/texas-facebook-facial-recognition-lawsuit.html&amp;#34;&amp;gt;Texas sues Facebook’s parent, saying it collected facial recognition data without consent. The state’s attorney general said the company repeatedly captured and commercialized biometric data in photos and videos for more than a decade without users’ permission. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220214-201347/</link>
      <pubDate>Mon, 14 Feb 2022 20:13:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220214-201347/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/02/roses-are-red-violets-are-blue-giving.html&amp;#34;&amp;gt;🌹 Roses are red, Violets are blue 💙 Giving leets 🧑‍💻 more sweets 🍭 All of 2022!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Eduardo Vela, Vulnerability Matchmaker&amp;lt;br&amp;gt;
Until December 31 2022 we will pay 20,000 to 91,337 USD for exploits of vulnerabilities in the Linux Kernel, Kubernetes, GKE or kCTF that are exploitable on our test lab. We launched an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html&amp;#34;&amp;gt;expansion&amp;lt;/a&amp;gt; of kCTF VRP on November 1, 2021 in which we paid 31,337 to 50,337 USD to those that are able to compromise our kCTF cluster and obtain a flag. We increased our rewards because we recognized that in order to attract the attention of the community we needed to match our rewards to their expectations. We consider the expansion to have been a success, and because of that we would like to extend it even further to at least until the end of the year (2022). During the last three months, we received 9 submissions and paid over 175,000 USD so far. The submissions included five 0days and two 1days. Three of these are already fixed and are public: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://access.redhat.com/security/cve/cve-2021-4154&amp;#34;&amp;gt;CVE-2021-4154&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ubuntu.com/security/CVE-2021-22600&amp;#34;&amp;gt;CVE-2021-22600&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755&amp;#34;&amp;gt;patch&amp;lt;/a&amp;gt; ) and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ubuntu.com/security/CVE-2022-0185&amp;#34;&amp;gt;CVE-2022-0185&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.willsroot.io/2022/01/cve-2022-0185.html&amp;#34;&amp;gt;writeup&amp;lt;/a&amp;gt; ). These three bugs were first found by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://syzkaller.appspot.com/upstream&amp;#34;&amp;gt;Syzkaller&amp;lt;/a&amp;gt; , and two of them had already been fixed on the mainline and stable versions of the Linux Kernel at the time they were reported to us. Based on our experience these last 3 months, we made a few improvements to the submission process:&amp;lt;br&amp;gt;
Reporting a 0day will not require including a flag at first. We heard some concerns from participants that exploiting a 0day in the shared cluster could leak it to other participants. As such, we will only ask for the exploit checksum (but you still have to exploit the bug and submit the flag within a week after the patch is merged on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kernel.googlesource.com/pub/scm/linux/kernel/git/torvalds/linux&amp;#34;&amp;gt;mainline&amp;lt;/a&amp;gt; ). Please make sure that your exploit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/container-optimized-os/docs/concepts/security#security-hardened_kernel&amp;#34;&amp;gt;works on COS&amp;lt;/a&amp;gt; with minimal modifications (test it on your own &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/google-ctf/tree/master/vrp&amp;#34;&amp;gt;kCTF cluster&amp;lt;/a&amp;gt; ), as some common exploit primitives (like eBPF and userfaultfd) might not be available.&amp;lt;br&amp;gt;
Reporting a 1day will require including a link to the patch. We will automatically publish the patches of all submissions if the flag is valid. We also encourage you all to include a link to a Syzkaller dashboard report if applicable in order to help reduce duplicate submissions and so you can see which bugs were exploited already.&amp;lt;br&amp;gt;
You will be able to submit the exploit in the same form you submit the flag. If you had submitted an exploit checksum for a 0day, please make sure that you include the original exploit as well as the final exploit and make sure to submit it within a week after the patch is merged on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kernel.googlesource.com/pub/scm/linux/kernel/git/torvalds/linux&amp;#34;&amp;gt;mainline&amp;lt;/a&amp;gt; . The original exploit shouldn&amp;amp;#39;t require major modifications to work. Note that we need to be able to understand your exploit, so please add comments to explain what it is doing.&amp;lt;br&amp;gt;
We are now running two clusters, one on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/release-notes-regular&amp;#34;&amp;gt;REGULAR&amp;lt;/a&amp;gt; release channel and another one on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/release-notes-rapid&amp;#34;&amp;gt;RAPID&amp;lt;/a&amp;gt; release channel. This should provide more flexibility whenever a vulnerability is only exploitable on modern versions of the Linux Kernel or Kubernetes.&amp;lt;br&amp;gt;
We are also changing the reward structure slightly. Going forward the rewards will be:&amp;lt;br&amp;gt;
31,337 USD to the first valid exploit submission for a given vulnerability. This will only be paid once per vulnerability and only once per cluster version/build (available at /etc/node-os-release).&amp;lt;br&amp;gt;
0 USD for exploits for duplicate exploits for the same vulnerability. The bonuses below might still apply.&amp;lt;br&amp;gt;
Bonuses&amp;lt;br&amp;gt;
20,000 USD for exploits for 0day vulnerabilities. This will only be paid once per vulnerability to the first valid exploit submission.&amp;lt;br&amp;gt;
To submit 0days, please test your exploit (we recommend to test it on your own kCTF cluster to avoid leaking it to other participants), make a checksum and send the checksum to us. Within a week after the vulnerability is fixed on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kernel.googlesource.com/pub/scm/linux/kernel/git/torvalds/linux&amp;#34;&amp;gt;mainline&amp;lt;/a&amp;gt; , submit the form as a 1day and include the exploit of which you sent a checksum to us.&amp;lt;br&amp;gt;
20,000 USD for exploits for vulnerabilities that do not require unprivileged user namespaces (CLONE_NEWUSER). This will only be paid once per vulnerability to the first valid exploit submission.&amp;lt;br&amp;gt;
Our test lab allows unprivileged user namespaces, so we will manually check the exploits to check if they work without unprivileged user namespaces when deciding whether to issue the bonus. We decided to issue additional rewards for exploits that do not require unprivileged user namespaces because containers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moby/moby/blob/3c06ebd876687555fdf030a3307a66908c4fa57c/profiles/seccomp/default_linux.go#L576&amp;#34;&amp;gt;default seccomp policy&amp;lt;/a&amp;gt; does not allow the use of unprivileged user namespaces on containers that are run without CAP_SYS_ADMIN. This feature is now &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/docs/tutorials/security/seccomp/&amp;#34;&amp;gt;available&amp;lt;/a&amp;gt; on Kubernetes and all nodes running on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/autopilot-overview#container_isolation&amp;#34;&amp;gt;GKE Autopilot&amp;lt;/a&amp;gt; have it enabled by default.&amp;lt;br&amp;gt;
20,000 USD for exploits using novel exploit techniques. This is a bonus in addition to the base rewards (applies for duplicate exploits). To qualify for this additional reward please send us a write-up explaining it.&amp;lt;br&amp;gt;
An example of something considered as a novel technique could be the exploitation of previously unknown objects to transform a limited primitive into a more powerful one, such as an arbitrary/out-of-bounds read/write or arbitrary free. For example, in all our submissions, researchers leveraged message queues to achieve kernel information leaks. We are looking for similarly powerful techniques that allow heap exploits to be “plugged in” and immediately allow kernel access. Another example is bypassing a common security mitigation or a technique for exploiting a class of vulnerabilities more reliably.&amp;lt;br&amp;gt;
These changes increase some 1day exploits to 71,337 USD (up from 31,337 USD), and makes it so that the maximum reward for a single exploit is 91,337 USD (up from 50,337 USD). We also are going to pay even for duplicates at least 20,000 USD if they demonstrate novel exploit techniques (up from 0 USD). However, we will also limit the number of rewards for 1days to only one per version/build. There are 12-18 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/release-notes&amp;#34;&amp;gt;GKE releases&amp;lt;/a&amp;gt; per year on each channel, and we have two clusters on different channels, so we will pay the 31,337 USD base rewards up to 36 times (no limit for the bonuses). While we don&amp;amp;#39;t expect every upgrade to have a valid 1day submission, we would love to learn otherwise. You can find the flag submission status for our clusters (and their versions) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/kctf/vrp#notes&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . We look forward to hearing from you, and continue to strengthen our shared ecosystem. If you are interested to participate but don&amp;amp;#39;t know where to start, Arizona State University has a free public Kernel Exploitation workshop at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dojo.pwn.college/challenges/kernel&amp;#34;&amp;gt;https://dojo.pwn.college/challenges/kernel&amp;lt;/a&amp;gt; as part of an overall memory corruption course and you can find a community-maintained list of past Linux Kernel vulnerabilities, exploits and writeups curated by Andrey Konovalov at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/xairy/linux-kernel-exploitation&amp;#34;&amp;gt;https://github.com/xairy/linux-kernel-exploitation&amp;lt;/a&amp;gt; . This is part of our Vulnerability Reward Program, which we&amp;amp;#39;ve been running for over 10 years, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/6625378258649088&amp;#34;&amp;gt;the rules&amp;lt;/a&amp;gt; include some more information. Same as with our other rewards, we will double them if they are donated to charity, and submitters will be included on our site at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://bughunters.google.com/&amp;#34;&amp;gt;bughunters.google.com&amp;lt;/a&amp;gt; . If you are ready to submit something, please read the instructions on our site &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/kctf/vrp&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; and if you have any other questions please contact us &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.gg/V8UqnZ6JBG&amp;#34;&amp;gt;on Discord&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220214-200600/</link>
      <pubDate>Mon, 14 Feb 2022 20:06:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220214-200600/</guid>
      <description>In January, KrebsOnSecurity examined clues left behind by “ Wazawaka ,” the hacker handle chosen by a major ransomware criminal in the Russian-speaking cybercrime scene. Wazawaka has since “lost his mind” according to his erstwhile colleagues, creating a Twitter account to drop exploit code for a widely-used virtual private networking (VPN) appliance, and publishing bizarre selfie videos taunting security researchers and journalists.&amp;lt;br&amp;gt;
Wazawaka, a.k.a. Mikhail P. Matveev, a.k.a. “Orange,” a.k.a. “Boriselcin,” showing off his missing ring finger.&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/&amp;#34;&amp;gt;last month’s story&amp;lt;/a&amp;gt; , we explored clues that led from Wazawaka’s multitude of monikers, email addresses, and passwords to a 30-something father in Abakan, Russia named Mikhail Pavlovich Matveev . This post concerns itself with the other half of Wazawaka’s identities not mentioned in the first story, such as how Wazawaka also ran the Babuk ransomware affiliate program, and later became “ Orange ,” the founder of the ransomware-focused Dark Web forum known as “ RAMP .”&amp;lt;br&amp;gt;
The same day the initial profile on Wazawaka was published here, someone registered the Twitter account “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/02/waza-twitter.png&amp;#34;&amp;gt;@fuck_maze&amp;lt;/a&amp;gt; ,” a possible reference to the now-defunct Maze Ransomware gang.&amp;lt;br&amp;gt;
The background photo for the @fuck_maze profile included a logo that read “Waka Waka;” the bio for the account took a swipe at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ddd1ms?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor&amp;#34;&amp;gt;Dmitry Smilyanets&amp;lt;/a&amp;gt; , a researcher and blogger for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://therecord.media&amp;#34;&amp;gt;The Record&amp;lt;/a&amp;gt; who was once part of a cybercrime group the Justice Department &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/pr/russian-national-admits-role-largest-known-data-breach-conspiracy-ever-prosecuted&amp;#34;&amp;gt;called&amp;lt;/a&amp;gt; the “largest known data breach conspiracy ever prosecuted.”&amp;lt;br&amp;gt;
The @fuck_maze account messaged me a few times on Twitter, but largely stayed silent until Jan. 25, when it tweeted three videos of a man who appeared identical to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/02/wazawaka-vk.png&amp;#34;&amp;gt;Matveev’s social media profile on Vkontakte&amp;lt;/a&amp;gt; (the Russian version of Facebook). The man seemed to be slurring his words quite a bit, and started by hurling obscenities at Smilyanets, journalist &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/campuscodi&amp;#34;&amp;gt;Catalin Cimpanu&amp;lt;/a&amp;gt; (also at The Record), and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/AShukuhi&amp;#34;&amp;gt;a security researcher from Cisco Talos&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
At the beginning of the videos, Matveev holds up his left hand to demonstrate that his ring finger is missing. This he smugly presents as evidence that he is indeed Wazawaka.&amp;lt;br&amp;gt;
The story goes that Wazwaka at one point made a bet wherein he wagered his finger, and upon losing the bet severed it himself. It’s unclear if that is the real story about how Wazawaka lost the ring finger on his left hand; his remaining fingers appear oddly crooked.&amp;lt;br&amp;gt;
“Hello Brian Krebs! You did a really great job actually, really well, fucking great — it’s great that journalism works so well in the US,” Matveev said in the video. “By the way, it is my voice in the background, I just love myself a lot.”&amp;lt;br&amp;gt;
In one of his three videos, Wazawaka says he’s going to release exploit code for a security vulnerability. Later that same day, the @fuck_maze account posted a link to a Pastebin-like site that included working exploit code for a recently patched security hole in SonicWall VPN appliances ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017&amp;#34;&amp;gt;CVE-2021-20028&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
When KrebsOnSecurity first started researching Wazawaka in 2021, it appeared this individual also used two other important nicknames on the Russian-speaking crime forums. One was Boriselcin , a particularly talkative and brash personality who was simultaneously the public persona of Babuk, a ransomware affiliate program that surfaced on New Year’s Eve 2020.&amp;lt;br&amp;gt;
The other handle that appeared tied to Wazawaka was “Orange,” the founder of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ke-la.com/new-russian-speaking-forum-a-new-place-for-raas/&amp;#34;&amp;gt;the RAMP ransomware forum&amp;lt;/a&amp;gt; . I just couldn’t convincingly connect those two identities with Wazawaka using the information available at the time. This post is an attempt to remedy that. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/wazawaka-goes-waka-waka/#more-58373&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/wazawaka-goes-waka-waka/&amp;#34;&amp;gt;Wazawaka Goes Waka Waka&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220214-081201/</link>
      <pubDate>Mon, 14 Feb 2022 08:12:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220214-081201/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/IbltkuDfQP&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/IbltkuDfQP&amp;#34;&amp;gt;https://t.co/IbltkuDfQP&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Q3udlwoFFD&amp;#34;&amp;gt;https://t.co/Q3udlwoFFD&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/58OngjCW1l&amp;#34;&amp;gt;https://t.co/58OngjCW1l&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220214-041208/</link>
      <pubDate>Mon, 14 Feb 2022 04:12:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220214-041208/</guid>
      <description>&amp;amp;quot;Preference Falsification is the act of communicating a preference that differs from one&amp;#39;s true preference. The public frequently [lies], especially to researchers or pollsters, because they believe the conveyed preference is more acceptable socially.&amp;amp;quot;&amp;lt;br&amp;gt;
Overheard in Silicon Valley: &amp;amp;quot;Be so scary, they make multiple Superbowl commercials trying to dismiss you.&amp;amp;quot;&amp;lt;br&amp;gt;
Overheard in Silicon Valley: &amp;amp;quot;Nobody&amp;#39;s right 100% of the time, but some people are perfect contrary indicators.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220213-121900/</link>
      <pubDate>Sun, 13 Feb 2022 12:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220213-121900/</guid>
      <description>February 13, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/02/13/Framing-accessibility-in-broader-terms.html&amp;#34;&amp;gt;Framing accessibility in broader terms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220213-041314/</link>
      <pubDate>Sun, 13 Feb 2022 04:13:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220213-041314/</guid>
      <description>&amp;amp;quot;In Greek mythology, Apollo and Dionysus are both sons of Zeus. Apollo is the god of the sun, of rational thinking and order, and appeals to logic, prudence and purity. Dionysus is the god of wine and dance, of irrationality and chaos, and appeals to emotions and instincts.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;I have little direct evidence about the atrocities in the Spanish Civil War. I know that some were committed by the Republicans [the left], and some by the Fascists [the right]&amp;amp;hellip; But atrocities are believed in or disbelieved in solely on grounds of political predilection.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20220213-011100/</link>
      <pubDate>Sun, 13 Feb 2022 01:11:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20220213-011100/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/words.html&amp;#34;&amp;gt;Putting Ideas into Words&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/goodtaste.html&amp;#34;&amp;gt;Taste&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/smart.html&amp;#34;&amp;gt;Smart&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/weird.html&amp;#34;&amp;gt;Weird&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220213-010933/</link>
      <pubDate>Sun, 13 Feb 2022 01:09:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220213-010933/</guid>
      <description>My Ph.D. is in Information Science from the University of Washington in Seattle, and my masters and undergraduate degrees are in Computer Science from the University of Illinois at Urbana-Champaign (UIUC). Before joining Brown, I analyzed search behavior at Microsoft Research, Google, Yahoo, and Bing; and co-founded World Blender, a Techstars-backed startup that made geolocation mobile games.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220212-161410/</link>
      <pubDate>Sat, 12 Feb 2022 16:14:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220212-161410/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html&amp;#34;&amp;gt;A walk through Project Zero metrics&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220212-081127/</link>
      <pubDate>Sat, 12 Feb 2022 08:11:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220212-081127/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/TgLE4nXwPh&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/TgLE4nXwPh&amp;#34;&amp;gt;https://t.co/TgLE4nXwPh&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/KdSrz1eLf7&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/KdSrz1eLf7&amp;#34;&amp;gt;https://t.co/KdSrz1eLf7&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220212-041222/</link>
      <pubDate>Sat, 12 Feb 2022 04:12:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220212-041222/</guid>
      <description>&amp;lt;p&amp;gt;Danegeld:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;It is always a temptation for a rich and lazy nation,
To puff and look important and to say:
&amp;#39;Though we know we should defeat you, we have not the time to meet you.
We will therefore pay you cash to go away.&amp;#39;&amp;amp;hellip;&amp;amp;quot;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220212-001302/</link>
      <pubDate>Sat, 12 Feb 2022 00:13:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220212-001302/</guid>
      <description>&amp;lt;p&amp;gt;New Twitter logo just dropped! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/9U7S538FSp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/9U7S538FSp&amp;#34;&amp;gt;https://t.co/9U7S538FSp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Overheard in Silicon Valley:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;Don&amp;#39;t need to dispose of nuclear waste if you don&amp;#39;t have any nuclear power.&amp;amp;quot;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220211-201925/</link>
      <pubDate>Fri, 11 Feb 2022 20:19:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220211-201925/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/11/science/webb-telescope-selfie-pictures.html&amp;#34;&amp;gt;James Webb Telescope Sends Home a Selfie and 18 Images of Starlight The spacecraft recorded a series of images of a target star that will be used to help its mirrors prepare for scientific research. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220211-121308/</link>
      <pubDate>Fri, 11 Feb 2022 12:13:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220211-121308/</guid>
      <description>The four American art forms are software, hip hop, memes, and stonks. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/8TQPLA765p&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/8TQPLA765p&amp;#34;&amp;gt;https://t.co/8TQPLA765p&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220211-081441/</link>
      <pubDate>Fri, 11 Feb 2022 08:14:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220211-081441/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/xT4r2cYz0n&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/xT4r2cYz0n&amp;#34;&amp;gt;https://t.co/xT4r2cYz0n&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/g8lHonOOX0&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/g8lHonOOX0&amp;#34;&amp;gt;https://t.co/g8lHonOOX0&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;amp;quot;The Dark Triad comprises the personality traits of narcissism, Machiavellianism, and psychopathy. They are called dark because of their malevolent qualities.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/oqdIT72zeW&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/oqdIT72zeW&amp;#34;&amp;gt;https://t.co/oqdIT72zeW&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220211-041936/</link>
      <pubDate>Fri, 11 Feb 2022 04:19:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220211-041936/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-way-too-early-to-count-out-instagram&amp;#34;&amp;gt;It’s Way Too Early To Count Out Instagram Reels&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-way-too-early-to-count-out-instagram&amp;#34;&amp;gt;Despite the narrative, TikTok hasn’t crushed Reels just yet.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220211-001356/</link>
      <pubDate>Fri, 11 Feb 2022 00:13:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220211-001356/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/fW8wpTKCCK&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/fW8wpTKCCK&amp;#34;&amp;gt;https://t.co/fW8wpTKCCK&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/V3Ssdn7zVS&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/V3Ssdn7zVS&amp;#34;&amp;gt;https://t.co/V3Ssdn7zVS&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;Pick up trendy crunchy hippie Whole Wheat Non-GMO Peach Apricot Fruit Bars&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Two 1-ounce bars, 200 calories&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;[Reading reading…]&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;41g carbs, 20g sugars including 17g added sugars SMH&amp;lt;br&amp;gt;
Alec Stapp &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/AlecStapp&amp;#34;&amp;gt;@AlecStapp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The Nuclear Regulatory Commission was created in 1975.&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
&amp;lt;p&amp;gt;In the 47 years since then, not a single new nuclear power plant has begun operations.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;I’m beginning to understand why. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/zRG7jNYaQE&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/zRG7jNYaQE&amp;#34;&amp;gt;https://t.co/zRG7jNYaQE&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220210-201553/</link>
      <pubDate>Thu, 10 Feb 2022 20:15:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220210-201553/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html&amp;#34;&amp;gt;A walk through Project Zero metrics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ryan Schoen, Project Zero&amp;lt;br&amp;gt;
tl;dr&amp;lt;br&amp;gt;
In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago.&amp;lt;br&amp;gt;
In addition to the average now being well below the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html&amp;#34;&amp;gt;90-day deadline&amp;lt;/a&amp;gt; , we have also seen a dropoff in vendors missing the deadline (or the additional &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html#deadlinemiss&amp;#34;&amp;gt;14-day grace period&amp;lt;/a&amp;gt; ). In 2021, only one bug exceeded its fix deadline, though 14% of bugs required the grace period.&amp;lt;br&amp;gt;
Differences in the amount of time it takes a vendor/product to ship a fix to users reflects their product design, development practices, update cadence, and general processes towards security reports. We hope that this comparison can showcase best practices, and encourage vendors to experiment with new policies.&amp;lt;br&amp;gt;
This data aggregation and analysis is relatively new for Project Zero, but we hope to do it more in the future. We encourage all vendors to consider publishing aggregate data on their time-to-fix and time-to-patch for externally reported vulnerabilities, as well as more data sharing and transparency in general.&amp;lt;br&amp;gt;
Overview&amp;lt;br&amp;gt;
For nearly ten years, Google’s Project Zero has been working to make it more difficult for bad actors to find and exploit security vulnerabilities, significantly improving the security of the Internet for everyone. In that time, we have partnered with folks across industry to transform the way organizations prioritize and approach fixing security vulnerabilities and updating people’s software.&amp;lt;br&amp;gt;
To help contextualize the shifts we are seeing the ecosystem make, we looked back at the set of vulnerabilities Project Zero has been reporting, how a range of vendors have been responding to them, and then attempted to identify trends in this data , such as how the industry as a whole is patching vulnerabilities faster.&amp;lt;br&amp;gt;
For this post, we look at fixed bugs that were reported between January 2019 and December 2021 (2019 is the year we made changes to our disclosure policies and also began recording more detailed metrics on our reported bugs). The data we&amp;amp;#39;ll be referencing is publicly available on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/list&amp;#34;&amp;gt;Project Zero Bug Tracker&amp;lt;/a&amp;gt; , and on various open source project repositories (in the case of the data used below to track the timeline of open-source browser bugs).&amp;lt;br&amp;gt;
There are a number of caveats with our data, the largest being that we&amp;amp;#39;ll be looking at a small number of samples, so differences in numbers may or may not be statistically significant. Also, the direction of Project Zero&amp;amp;#39;s research is almost entirely influenced by the choices of individual researchers, so changes in our research targets could shift metrics as much as changes in vendor behaviors could. As much as possible, this post is designed to be an objective presentation of the data, with additional subjective analysis included at the end.&amp;lt;br&amp;gt;
The data!&amp;lt;br&amp;gt;
Between 2019 and 2021, Project Zero reported &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com&amp;#34;&amp;gt;376 issues&amp;lt;/a&amp;gt; to vendors under our standard 90-day deadline. 351 (93.4%) of these bugs have been fixed, while 14 (3.7%) have been marked as WontFix by the vendor s. 11 (2.9%) other bugs remain unfixed, though at the time of this writing 8 have passed their deadline to be fixed; the remaining 3 are still within their deadline to be fixed. Most of the vulnerabilities are clustered around a few vendors, with 96 bugs (26%) being reported to Microsoft, 85 (23%) to Apple, and 60 (16%) to Google.&amp;lt;br&amp;gt;
Deadline adherence&amp;lt;br&amp;gt;
Once a vendor receives a bug report under our standard deadline, they have 90 days to fix it and ship a patched version to the public. The vendor can also request a 14-day grace period if the vendor confirms they plan to release the fix by the end of that total 104-day window.&amp;lt;br&amp;gt;
In this section, we&amp;amp;#39;ll be taking a look at how often vendors are able to hit these deadlines. The table below includes all bugs that have been reported to the vendor under the 90-day deadline since January 2019 and have since been fixed, for vendors with the most bug reports in the window.&amp;lt;br&amp;gt;
Deadline adherence and fix time 2019-2021, by bug report volume&amp;lt;br&amp;gt;
Vendor&amp;lt;br&amp;gt;
Total bugs&amp;lt;br&amp;gt;
Fixed by day 90&amp;lt;br&amp;gt;
Fixed during grace period&amp;lt;br&amp;gt;
Exceeded deadline&amp;lt;br&amp;gt;
&amp;amp;amp; grace period&amp;lt;br&amp;gt;
Avg days to fix&amp;lt;br&amp;gt;
Apple&amp;lt;br&amp;gt;
73 (87%)&amp;lt;br&amp;gt;
Microsoft&amp;lt;br&amp;gt;
Google&amp;lt;br&amp;gt;
Linux&amp;lt;br&amp;gt;
Adobe&amp;lt;br&amp;gt;
Mozilla&amp;lt;br&amp;gt;
Samsung&amp;lt;br&amp;gt;
Oracle&amp;lt;br&amp;gt;
Others *&amp;lt;br&amp;gt;
TOTAL&amp;lt;br&amp;gt;
* For completeness, the vendors included in the &amp;amp;#34;Others&amp;amp;#34; bucket are Apache, ASWF, Avast, AWS, c-ares, Canonical, F5, Facebook, git, Github, glibc, gnupg, gnutls, gstreamer, haproxy, Hashicorp, insidesecure, Intel, Kubernetes, libseccomp, libx264, Logmein, Node.js, opencontainers, QT, Qualcomm, RedHat, Reliance, SCTPLabs, Signal, systemd, Tencent, Tor, udisks, usrsctp, Vandyke, VietTel, webrtc, and Zoom.&amp;lt;br&amp;gt;
Overall, the data show that almost all of the big vendors here are coming in under 90 days, on average. The bulk of fixes during a grace period come from Apple and Microsoft (22 out of 34 total).&amp;lt;br&amp;gt;
Vendors have exceeded the deadline and grace period about 5% of the time over this period. In this slice, Oracle has exceeded at the highest rate, but admittedly with a relatively small sample size of only about 7 bugs. The next-highest rate is Microsoft, having exceeded 4 of their 80 deadlines.&amp;lt;br&amp;gt;
Average number of days to fix bugs across all vendors is 61 days. Zooming in on just that stat, we can break it out by year:&amp;lt;br&amp;gt;
Bug fix time 2019-2021, by bug report volume&amp;lt;br&amp;gt;
Bugs in 2019&amp;lt;br&amp;gt;
(avg days to fix)&amp;lt;br&amp;gt;
61 (71)&amp;lt;br&amp;gt;
Others*&amp;lt;br&amp;gt;
* For completeness, the vendors included in the &amp;amp;#34;Others&amp;amp;#34; bucket are Adobe, Apache, ASWF, Avast, AWS, c-ares, Canonical, F5, Facebook, git, Github, glibc, gnupg, gnutls, gstreamer, haproxy, Hashicorp, insidesecure, Intel, Kubernetes, libseccomp, libx264, Logmein, Mozilla, Node.js, opencontainers, Oracle, QT, Qualcomm, RedHat, Reliance, Samsung, SCTPLabs, Signal, systemd, Tencent, Tor, udisks, usrsctp, Vandyke, VietTel, webrtc, and Zoom.&amp;lt;br&amp;gt;
From this, we can see a few things: first of all, the overall time to fix has consistently been decreasing, but most significantly between 2019 and 2020. Microsoft, Apple, and Linux overall have reduced their time to fix during the period, whereas Google sped up in 2020 before slowing down again in 2021. Perhaps most impressively, the others not represented on the chart have collectively cut their time to fix in more than half, though it&amp;amp;#39;s possible this represents a change in research targets rather than a change in practices for any particular vendor.&amp;lt;br&amp;gt;
Finally, focusing on just 2021, we see:&amp;lt;br&amp;gt;
Only &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com&amp;#34;&amp;gt;1 deadline exceeded&amp;lt;/a&amp;gt; , versus an average of 9 per year in the other two years&amp;lt;br&amp;gt;
The grace period used 9 times (notably with half being by Microsoft), versus the slightly lower average of 12.5 in the other years&amp;lt;br&amp;gt;
Mobile phones&amp;lt;br&amp;gt;
Since the products in the previous table span a range of types (desktop operating systems, mobile operating systems, browsers), we can also focus on a particular, hopefully more apples-to-apples comparison: mobile phone operating systems.&amp;lt;br&amp;gt;
Avg fix time&amp;lt;br&amp;gt;
iOS&amp;lt;br&amp;gt;
Android (Samsung)&amp;lt;br&amp;gt;
Android (Pixel)&amp;lt;br&amp;gt;
The first thing to note is that it appears that iOS received remarkably more bug reports from Project Zero than any flavor of Android did during this time period, but rather than an imbalance in research target selection, this is more a reflection of how Apple ships software. Security updates for &amp;amp;#34;apps&amp;amp;#34; such as iMessage, Facetime, and Safari/WebKit are all shipped as part of the OS updates, so we include those in the analysis of the operating system. On the other hand, security updates for standalone apps on Android happen through the Google Play Store, so they are not included here in this analysis.&amp;lt;br&amp;gt;
Despite that, all three vendors have an extraordinarily similar average time to fix. With the data we have available, it&amp;amp;#39;s hard to determine how much time is spent on each part of the vulnerability lifecycle (e.g. triage, patch authoring, testing, etc). However, open-source products do provide a window into where time is spent.&amp;lt;br&amp;gt;
Browsers&amp;lt;br&amp;gt;
For most software, we aren&amp;amp;#39;t able to dig into specifics of the timeline. Specifically: after a vendor receives a report of a security issue, how much of the &amp;amp;#34;time to fix&amp;amp;#34; is spent between the bug report and landing the fix , and how much time is spent between landing that fix and releasing a build with the fix? The one window we do have is into open-source software, and specific to the type of vulnerability research that Project Zero does, open-source browsers.&amp;lt;br&amp;gt;
Fix time analysis for open-source browsers , by bug volume&amp;lt;br&amp;gt;
Browser&amp;lt;br&amp;gt;
Bugs&amp;lt;br&amp;gt;
Avg days from bug report to public patch&amp;lt;br&amp;gt;
Avg days from public patch to release&amp;lt;br&amp;gt;
Avg days from bug report to release&amp;lt;br&amp;gt;
Chrome&amp;lt;br&amp;gt;
WebKit&amp;lt;br&amp;gt;
Firefox&amp;lt;br&amp;gt;
Total&amp;lt;br&amp;gt;
We can also take a look at the same data, but with each bug spread out in a histogram. In particular, the histogram of the amount of time from a fix being landed in public to that fix being shipped to users shows a clear story (in the table above, this corresponds to &amp;amp;#34;Avg days from public patch to release&amp;amp;#34; column:&amp;lt;br&amp;gt;
The table and chart together tell us a few things:&amp;lt;br&amp;gt;
Chrome is currently the fastest of the three browsers, with time from bug report to releasing a fix in the stable channel in 30 days . The time to patch is very fast here, with just an average of 5 days between the bug report and the patch landing in public. The time for that patch to be released to the public is the bulk of the overall time window, though overall we still see the Chrome (blue) bars of the histogram toward the left side of the histogram. (Important note: despite being housed within the same company, Project Zero follows the same policies and procedures with Chrome that an external security researcher would follow. More information on that is available in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/p/vulnerability-disclosure-faq.html#earlyaccess&amp;#34;&amp;gt;Vulnerability Disclosure FAQ&amp;lt;/a&amp;gt; .)&amp;lt;br&amp;gt;
Firefox comes in second in this analysis, though with a relatively small number of data points to analyze. Firefox releases a fix on average in 38 days . A little under half of that is time for the fix to land in public, though it&amp;amp;#39;s important to note that Firefox …</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220210-201524/</link>
      <pubDate>Thu, 10 Feb 2022 20:15:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220210-201524/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/02/vulnerability-reward-program-2021-year.html&amp;#34;&amp;gt;Vulnerability Reward Program: 2021 Year in Review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Sarah Jacobus, Vulnerability Rewards Team&amp;lt;br&amp;gt;
Last year was another record setter for our Vulnerability Reward Programs (VRPs). Throughout 2021, we partnered with the security researcher community to identify and fix thousands of  vulnerabilities – helping keep our users and the internet safe.&amp;lt;br&amp;gt;
Thanks to these incredible researchers, Vulnerability Reward Programs across Google continued to grow, and we are excited to report that in 2021 we awarded a record breaking $8,700,000 in vulnerability rewards – with researchers donating over $300,000 of their rewards to a charity of their choice.&amp;lt;br&amp;gt;
We also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/a-new-chapter-for-googles-vulnerability.html&amp;#34;&amp;gt;launched&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/&amp;#34;&amp;gt;bughunters.google.com&amp;lt;/a&amp;gt; in 2021, a public researcher portal dedicated to keeping Google products and the internet safe and secure. This new platform brings all of our VRPs (Google, Android, Abuse, Chrome, and Google Play) closer together and provides a single intake form, making security bug submission easier than ever. We’re excited about everything the new Bug Hunters portal has to offer, including:&amp;lt;br&amp;gt;
More opportunities for interaction and a bit of healthy competition through gamification, per-country leaderboards, awards/badges for certain bugs, and more!&amp;lt;br&amp;gt;
A more functional and aesthetically pleasing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/leaderboard&amp;#34;&amp;gt;leaderboard&amp;lt;/a&amp;gt; . We know a lot of you are using your achievements in our VRPs to find jobs (we’re hiring!) and we hope this acts as a useful resource.&amp;lt;br&amp;gt;
A stronger emphasis on learning: bug hunters can improve their skills through the content available in our new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/learn&amp;#34;&amp;gt;Bug Hunter University&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Streamlined publication process: we know the value that knowledge sharing brings to our community. That’s why we want to make it easier for you to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/report/reports&amp;#34;&amp;gt;publish your bug reports&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We now offer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/GoogleVRP/status/1420129759833493507&amp;#34;&amp;gt;swag&amp;lt;/a&amp;gt; ! The first 20 folks who share this blog post on Twitter and tag &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/GoogleVRP&amp;#34;&amp;gt;@GoogleVRP&amp;lt;/a&amp;gt; will receive a gift voucher for swag in their DMs.&amp;lt;br&amp;gt;
As in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/01/vulnerability-reward-program-2019-year.html&amp;#34;&amp;gt;past years&amp;lt;/a&amp;gt; , we are sharing our 2021 Year in Review statistics across all of our programs. We would like to give a special thank you to all of our dedicated researchers - we look forward to more collaboration in the future!&amp;lt;br&amp;gt;
Android&amp;lt;br&amp;gt;
The Android VRP doubled its 2020 total payouts in 2021 with nearly $3 million dollars in rewards, and awarded the highest payout in Android VRP history: an exploit chain discovered in Android receiving a reward of $157,000!&amp;lt;br&amp;gt;
Our industry leading prize of $1,500,000 for a compromise of our Titan-M Security chip used in our Pixel device remains unclaimed - for more information on this reward and Android exploit chain rewards, please visit our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/6171833274204160&amp;#34;&amp;gt;public rules page&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
The program also launched the Android Chipset Security Reward Program (ACSRP), a vulnerability reward program offered by Google in collaboration with manufacturers of certain popular Android chipsets. This private, invite-only program, provides reward and recognition for contributions of security researchers who invest their time and effort into helping make Android devices more secure. In 2021 the ACSRP paid out $296,000 for over 220 valid and unique security reports.&amp;lt;br&amp;gt;
We would like to give a special shoutout to some of our top researchers whose continued hard work keeps Android safe and secure:&amp;lt;br&amp;gt;
Aman Pandey of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugsmirror.com&amp;#34;&amp;gt;Bugsmirror Team&amp;lt;/a&amp;gt; has skyrocketed to our top researcher last year, submitting 232 vulnerabilities in 2021! Since submitting their first report in 2019, Aman has reported over 280 valid vulnerabilities to the Android VRP and has been a crucial part of making our program so successful.&amp;lt;br&amp;gt;
Yu-Cheng Lin (林禹成) ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/AndroBugs&amp;#34;&amp;gt;@AndroBugs&amp;lt;/a&amp;gt; ) has been another phenomenal researcher for the Android VRP, submitting a whopping 128 valid reports to the program in 2021.&amp;lt;br&amp;gt;
Researcher gzobqq@gmail.com discovered a critical exploit chain in Android (CVE-2021-39698) , receiving the highest payout in Android VRP history of $157,000.&amp;lt;br&amp;gt;
Chrome&amp;lt;br&amp;gt;
This year the Chrome VRP also set some new records – 115 Chrome VRP researchers were rewarded for 333 unique Chrome security bug reports submitted in 2021, totaling $3.3 million in VRP rewards. The contributions not only help us to improve Chrome, but also the web at large by bolstering the security of all browsers based on Chromium.&amp;lt;br&amp;gt;
Of the $3.3 million, $3.1 million was awarded for Chrome Browser security bugs and $250,500 for Chrome OS bugs, including a $45,000 top reward amount for an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/1166932&amp;#34;&amp;gt;individual Chrome OS security bug report&amp;lt;/a&amp;gt; and $27,000 for an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/1197904&amp;#34;&amp;gt;individual Chrome Browser security bug report&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Of these totals, $58,000 was awarded for security issues discovered by fuzzers contributed by VRP researchers to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/5745167867576320#:~:text=%245%2C000%20%2D%20%2415%2C000-,Chrome%20Fuzzer%20Program,-The%20Chrome%20Fuzzer&amp;#34;&amp;gt;Chrome Fuzzing program&amp;lt;/a&amp;gt; . Each valid report from an externally provided fuzzer received a $1,000 patch bonus, with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/1242257&amp;#34;&amp;gt;one fuzzer report&amp;lt;/a&amp;gt; receiving a $16,000 reward.&amp;lt;br&amp;gt;
The Chrome VRP would not be able to smash these records over the last year without the efforts of so many exceptional VRP researchers. We’d like to highlight a few researcher achievements made in 2021:&amp;lt;br&amp;gt;
Rory McNamara, a Chrome OS VRP researcher who has been participating in the Chrome VRP for five years, became the highest awarded Chrome VRP researcher of all time. This year he was rewarded for six reports achieving root privilege escalation in Chrome OS, one of which received the highest reward amount achieved for a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/1166932&amp;#34;&amp;gt;single Chrome bug report&amp;lt;/a&amp;gt; in 2021 at $45,000.&amp;lt;br&amp;gt;
Chrome Browser VRP researcher Leecraso (@leecraso) of 360 Vulnerability Research Institute was the most awarded researcher of 2021, with 18 valid bug reports; a majority of which were for memory corruption vulnerabilities affecting the browser process.&amp;lt;br&amp;gt;
We love when researchers write about their findings (only after we have publicly disclosed the bug, of course)! Chrome Browser VRP researcher Brendon Tiszka wrote an excellent two-part blog series on his &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tiszka.com/blog/CVE_2021_21225.html&amp;#34;&amp;gt;discovery&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tiszka.com/blog/CVE_2021_21225_exploit.html&amp;#34;&amp;gt;exploitation&amp;lt;/a&amp;gt; of a V8 vulnerability, CVE-2021-21225, the analysis and reporting of which earned him a $22,000 VRP reward.&amp;lt;br&amp;gt;
Huge thanks and congratulations to all Chrome VRP researchers that helped us make Chrome and Chrome OS more safe for all users in 2021!.&amp;lt;br&amp;gt;
Google Play&amp;lt;br&amp;gt;
Google Play paid out $550,000 in rewards to over 60 unique security researchers.&amp;lt;br&amp;gt;
The Google Play Security Reward Program also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/learn/presentations/5783688075542528&amp;#34;&amp;gt;released their Android App Hacking Workshop content&amp;lt;/a&amp;gt; and published a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/empowering-next-generation-of-android.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; on their work to empower the next generation of Android Application Security Researchers.&amp;lt;br&amp;gt;
kCTF VRP&amp;lt;br&amp;gt;
In November we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html&amp;#34;&amp;gt;expanded&amp;lt;/a&amp;gt; our reward amounts for exploits against our kCTF cluster from 5,000-10,000 up to 31,337-50,337 USD. In the last 3 months we were happy to have several participants receive $175,685 USD in rewards. We also extended the timeline of the increased rewards until February 14 (from January 31) which should give everyone a couple more weeks to finalize any almost-working exploits.&amp;lt;br&amp;gt;
GCP VRP Prize&amp;lt;br&amp;gt;
To encourage security researchers to focus on Google Cloud Platform, we initiated the annual GCP VRP Prize in 2019. In March this year, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/03/announcing-winners-of-2020-gcp-vrp-prize.html&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; the winners of the 2020 edition of the prize and paid out $313,337 in prizes. Ezequiel Pereira won the top prize of $133,337 for finding an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/report/reports/5105155099590656&amp;#34;&amp;gt;RCE in Google Cloud Deployment Manager&amp;lt;/a&amp;gt; . We saw some amazing research on Google Cloud Platform this year too. Stay tuned for the 2021 winners!&amp;lt;br&amp;gt;
Research Grants&amp;lt;br&amp;gt;
Six years ago, the Google VRP launched an experimental &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/5479188746993664&amp;#34;&amp;gt;Vulnerability Research Grant program&amp;lt;/a&amp;gt; to encourage seasoned security researchers to take a detailed and extensive look into the security of Google products and services. And reward them even if there are no vulnerabilities found. Six years later, we are happy to announce that in 2021 we awarded over $200,000 in grants to more than 120 security researchers around the world.&amp;lt;br&amp;gt;
If you are a Google VRP researcher and want to be considered for a Vulnerability Research Grant make sure you opted in on your &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/&amp;#34;&amp;gt;bughunters profile&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Looking forward&amp;lt;br&amp;gt;
With the launch of the new Bug Hunters portal, we plan to continue improving our platform and listening to you - our researchers - on ways we can improve our platform and Bug Hunter University.&amp;lt;br&amp;gt;
Thank you again for making Google, the Internet, and our users safe and secure! Follow us on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://twitter.com/googlevrp&amp;#34;&amp;gt;@GoogleVRP&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Thank you to Adam Bacchus, Dirk Göhmann, Sarah Jacobus, Amy Ressler, Martin Straka, Jan Keller, Jon Bottarini&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220210-201244/</link>
      <pubDate>Thu, 10 Feb 2022 20:12:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220210-201244/</guid>
      <description>this is what the mind of a shape rotator looks like. what a nightmare &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/5duHBsmdOl&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/5duHBsmdOl&amp;#34;&amp;gt;https://t.co/5duHBsmdOl&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Harvard total streaming subscribers: 30,391 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/95fJl7BfF9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/95fJl7BfF9&amp;#34;&amp;gt;https://t.co/95fJl7BfF9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Also tall sizes. I only wear vests from companies that like my kind and stock tall sizes. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/DSudsl7KsU&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/DSudsl7KsU&amp;#34;&amp;gt;https://t.co/DSudsl7KsU&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220210-082322/</link>
      <pubDate>Thu, 10 Feb 2022 08:23:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220210-082322/</guid>
      <description>On Wednesday, February 9, EFF sent a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eff.org/document/eff-opposes-earn-it-act&amp;#34;&amp;gt;letter&amp;lt;/a&amp;gt; to the Senate Judiciary Committee to strongly oppose S. 3538, the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022 (EARN IT Act). EFF opposed the original and amended versions of this bill in the previous Congress, and our&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220210-081236/</link>
      <pubDate>Thu, 10 Feb 2022 08:12:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220210-081236/</guid>
      <description>Yes, this is a subtweet of &amp;lt;em&amp;gt;that&amp;lt;/em&amp;gt;. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/3Ly7DbWLMs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/3Ly7DbWLMs&amp;#34;&amp;gt;https://t.co/3Ly7DbWLMs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Michael Climacus &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MCVictorEremita&amp;#34;&amp;gt;@MCVictorEremita&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CGLmMmm7ov&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CGLmMmm7ov&amp;#34;&amp;gt;https://t.co/CGLmMmm7ov&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Kartik &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ayyar&amp;#34;&amp;gt;@ayyar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/YuJFDjkAoH&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/YuJFDjkAoH&amp;#34;&amp;gt;https://t.co/YuJFDjkAoH&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220210-080630/</link>
      <pubDate>Thu, 10 Feb 2022 08:06:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220210-080630/</guid>
      <description>Russian authorities have arrested six men accused of operating some of the most active online bazaars for selling stolen payment card data. The crackdown — the second closure of major card fraud shops by Russian authorities in as many weeks — comes closely behind &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/&amp;#34;&amp;gt;Russia’s arrest of 14 alleged affiliates of the REvil ransomware gang&amp;lt;/a&amp;gt; , and has many in the cybercrime underground asking who might be next.&amp;lt;br&amp;gt;
Dept. K’s message for Trump’s Dumps users.&amp;lt;br&amp;gt;
On Feb. 7 and 8, the domains for the carding shops &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2017/05/trumps-dumps-making-dumps-great-again/&amp;#34;&amp;gt;Trump’s Dumps&amp;lt;/a&amp;gt; , Ferum Shop , Sky-Fraud and UAS were seized by Department K , a division of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Ministry_of_Internal_Affairs_(Russia)&amp;#34;&amp;gt;Ministry of Internal Affairs of the Russian Federation&amp;lt;/a&amp;gt; that focuses on computer crimes. The websites for the carding stores were retrofitted with a message from Dept. K asking, “Which one of you is next?”&amp;lt;br&amp;gt;
According to cyber intelligence analysts at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.flashpoint-intel.com&amp;#34;&amp;gt;Flashpoint&amp;lt;/a&amp;gt; , that same message was included in the website for UniCC , another major and venerated carding shop that was seized by Dept. K in January.&amp;lt;br&amp;gt;
Around the same time Trump’s Dumps and the other three shops began displaying the Dept. K message, the Russian state-owned news outlet TASS &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tass.ru/obschestvo/13637797&amp;#34;&amp;gt;moved a story&amp;lt;/a&amp;gt; naming six Russian men who were being charged with “the illegal circulation of means of payment.”&amp;lt;br&amp;gt;
TASS reports the six detained include Denis Pachevsky , general director of Saratovfilm Film Company LLC; Alexander Kovalev , an individual entrepreneur; Artem Bystrykh , an employee of Transtekhkom LLC; Artem Zaitsev ; an employee of Get-net LLC ; and two unemployed workers, Vladislav Gilev and Yaroslav Solovyov .&amp;lt;br&amp;gt;
None of the stories about the arrests tie the men to the four carding sites. But Flashpoint found that all of the domains seized by Dept. K. were registered and hosted through Zaitsev’s company — Get-net LLC.&amp;lt;br&amp;gt;
“All four sites frequently advertised one another, which is generally atypical for two card marketplaces competing in the same space,” Flashpoint analysts wrote.&amp;lt;br&amp;gt;
Stas Alforov is director of research for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.geminiadvisory.io&amp;#34;&amp;gt;Gemini Advisory&amp;lt;/a&amp;gt; , a New York firm that monitors underground cybercrime markets. Alforov said it is most unusual for the Russians to go after carding sites that aren’t selling data stolen from Russian citizens.&amp;lt;br&amp;gt;
“It’s not in their business to be taking down Russian card shops,” Alforov said. “Unless those shops were somehow selling data on Russian cardholders, which they weren’t.”&amp;lt;br&amp;gt;
A carding shop that sold stolen credit cards and invoked 45’s likeness and name was among those taken down this week by Russian authorities.&amp;lt;br&amp;gt;
Debuting in 2011, Ferum Shop is one of the oldest observed dark web marketplaces selling “card not present” data (customer payment records stolen from hacked online merchants), according to Gemini.&amp;lt;br&amp;gt;
“Every year for the last 5 years, the marketplace has been a top 5 source of card not present records in terms of records posted for sale,” Gemini found. “In this time period, roughly 66% of Ferum Shop’s records have been from United States financial institutions. The remaining 34% have come from over 200 countries.”&amp;lt;br&amp;gt;
In contrast, Trump’s Dumps focuses on selling card data stolen from hacked point-of-sale devices, and it benefited greatly from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/01/jokers-stash-carding-market-to-call-it-quits/&amp;#34;&amp;gt;the January 2021 retirement of Joker’s Stash&amp;lt;/a&amp;gt; , which for years dwarfed most other carding shops by volume. Gemini found Trump’s Dumps gained roughly 40 percent market share after Joker’s closure, and that more than 87 percent of the payment card records it sells are from U.S. financial institutions.&amp;lt;br&amp;gt;
“In the past 5 years, Ferum Shop and Trump’s Dumps have cumulatively added over 64 million compromised payment cards,” Alforov wrote. “Based on average demand for CP and CNP records and the median price of $10, the total revenue from these sales is estimated to be over $430 million. Due to the 20 to 30% commission that shops generally receive, the administrators of Ferum Shop and Trump’s Dumps likely generated between $86 and $129 million in profits from these card sales.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/russian-govt-continues-carding-shop-crackdown/#more-58435&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/russian-govt-continues-carding-shop-crackdown/&amp;#34;&amp;gt;Russian Govt. Continues Carding Shop Crackdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220210-041157/</link>
      <pubDate>Thu, 10 Feb 2022 04:11:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220210-041157/</guid>
      <description>&amp;lt;p&amp;gt;CEOs of big tech companies: You almost certainly have wordcels as employees. What are you going to do about it?&amp;lt;br&amp;gt;
my sources are telling me that the wordcel terminology has made it to c level exec meetings and VC town halls at big tech cos&amp;amp;hellip;&amp;lt;br&amp;gt;
The modal faculty member is now 65. In 1980, the modal faculty member was &amp;lt;em&amp;gt;35&amp;lt;/em&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;Boomer Ballast&amp;amp;quot; &amp;amp;mdash; in this &amp;amp;quot;uncapping&amp;amp;quot;, as in so many other cases, compounded by favorable policy for Boomers at each stage of the life cycle &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7uktXZYX9I&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7uktXZYX9I&amp;#34;&amp;gt;https://t.co/7uktXZYX9I&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220210-001652/</link>
      <pubDate>Thu, 10 Feb 2022 00:16:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220210-001652/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00394-y&amp;#34;&amp;gt;Why the Tongan eruption will go down in the history of volcanology&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The 15 January blast sent shock waves around the globe and defied scientific expectations. Researchers are now scrambling to work out why.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220210-001303/</link>
      <pubDate>Thu, 10 Feb 2022 00:13:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220210-001303/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Dd6CxbRqtG&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Dd6CxbRqtG&amp;#34;&amp;gt;https://t.co/Dd6CxbRqtG&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/xrMHQ10v8Y&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/xrMHQ10v8Y&amp;#34;&amp;gt;https://t.co/xrMHQ10v8Y&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/goe3HDb7Le&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/goe3HDb7Le&amp;#34;&amp;gt;https://t.co/goe3HDb7Le&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/GasuQUYTdh&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/GasuQUYTdh&amp;#34;&amp;gt;https://t.co/GasuQUYTdh&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A Series A term sheet to a new competitor. @Austen &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/lxAYyAJhjc&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/lxAYyAJhjc&amp;#34;&amp;gt;https://t.co/lxAYyAJhjc&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220209-202222/</link>
      <pubDate>Wed, 09 Feb 2022 20:22:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220209-202222/</guid>
      <description>Along with 60 other human rights, civil rights and open Internet organizations, EFF sent a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cdt.org/wp-content/uploads/2022/02/Human-rights-coalition-opposition-letter-to-EARN-IT-Act-S3538.pdf&amp;#34;&amp;gt;letter&amp;lt;/a&amp;gt; to the Senate Judiciary Committee on Wednesday, February 9 outlining our concerns with the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022 (EARN IT, S.3538).As we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/02/its-back-senators-want-earn-it-bill-scan-all-online-messages&amp;#34;&amp;gt;wrote when the&amp;lt;/a&amp;gt; &amp;amp;hellip;&amp;lt;br&amp;gt;
First, the Internal Revenue Service &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/07/us/politics/irs-idme-facial-recognition.html&amp;#34;&amp;gt;reversed course&amp;lt;/a&amp;gt; from its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2022/01/27/irs-face-scans/&amp;#34;&amp;gt;recent announcement&amp;lt;/a&amp;gt; that it was partnering with ID.me, a third-party identity verification service, to use facial recognition for verification of users managing many aspects of their taxes online. Now, ID.me—which provides identity verification services for dozens of government agencies—says&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220209-201654/</link>
      <pubDate>Wed, 09 Feb 2022 20:16:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220209-201654/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/09/technology/microsoft-activision.html&amp;#34;&amp;gt;Microsoft starts a charm offensive to push through its Activision deal. Regulators are expected to give Microsoft’s proposed acquisition of Activision Blizzard — the largest in Microsoft’s history — a tough review. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220209-161707/</link>
      <pubDate>Wed, 09 Feb 2022 16:17:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220209-161707/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290073/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$4,000 Camera&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292850/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$45,891 2019 Tesla Model 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220209-121459/</link>
      <pubDate>Wed, 09 Feb 2022 12:14:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220209-121459/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00375-1&amp;#34;&amp;gt;Researchers frustrated as Biden’s science adviser resigns amid scandal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Geneticist Eric Lander had a reputation for being a bully, scientists say, as they call for more inspiring leadership.&amp;lt;br&amp;gt;
Lauren Wolf&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220209-121121/</link>
      <pubDate>Wed, 09 Feb 2022 12:11:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220209-121121/</guid>
      <description>Who can sleep with all this excitement? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/f5c8wfGhSv&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/f5c8wfGhSv&amp;#34;&amp;gt;https://t.co/f5c8wfGhSv&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220209-120647/</link>
      <pubDate>Wed, 09 Feb 2022 12:06:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220209-120647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-danger-of-expecting-work-to-be-easy-and-fun&amp;#34;&amp;gt;The danger of expecting work to be easy and fun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/it-doesnt-matter-how-many-hours-you-work&amp;#34;&amp;gt;It doesn’t matter how many hours you work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/abstinence-isnt-recovery&amp;#34;&amp;gt;Abstinence isn’t recovery&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-go-back-to-things-you-used-to-be-addicted-to-in-the-past&amp;#34;&amp;gt;How to go back to things you used to be addicted to in the past&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220209-081337/</link>
      <pubDate>Wed, 09 Feb 2022 08:13:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220209-081337/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/30/Cloud-Lock-In&amp;#34;&amp;gt;Lock-in and Multi-Cloud&amp;lt;/a&amp;gt; · Alone in a room with the customer’s CTO, I said “So, I spent this morning talking to your people, and it looks like     you’re using low-level generic tech for everything and managing it yourself.  You could save a shit-ton of money by     using high-level managed services and get load-scaling for free.” “Yeah,” he said, “but then we’d be locked in and the next time     our enterprise contract comes up for renewal, you can screw us.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/30/Cloud-Lock-In&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220209-081154/</link>
      <pubDate>Wed, 09 Feb 2022 08:11:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220209-081154/</guid>
      <description>I honestly do not know how anyone sleeps anymore.&amp;lt;br&amp;gt;
Arthur Chrenkoff &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TheDailyChrenk&amp;#34;&amp;gt;@TheDailyChrenk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@neontaster Lumpenmillionairiat&amp;lt;br&amp;gt;
Not proleplaying? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/RjX9Y7Qr9r&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/RjX9Y7Qr9r&amp;#34;&amp;gt;https://t.co/RjX9Y7Qr9r&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220209-080616/</link>
      <pubDate>Wed, 09 Feb 2022 08:06:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220209-080616/</guid>
      <description>Microsoft today released software updates to plug security holes in its Windows operating systems and related software. This month’s relatively light patch batch is refreshingly bereft of any zero-day threats, or even scary critical vulnerabilities. But it does fix four dozen flaws, including several that Microsoft says will likely soon be exploited by malware or malcontents.&amp;lt;br&amp;gt;
While none of the patches address bugs that earned Microsoft’s most dire “critical” rating, there are multiple “remote code execution” vulnerabilities that Redmond believes are ripe for exploitation. Among those is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22005&amp;#34;&amp;gt;CVE-2022-22005&amp;lt;/a&amp;gt; , a weakness in Microsoft’s Sharepoint Server versions 2013-2019 that could be exploited by any authenticated user.&amp;lt;br&amp;gt;
“The vulnerability does require an attacker to be authenticated in order to exploit it, which is likely why Microsoft only labeled it ‘Important,&amp;#39;” said Allan Liska , senior security architect at Recorded Future . “However, given the number of stolen credentials readily available on underground markets, getting authenticated could be trivial. Organizations that have public-facing SharePoint Servers should prioritize implementing this patch.”&amp;lt;br&amp;gt;
Kevin Breen at Immersive Labs called attention to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21996&amp;#34;&amp;gt;CVE-2022-21996&amp;lt;/a&amp;gt; , an elevation of privilege vulnerability in the core Windows component “ Win32k .”&amp;lt;br&amp;gt;
“In January we saw CVE-2022-21882, a vulnerability in Win32k that was being actively exploited in the wild, which prompted CISA to issue a directive to all federal agencies to mandate that patches be applied,” Breen said. “February sees more patches for the same style of vulnerability in this same component. It’s not clear from the release notes whether this is a brand new vulnerability or if it is related to the previous month’s update. Either way, we have seen attackers leverage this vulnerability so it’s safer to err on the side of caution and update this one quickly.”&amp;lt;br&amp;gt;
Another elevation of privilege flaw &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21989&amp;#34;&amp;gt;CVE-2022-21989&amp;lt;/a&amp;gt; — in the Windows Kernel — was the only vulnerability fixed this month that was publicly disclosed prior to today.&amp;lt;br&amp;gt;
“Despite the lack of critical fixes, it’s worth remembering that attackers love to use elevation of privilege vulnerabilities, of which there are 18 this month,” said Greg Wiseman , product manager at Rapid7 . “Remote code execution vulnerabilities are also important to patch, even if they may not be considered ‘wormable.’ In terms of prioritization, defenders should first focus on patching server systems.”&amp;lt;br&amp;gt;
February’s Patch Tuesday is once again brought to you by Print Spooler , the Windows component responsible for handling printing jobs. Four of the bugs quashed in this release relate to our friend Mr. Print Spooler. In July 2021, Microsoft issued an emergency fix for a Print Spooler flaw dubbed “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/microsoft-issues-emergency-patch-for-windows-flaw/&amp;#34;&amp;gt;PrintNightmare&amp;lt;/a&amp;gt; ” that was actively being exploited to remotely compromise Windows PCs. Redmond has been steadily spooling out patches for this service ever since. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/microsoft-patch-tuesday-february-2022-edition/#more-58425&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220208-201618/</link>
      <pubDate>Tue, 08 Feb 2022 20:16:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220208-201618/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/improving-the-storage-access-api-in-firefox/&amp;#34;&amp;gt;Improving the Storage Access API in Firefox →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/improving-the-storage-access-api-in-firefox/&amp;#34;&amp;gt;Improving the Storage Access API in Firefox&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Before we roll out State Partitioning for all Firefox users, we intend to make a few privacy and ergonomic improvements to the Storage Access API. In this blog post, we’ll detail a few of the new changes we made.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220208-201030/</link>
      <pubDate>Tue, 08 Feb 2022 20:10:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220208-201030/</guid>
      <description>Chaos &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/chaosprime&amp;#34;&amp;gt;@chaosprime&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/aaIxqp0qp8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/aaIxqp0qp8&amp;#34;&amp;gt;https://t.co/aaIxqp0qp8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220208-200743/</link>
      <pubDate>Tue, 08 Feb 2022 20:07:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220208-200743/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/incident-response-tools-stripe/&amp;#34;&amp;gt;The importance of names, the surprising benefits of restricting your product, and other lessons from an engineer who built Stripe&amp;#39;s &amp;amp;quot;Big Red Button&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20220208-160645/</link>
      <pubDate>Tue, 08 Feb 2022 16:06:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20220208-160645/</guid>
      <description>America’s Frontline Doctors. This viral video has been circulating over the last day or so and I’ve been replying to some on their posts, but I figured since so many … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;#34;&amp;gt;Continue reading STOP POLITICIZING MEDICINE: Facts vs. Myths of the Frontline Doctors Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I am not a religious person. I would consider myself “Agnostic” if I had to put myself in a category. However, for the sake of my narrative, let’s assume that … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;#34;&amp;gt;Continue reading Facebook is a disease.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220208-160607/</link>
      <pubDate>Tue, 08 Feb 2022 16:06:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220208-160607/</guid>
      <description>Since my credentials at the IRS will soon no longer work, I opted to create an ID.me account and share the experience here. An important preface to this walk-through is that verifying one’s self with Id.me requires one to be able to take a live, video selfie — either with the camera on a mobile device or a webcam attached to a computer (your webcam must be able to open on the device you’re using to apply for the ID.me account).&amp;lt;br&amp;gt;
Update, Feb.7, 2022, 10:21 p.m. ET: The IRS said today it is transitioning away from requiring face biometric data to identify taxpayers. Read more here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/irs-to-ditch-biometric-requirement-for-online-access/&amp;#34;&amp;gt;IRS To Ditch Biometric Requirement for Online Access&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220208-121819/</link>
      <pubDate>Tue, 08 Feb 2022 12:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220208-121819/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2022/02/08/espanol/meta-facebook-perdidas.html&amp;#34;&amp;gt;Meta está en problemas: te decimos por qué El valor de mercado de la empresa antes conocida como Facebook descendió en más de 230.000 millones de dólares, el peor revés de su historia sucedido en un solo día. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220208-121125/</link>
      <pubDate>Tue, 08 Feb 2022 12:11:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220208-121125/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/OSTOnZCMZg&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/OSTOnZCMZg&amp;#34;&amp;gt;https://t.co/OSTOnZCMZg&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/FFkd4epA9s&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/FFkd4epA9s&amp;#34;&amp;gt;https://t.co/FFkd4epA9s&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/8kPU79jaZb&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/8kPU79jaZb&amp;#34;&amp;gt;https://t.co/8kPU79jaZb&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/P38UQ7oOhA&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/P38UQ7oOhA&amp;#34;&amp;gt;https://t.co/P38UQ7oOhA&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220208-081602/</link>
      <pubDate>Tue, 08 Feb 2022 08:16:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220208-081602/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292749/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$93,000 1969 Chevrolet Camaro&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104289806/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$3,000 2004 saab 9-3 linear turbo engine 4-1985 2.0L&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291567/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$22,700 2017 Airstream International Signature 19&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292216/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$6,000 Trek Session 9 X01 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220208-081131/</link>
      <pubDate>Tue, 08 Feb 2022 08:11:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220208-081131/</guid>
      <description>&amp;lt;p&amp;gt;Daniel Tenreiro &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TenreiroDaniel&amp;#34;&amp;gt;@TenreiroDaniel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
#TeamEarth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/4KEo01VVFt&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/4KEo01VVFt&amp;#34;&amp;gt;https://t.co/4KEo01VVFt&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Neovictorian23 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/neovictorian23&amp;#34;&amp;gt;@neovictorian23&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
So many people never get out of their reality tunnel and look at things from a different angle. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/kq47EhPMfk&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/kq47EhPMfk&amp;#34;&amp;gt;https://t.co/kq47EhPMfk&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
immad &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/immad&amp;#34;&amp;gt;@immad&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
For a long time I thought these towers were spewing out some sort of industrial “toxic” fumes.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Turns out they are cooling towers that use water to cool pipes. What you see is just water vapors.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;There are 2 million cooling towers in America! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/uScVjbaGCD&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/uScVjbaGCD&amp;#34;&amp;gt;https://t.co/uScVjbaGCD&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/VwcdjRnMIy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/VwcdjRnMIy&amp;#34;&amp;gt;https://t.co/VwcdjRnMIy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220208-041139/</link>
      <pubDate>Tue, 08 Feb 2022 04:11:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220208-041139/</guid>
      <description>&amp;lt;p&amp;gt;Historical example of Shape Rotator on Wordcel violence.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Carnegie tries to take away the wordcels’ power: words.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;He spent $500k annually funding the Simplified Spelling Board:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;An organization designed to make the language more obvious and phonetic.&amp;amp;quot;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;@pmarca @tszzl &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/hjcXNe9CwM&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/hjcXNe9CwM&amp;#34;&amp;gt;https://t.co/hjcXNe9CwM&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Shaun Maguire (smc.eth) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/shaunmmaguire&amp;#34;&amp;gt;@shaunmmaguire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
words and shapes throughout the ages&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;the timeless saga&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;CC @tszzl @pmarca &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/c9tGmnRsSB&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/c9tGmnRsSB&amp;#34;&amp;gt;https://t.co/c9tGmnRsSB&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
#TeamEarth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HhHeUevoOz&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HhHeUevoOz&amp;#34;&amp;gt;https://t.co/HhHeUevoOz&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220208-001913/</link>
      <pubDate>Tue, 08 Feb 2022 00:19:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220208-001913/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/07/technology/peter-thiel-facebook.html&amp;#34;&amp;gt;Peter Thiel to Exit Meta’s Board to Support Trump-Aligned Candidates The tech billionaire, who has been on the board of the company formerly known as Facebook since 2005, is backing numerous politicians in the midterm elections. By Ryan Mac and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220208-001513/</link>
      <pubDate>Tue, 08 Feb 2022 00:15:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220208-001513/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html&amp;#34;&amp;gt;How a simple Linux kernel memory corruption bug c&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220208-001218/</link>
      <pubDate>Tue, 08 Feb 2022 00:12:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220208-001218/</guid>
      <description>#TeamEarth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/DZhBxnwdVV&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/DZhBxnwdVV&amp;#34;&amp;gt;https://t.co/DZhBxnwdVV&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
#TeamEarth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/acjVjegEbr&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/acjVjegEbr&amp;#34;&amp;gt;https://t.co/acjVjegEbr&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
#TeamEarth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/88kdp3VgZ6&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/88kdp3VgZ6&amp;#34;&amp;gt;https://t.co/88kdp3VgZ6&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220208-000656/</link>
      <pubDate>Tue, 08 Feb 2022 00:06:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220208-000656/</guid>
      <description>The Internal Revenue Service (IRS) said today it will be transitioning away from requiring biometric data from taxpayers who wish to access their records at the agency’s website. The reversal comes as privacy experts and lawmakers have been pushing the IRS and other federal agencies to find less intrusive methods for validating one’s identity with the U.S. government online.&amp;lt;br&amp;gt;
Late last year, the login page for the IRS was updated with text advising that by the summer of 2022, the only way for taxpayers to access their records at irs.gov will be through ID.me , an online identity verification service that collects biometric data — such as live facial scans using a mobile device or webcam.&amp;lt;br&amp;gt;
The IRS first announced its partnership with ID.me in November, but the press release received virtually no attention. On Jan. 19, KrebsOnSecurity published the story &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/irs-will-soon-require-selfies-for-online-access/&amp;#34;&amp;gt;IRS Will Soon Require Selfies for Online Access&amp;lt;/a&amp;gt; , detailing a rocky experience signing up for IRS access via ID.me. That story immediately went viral, bringing this site an almost unprecedented amount of traffic. A tweet about it quickly garnered more than two million impressions.&amp;lt;br&amp;gt;
It was clear most readers had no idea these new and more invasive requirements were being put in place at the IRS and other federal agencies (the Social Security Administration also is steering new signups to ID.me).&amp;lt;br&amp;gt;
ID.me says it has approximately 64 million users, with 145,000 new users signing up each day. Still, the bulk of those users are people who have been forced to sign up with ID.me as a condition of receiving state or federal financial assistance, such as unemployment insurance, child tax credit payments, and pandemic assistance funds.&amp;lt;br&amp;gt;
In the face of COVID, dozens of states collectively lost tens of billions of dollars at the hands of identity thieves impersonating out-of-work Americans seeking unemployment insurance. Some 30 states and 10 federal agencies now use ID.me to screen for ID thieves applying for benefits in someone else’s name.&amp;lt;br&amp;gt;
But ID.me has been problematic for many legitimate applicants who saw benefits denied or delayed because they couldn’t complete ID.me’s verification process.  Critics charged the IRS’s plan would unfairly disadvantage people with disabilities or limited access to technology or Internet, and that facial recognition systems tend to be less accurate for people with darker skin.&amp;lt;br&amp;gt;
Many readers were aghast that the IRS would ask people to hand over their biometric and personal data to a private company that begin in 2010 as a way to help veterans, teachers and other public servants qualify for retail discounts. These readers had reasonable questions: Who has (or will have) access to this data? Why should it be stored indefinitely (post-verification)? What happens if ID.me gets breached?&amp;lt;br&amp;gt;
The Washington Post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2022/02/07/irs-gsa-id-facial-recogntion/?utm_campaign=wp_the_technology_202&amp;amp;utm_medium=email&amp;amp;utm_source=newsletter&amp;amp;wpisrc=nl_technology202&amp;#34;&amp;gt;reported&amp;lt;/a&amp;gt; today that in a meeting with lawmakers, IRS officials said they were considering another identity verification option that wouldn’t use facial recognition. At the same time, Senate Finance Committee Chairman Ron Wyden (D-Ore.) challenged the Treasury Department and IRS to reconsider the biometric requirements.&amp;lt;br&amp;gt;
In a statement published today, the IRS said it was transitioning away from using a third-party service for facial recognition to help authenticate people creating new online accounts.&amp;lt;br&amp;gt;
“The transition will occur over the coming weeks in order to prevent larger disruptions to taxpayers during filing season,” the IRS said. “During the transition, the IRS will quickly develop and bring online an additional authentication process that does not involve facial recognition. The IRS will also continue to work with its cross-government partners to develop authentication methods that protect taxpayer data and ensure broad access to online tools.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/irs-to-ditch-biometric-requirement-for-online-access/#more-58407&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/irs-to-ditch-biometric-requirement-for-online-access/&amp;#34;&amp;gt;IRS To Ditch Biometric Requirement for Online Access&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220207-201726/</link>
      <pubDate>Mon, 07 Feb 2022 20:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220207-201726/</guid>
      <description>February 7, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/02/07/Free-software-licenses-MIT.html&amp;#34;&amp;gt;Free software licenses explained: MIT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220207-201131/</link>
      <pubDate>Mon, 07 Feb 2022 20:11:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220207-201131/</guid>
      <description>Verdant Rivers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/St_Rev&amp;#34;&amp;gt;@St_Rev&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Now if we can just get angry trust fund Harvard graduates in Brooklyn to write ridiculous web screeds about the awful threat of angry trust fund Harvard graduates in Brooklyn &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/C53bGkLasW&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/C53bGkLasW&amp;#34;&amp;gt;https://t.co/C53bGkLasW&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
wordcel is now more popular than incel. rather than contribute to incel ideology i have defeated it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/F4MLIZxE9i&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/F4MLIZxE9i&amp;#34;&amp;gt;https://t.co/F4MLIZxE9i&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;amp;quot;An auto-da-fé was the ritual of public penance carried out of condemned heretics and apostates imposed by the Spanish, Portuguese, or Mexican Inquisition as punishment and enforced by civil authorities. Its most extreme form was death by burning.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20220207-201105/</link>
      <pubDate>Mon, 07 Feb 2022 20:11:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20220207-201105/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/change-number/&amp;#34;&amp;gt;You Can Change Your Number&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Millions of people worldwide rely on Signal every day for secure and private communication. Some of these people change their phone number, but want to continue using Signal without registering for a new account. We now provide the ability to change the phone number on your Signal account, while retaining all of your chats, profile information, and groups.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220207-041256/</link>
      <pubDate>Mon, 07 Feb 2022 04:12:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220207-041256/</guid>
      <description>&amp;amp;quot;Human sacrifice is the act of killing one or more humans as part of a ritual, which is usually intended to please or appease gods, a human ruler, an authoritative/priestly figure or spirits of dead ancestors.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;A witch hunt is a search for people who have been labeled witches or a search for evidence of witchcraft.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220206-121214/</link>
      <pubDate>Sun, 06 Feb 2022 12:12:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220206-121214/</guid>
      <description>&amp;lt;p&amp;gt;captain nemo ( , ) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TheCaptain_Nemo&amp;#34;&amp;gt;@TheCaptain_Nemo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
shape rotating at                wordceling in
UC Berkeley:                       the woods: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/rsasntaJNs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/rsasntaJNs&amp;#34;&amp;gt;https://t.co/rsasntaJNs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Helen Dale (not on your team, but always fair) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/_HelenDale&amp;#34;&amp;gt;@_HelenDale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Fact-checkers, represent. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MhgaFnslhF&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MhgaFnslhF&amp;#34;&amp;gt;https://t.co/MhgaFnslhF&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
shakoist &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/cauchyfriend&amp;#34;&amp;gt;@cauchyfriend&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I&amp;#39;ve been deeply concerned observing so many of you categorize verbal rotators as wordcels. Or worse, claim that a high SAT math/verbal is isomorphic to rotator/wordcel. My friends, this is &amp;lt;em&amp;gt;wrong&amp;lt;/em&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;I&amp;#39;ve attempted to clear it up for you: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MI9IiW9txd&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MI9IiW9txd&amp;#34;&amp;gt;https://t.co/MI9IiW9txd&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220206-081150/</link>
      <pubDate>Sun, 06 Feb 2022 08:11:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220206-081150/</guid>
      <description>&amp;lt;ol start=&amp;#34;18&amp;#34;&amp;gt;
&amp;lt;li&amp;gt;Many are inclined to dismiss this whole shape rotator and wordcel thing because it came from 4chan, and &amp;amp;quot;everyone knows&amp;amp;quot; 4chan is icky and hateful or whatever.&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;p&amp;gt;But I take it seriously. It&amp;#39;s a new internet-native culture trying to understand the human world on its own terms.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220206-041235/</link>
      <pubDate>Sun, 06 Feb 2022 04:12:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220206-041235/</guid>
      <description>&amp;amp;quot;Ostracism (Greek: ὀστρακισμός, ostrakismos) was an Athenian democratic procedure in which any citizen could be expelled from the city-state of Athens for ten years. While some instances clearly expressed popular anger at the citizen, ostracism was often used preemptively.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;&amp;#39;Year Zero&amp;#39; is an idea put into practice by Pol Pot in Cambodia, that all culture and traditions within a society must be completely destroyed or discarded, and a new revolutionary culture must replace it, starting from scratch.&amp;amp;quot;&amp;lt;br&amp;gt;
anat◎ly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/aeyakovenko&amp;#34;&amp;gt;@aeyakovenko&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
halp, trying to rotate shape &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/LBqteS4v1J&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/LBqteS4v1J&amp;#34;&amp;gt;https://t.co/LBqteS4v1J&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220206-001156/</link>
      <pubDate>Sun, 06 Feb 2022 00:11:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220206-001156/</guid>
      <description>&amp;lt;p&amp;gt;Rudy Havenstein, Vampire Slayer. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/RudyHavenstein&amp;#34;&amp;gt;@RudyHavenstein&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I know a kid who does this while holding his breath, but this is next-level.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;You could hold a gun to my head and give me 14 days and I wouldn&amp;#39;t be able to solve this.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;People&amp;#39;s brains are wired differently. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/X3R3B7GhKL&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/X3R3B7GhKL&amp;#34;&amp;gt;https://t.co/X3R3B7GhKL&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
John Dulin &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/JohnDDulin&amp;#34;&amp;gt;@JohnDDulin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;amp;quot;Experts say&amp;amp;quot; as the chant of a wordcel shaperotator cargo cult. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/eAUVtjf7Qp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/eAUVtjf7Qp&amp;#34;&amp;gt;https://t.co/eAUVtjf7Qp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
narendra | narpublic.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/narendra&amp;#34;&amp;gt;@narendra&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca Should we be worried that wordcel is end stage affluenza?&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220205-201103/</link>
      <pubDate>Sat, 05 Feb 2022 20:11:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220205-201103/</guid>
      <description>&amp;lt;p&amp;gt;vitalik.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/VitalikButerin&amp;#34;&amp;gt;@VitalikButerin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;Thinking about this tweet lately. Here we have someone with a &amp;amp;quot;tech people vs word people&amp;amp;quot; dichotomy, but unlike @balajis and all the others who do this, crypto ends up on the side of&amp;amp;hellip; the word people.&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;p&amp;gt;This is not my image of what crypto is! So what&amp;#39;s going on? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/g8y9mQruNi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/g8y9mQruNi&amp;#34;&amp;gt;https://t.co/g8y9mQruNi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20220205-200841/</link>
      <pubDate>Sat, 05 Feb 2022 20:08:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20220205-200841/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/gps/&amp;#34;&amp;gt;GPS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Global Positioning System is, without a doubt, one of the most useful inventions of the late 20 th century. It made it significantly easier for ships, airplanes, cars, and hikers to figure out where they are with high degree of accuracy.&amp;lt;br&amp;gt;
One of the most exciting aspects of this system are the satellites surrounding Earth. Here’s a current constellation of active satellites, you can drag the view around to see it from different angles:&amp;lt;br&amp;gt;
However, the satellites are just a part of what makes GPS possible. While I’ll discuss their motion in depth, over the course of this blog post I’ll also explain how the satellites help a GPS receiver determine where it is, and I’ll dive into the clever methods the system uses to make sure the signals sent all the way from space are reliably decoded on Earth.&amp;lt;br&amp;gt;
We’ll start by creating a positioning system that can tell us where we are. Our initial approach will be quite simple, but we’ll step-by-step improve upon it to build an understanding of the positioning method used by GPS.&amp;lt;br&amp;gt;
Simple Positioning&amp;lt;br&amp;gt;
Here’s a small chunk of a world we’ll be playing with. The little yellow figurine represents our position in that world – you can grab and move it around. You can also drag the landscape itself to change the viewing angle. The view on the right represents a map of that landscape – we’ll try to evaluate where exactly the figurine is on this map:&amp;lt;br&amp;gt;
This situation may seem a bit daunting, but notice that the landscape we’re in has three little landmarks on the ground that are easy to reference on the map. Just by using these three reference points we can attempt to relate the figurine’s position in the environment to an approximate placement on the map.&amp;lt;br&amp;gt;
Intuitively, if we’re standing right on top of one of the colored landmarks, then we can tell exactly where we are on the map. If we take a single step away from a landmark, then our accuracy will degrade a little, but we’re still reasonably sure of our position. However, as we keep going further away the uncertainty in our estimate increases.&amp;lt;br&amp;gt;
We can draw that estimation of our position on the map using a yellow area . Its size symbolizes uncertainty – the more of a guesswork we’re doing the bigger the circle. We also know where, more or less, to place that yellow area based on our position relative to the landmarks. For instance, if we’re between the green landmark and the blue landmark then we’ll be somewhere between those two dots on the map as well:&amp;lt;br&amp;gt;
The further away from a landmark we are, the larger the uncertainty, but the distance to a landmark itself also carries some information. If we attach a rope to a landmark and walk away holding the other end, it will at some point prevent us from going further. Moreover, if we keep the rope taut it will limit our motion to a circular path around that landmark :&amp;lt;br&amp;gt;
Since the rope has a fixed length, every point on that circle is at the same distance to the landmark . Instead of using a rope we can attach a measuring tape to a landmark and track the measured distance as we roam around. A measured distance lets us draw an appropriately sized circle on the map, based on the map’s scale. We know that we have to be somewhere on that circle, because all the points on that circle are equally distant to the landmark :&amp;lt;br&amp;gt;
If we also keep track of the distance to the second landmark we know that our position is somewhere on the intersection of those two circles because the intersections are the only places that have the expected distances to both locations:&amp;lt;br&amp;gt;
With two distance measurements there are only two possible positions on the map where we could be located. Measuring distance to the third landmark narrows down that location to just a single choice:&amp;lt;br&amp;gt;
Notice that this third measurement is often redundant. We usually just “know” which of the two positions on the map makes sense given our position on the ground relative to the landmarks we see. In the demonstration below we’re measuring distances to just two landmarks, unless we’re almost inline with them, it’s usually fairly clear which answer is the right one:&amp;lt;br&amp;gt;
The process of calculating a location of a point using measurement of distances is called trilateration – that procedure lies at the heart of a GPS receiver. However, being tied to two or three measuring tapes is certainly not how any GPS device functions, so let’s keep on making our primitive positioning system better.&amp;lt;br&amp;gt;
Time of Flight&amp;lt;br&amp;gt;
The only purpose of the measuring tapes was to measure distances, but there are other ways to figure out how far away something is. For example, when we drive a car at a more or less constant speed of 60 mph we can easily calculate that after 15 minutes we’ve traveled a distance of around 15 mi . As a side note, I’m using imperial units here, but you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;switch&amp;lt;/a&amp;gt; to the metric system if you prefer.&amp;lt;br&amp;gt;
Instead of driving from point to point we can fly a little drone around. In the simulation below you can control the progress of time with the slider. The clock marks the time between the drone starting and ending its journey with a blue arc :&amp;lt;br&amp;gt;
In the bottom part of the demonstration I put a timeline that also tracks the duration of flight using a bit more compact representation – you can think of it as a clock unwrapped from an arc shape to a straight line. Notice that the length of the blue bar is directly tied to the duration of the flight, which in turn is directly tied to the traveled distance. When you &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;change position&amp;lt;/a&amp;gt; , the duration of flight needed to reach the goal changes as well.&amp;lt;br&amp;gt;
The constant velocity of a drone allows us to use time as a measure of distance, because that distance s is proportional to the time of flight t with drone’s velocity v acting as a scaling factor:&amp;lt;br&amp;gt;
s = v × t&amp;lt;br&amp;gt;
Let’s see how we can employ two drones to replicate the measurements we did with two tapes. In the demonstration below we’re sending two drones at the same time, the slider once again controls the time :&amp;lt;br&amp;gt;
As the drones arrive to their destinations we get the direct measure of distance to each landmark as shown by the length of their bars on the timeline. This allows us to draw the circles of range on the map which in turn pinpoints our position.&amp;lt;br&amp;gt;
This method is less restrictive than the measuring tapes we’ve used, but having to fly drones to the landmarks to measure distances is still a bit ridiculous. However, the idea of using time of flight is very promising, we just need to come up with a faster and more convenient messenger.&amp;lt;br&amp;gt;
Thankfully, we don’t have to look too far. We can use the very same substance that allows drones to fly – the air itself. Instead of rapidly moving it around to generate lift for the little machines, we’ll just make noises and let the air propagate sounds through itself.&amp;lt;br&amp;gt;
Do you hear me?&amp;lt;br&amp;gt;
While at close ranges the sound seems to propagate almost instantaneously, at longer distances we can certainly witness the limits of the speed of sound – you’ve probably experienced the delay between seeing a lightning bolt and hearing its thunder. There is even a convenient rule of thumb that states that the strike was another 1 mile away for every 5 seconds of delay.&amp;lt;br&amp;gt;
We can use sound to measure distances with a very simple setup. We’ll put a microphone and a light bulb at each landmark – when a microphone detects a loud sound the light bulb will turn on. To measure the distance to a landmark we’ll make a noise – I’m visualizing the propagation of that noise with a dark ring . As time passes the sound wave travels further and we can mark how long it took for the lightbulb to turn on:&amp;lt;br&amp;gt;
For now we can safely ignore the delay caused by the speed of light – at our limited scale it won’t affect the measurement too much. If we mount microphones and lightbulbs at the other landmarks we can get a reliable system to measure distances, which lets us draw the circles on the map and mark our location:&amp;lt;br&amp;gt;
This solution actually works well, but it has a fatal flaw. As soon as someone else tries to estimate their position we may have a hard time recognizing if the flash happened because of our or someone else’s sound. Let’s see what happens when a red figurine also tries to estimate its position:&amp;lt;br&amp;gt;
Notice that we have no idea if we should stop the clock on the first or the second flash of a landmark, but regardless of the approach our measurements may be completely wrong. Even when we use the robust method of intersecting three circles we very often fail to converge to a single location. The more users trying to estimate their positions the more error prone everyone’s range estimation would be, especially since they all can start making their noises at different times.&amp;lt;br&amp;gt;
The problem with this approach is that we’ve created an active system in which the landmarks have to actively respond to users’ requests to provide the needed information. As the number of users increases, the complexity of the system grows significantly. Even if we came up with some clever way for the landmarks to distinguish the incoming signals and emit different responses, we’re guaranteed to find some number of users that would overwhelm the infrastructure.&amp;lt;br&amp;gt;
Fortunately, we can solve this problem by flipping it on its head. Instead of the users sending audio signals to the landmarks, we’ll have the landmarks emit the sounds and have the users listen to those sounds.&amp;lt;br&amp;gt;
Do I hear you?&amp;lt;br&amp;gt;
Let’s rejig the landmarks to have a speaker that will emit a sound at every minute on the minute , that is when the second hand on the clock shows 0 seconds. When we hear the signal we can then check our clock to see how much time has elapsed and thus measure the distance:&amp;lt;br&amp;gt;
It may seem that this solution works well, but it requires a bit more attention. Notice that we’re actually dealing with two different clocks here, one in our hand, and another one, located in the landmark itself, that drives the sound emission. Those two clocks may not be perfectly synchronized with each other.&amp;lt;br&amp;gt;
In the demonstration below you can see the current time as tracked by the …</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220205-161433/</link>
      <pubDate>Sat, 05 Feb 2022 16:14:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220205-161433/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;GitHub, f*ck your name change. Last summer an(other) unarmed black man was killed by police in Minneapolis, Minnesota. The subsequent 8 minute and 46 second video clip swept across social media and raised widespread condemnation. Hours of discourse and weeks of protests followed. …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220205-121135/</link>
      <pubDate>Sat, 05 Feb 2022 12:11:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220205-121135/</guid>
      <description>&amp;lt;p&amp;gt;Kevin Munger &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/kmmunger&amp;#34;&amp;gt;@kmmunger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Since you&amp;#39;re going to learn the term &amp;amp;quot;wordcel&amp;amp;quot; online sooner or later, I&amp;#39;d rather you did it here.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;A characteristically sunny take on modern communication technology for your Friday &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SGzbrpdrWU&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SGzbrpdrWU&amp;#34;&amp;gt;https://t.co/SGzbrpdrWU&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Bertrand Russell on death: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/zuRxii9OiL&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/zuRxii9OiL&amp;#34;&amp;gt;https://t.co/zuRxii9OiL&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/69KJZeVyMO&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/69KJZeVyMO&amp;#34;&amp;gt;https://t.co/69KJZeVyMO&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
garrytan.eth 陈嘉兴 (∞, ∞) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/garrytan&amp;#34;&amp;gt;@garrytan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Humans see too little of the world and are so limited and by the time we figure anything out we die&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Memes and genes are the only thing left behind&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220205-081148/</link>
      <pubDate>Sat, 05 Feb 2022 08:11:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220205-081148/</guid>
      <description>&amp;lt;p&amp;gt;Matteo™ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/bertchintus&amp;#34;&amp;gt;@bertchintus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/LvNeN07MAK&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/LvNeN07MAK&amp;#34;&amp;gt;https://t.co/LvNeN07MAK&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ᐱ ᑎ ᑐ ᒋ ᕮ ᒍ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Andr3jH&amp;#34;&amp;gt;@Andr3jH&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
If pmarca hadn&amp;amp;#39;t skyrocketed the wordcel meme, the silicon valley Irish mafia would be still the hottest meme around. Connect the dots.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220205-041121/</link>
      <pubDate>Sat, 05 Feb 2022 04:11:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220205-041121/</guid>
      <description>&amp;lt;p&amp;gt;raccovelt.sol &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TeddyRaccovelt&amp;#34;&amp;gt;@TeddyRaccovelt&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
a response to @pmarca and @tszzl&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;on the behalf of wordcels everywhere &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7Z8RyVtJo6&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7Z8RyVtJo6&amp;#34;&amp;gt;https://t.co/7Z8RyVtJo6&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Weekend listening: @michaelmalice podcasts with @lexfridman &amp;amp;ndash;&amp;amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/DY2pYv8EdP&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/DY2pYv8EdP&amp;#34;&amp;gt;https://t.co/DY2pYv8EdP&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/YVNvMKTguy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/YVNvMKTguy&amp;#34;&amp;gt;https://t.co/YVNvMKTguy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/tvWpDzX7d9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/tvWpDzX7d9&amp;#34;&amp;gt;https://t.co/tvWpDzX7d9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/EY3tKvPnNQ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/EY3tKvPnNQ&amp;#34;&amp;gt;https://t.co/EY3tKvPnNQ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/k20w1w9bOi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/k20w1w9bOi&amp;#34;&amp;gt;https://t.co/k20w1w9bOi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/dU0tUAI7Q9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/dU0tUAI7Q9&amp;#34;&amp;gt;https://t.co/dU0tUAI7Q9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220204-121242/</link>
      <pubDate>Fri, 04 Feb 2022 12:12:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220204-121242/</guid>
      <description>CEOs of big tech companies: You almost certainly have shape rotators as employees. What are you going to do about it? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Y4shLGbVY8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Y4shLGbVY8&amp;#34;&amp;gt;https://t.co/Y4shLGbVY8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Phil Filippak &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/blisstweeting&amp;#34;&amp;gt;@blisstweeting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Every wordcel should do a bit of shape rotating and every shape rotator should do a bit of wordceling.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220204-082003/</link>
      <pubDate>Fri, 04 Feb 2022 08:20:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220204-082003/</guid>
      <description>&amp;lt;p&amp;gt;ReLuxe &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Mo_Porkburger&amp;#34;&amp;gt;@Mo_Porkburger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@eigenrobot You may think the earth&amp;#39;s biosphere is huge and complicated, but it&amp;#39;s the gods&amp;#39; smallest and simplest way to make memes.&amp;lt;br&amp;gt;
eigenrobot &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/eigenrobot&amp;#34;&amp;gt;@eigenrobot&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
in any case i think the correct way to view humans is as symbiotes of biological and non-biological life&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;a biological agglomeration hosting an egregome, working cooperatively or in opposition at varying turns&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;related &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Ps7IjOGgGw&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Ps7IjOGgGw&amp;#34;&amp;gt;https://t.co/Ps7IjOGgGw&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Quick, draw a 4D hypercube.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220204-041550/</link>
      <pubDate>Fri, 04 Feb 2022 04:15:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220204-041550/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/for-facebook-its-metaverse-or-bust&amp;#34;&amp;gt;For Facebook, It’s Metaverse Or Bust&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/for-facebook-its-metaverse-or-bust&amp;#34;&amp;gt;Wednesday’s earnings results make the future the present&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health&amp;#34;&amp;gt;Tech Can Help Solve Our Mental Health Crisis. But We Can’t Forget The Human Element.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health&amp;#34;&amp;gt;Tom Insel was the director of the National Institute of Mental Health from 2002-2015 and led the mental health team at Alphabet&amp;#39;s Verily. Tech alone…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jan 28 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220204-041117/</link>
      <pubDate>Fri, 04 Feb 2022 04:11:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220204-041117/</guid>
      <description>Wordcel overload. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0fn7i71M3z&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0fn7i71M3z&amp;#34;&amp;gt;https://t.co/0fn7i71M3z&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220204-001831/</link>
      <pubDate>Fri, 04 Feb 2022 00:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220204-001831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/03/technology/facebook-meta-challenges.html&amp;#34;&amp;gt;6 Reasons Meta Is in Trouble The company formerly known as Facebook has hit major turbulence as it suffered its biggest one-day wipeout ever. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220204-001139/</link>
      <pubDate>Fri, 04 Feb 2022 00:11:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220204-001139/</guid>
      <description>&amp;lt;p&amp;gt;Wordcel epiphany! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/A9Es4W1UpB&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/A9Es4W1UpB&amp;#34;&amp;gt;https://t.co/A9Es4W1UpB&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Nathan Taylor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ntaylor963&amp;#34;&amp;gt;@ntaylor963&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
TIL who originated the the wordcel v shape rotator meme. It&amp;#39;s @tszzl, though obviously @pmarca&amp;#39;s given a huge boost in popularizing it.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Here&amp;#39;s his post. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/F19oAULah4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/F19oAULah4&amp;#34;&amp;gt;https://t.co/F19oAULah4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/9YsLaThL5h&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/9YsLaThL5h&amp;#34;&amp;gt;https://t.co/9YsLaThL5h&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Shape rotation. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/iyUGlSVave&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/iyUGlSVave&amp;#34;&amp;gt;https://t.co/iyUGlSVave&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220204-000558/</link>
      <pubDate>Fri, 04 Feb 2022 00:05:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220204-000558/</guid>
      <description>If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne’er-do-wells are hoping you will, because they’ve long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin’s parent firm Microsoft ).&amp;lt;br&amp;gt;
At issue is a “redirect” feature available to businesses that chose to market through LinkedIn.com. The LinkedIn redirect links allow customers to track the performance of ad campaigns, while promoting off-site resources. These links or “ Slinks ” all have a standard format: “https://www.linkedin.com/slink?code=” followed by a short alphanumeric variable.&amp;lt;br&amp;gt;
Here’s the very first Slink created: &amp;lt;a href=&amp;#34;http://www.linkedin.com/slink?code=1,&amp;#34;&amp;gt;http://www.linkedin.com/slink?code=1,&amp;lt;/a&amp;gt; which redirects to the homepage for LinkedIn Marketing Solutions .&amp;lt;br&amp;gt;
The trouble is, there’s little to stop criminals from leveraging newly registered or hacked LinkedIn business accounts to create their own ad campaigns using Slinks. Urlscan.io , a free service that provides detailed reports on any scanned URLs, also offers a historical look at suspicious links submitted by other users. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://urlscan.io/search/#task.domain%3Alinkedin.com%20AND%20task.url%3Aslink%20AND%20NOT%20page.domain%3Alinkedin.com&amp;#34;&amp;gt;This search via Urlscan&amp;lt;/a&amp;gt; reveals dozens of recent phishing attacks that have leveraged the Slinks feature.&amp;lt;br&amp;gt;
Here’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://urlscan.io/result/74a84028-d554-43c1-a9ea-1618586c64f2/&amp;#34;&amp;gt;one example from Jan. 31&amp;lt;/a&amp;gt; that uses Linkedin.com links to redirect anyone who clicks to a site that spoofs Adobe , and then prompts users to log in to their Microsoft email account to view a shared document.&amp;lt;br&amp;gt;
A recent phishing site that abused LinkedIn’s marketing redirect. Image: Urlscan.io.&amp;lt;br&amp;gt;
Urlscan also found &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://urlscan.io/result/4b08c28c-b313-4d79-a6b0-f3ab301136dc/&amp;#34;&amp;gt;this phishing scam from Jan. 12&amp;lt;/a&amp;gt; that uses Slinks to spoof the U.S. Internal Revenue Service . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://urlscan.io/result/00abef42-70a6-4e89-aa29-2ec951a8752f/#behaviour&amp;#34;&amp;gt;Here’s a Feb. 3 example&amp;lt;/a&amp;gt; that leads to a phish targeting Amazon customers. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://urlscan.io/result/5bd64123-b19e-4f72-8cc9-0fc7b38c841e/&amp;#34;&amp;gt;This Nov. 26 sample from Urlscan&amp;lt;/a&amp;gt; shows a LinkedIn link redirecting to a Paypal phishing page. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/how-phishers-are-slinking-their-links-into-linkedin/#more-58383&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/02/how-phishers-are-slinking-their-links-into-linkedin/&amp;#34;&amp;gt;How Phishers Are Slinking Their Links Into LinkedIn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220203-202005/</link>
      <pubDate>Thu, 03 Feb 2022 20:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220203-202005/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/retrospective-and-technical-details-on-the-recent-firefox-outage/&amp;#34;&amp;gt;Retrospective and Technical Details on the recent Firefox Outage →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220203-201901/</link>
      <pubDate>Thu, 03 Feb 2022 20:19:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220203-201901/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291898/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$700 Gibson 1949 TB150 5 string conversion&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290088/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$8,500 Handmade art painting 2pac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220203-201419/</link>
      <pubDate>Thu, 03 Feb 2022 20:14:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220203-201419/</guid>
      <description>&amp;lt;p&amp;gt;Patrick Collison &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/patrickc&amp;#34;&amp;gt;@patrickc&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Certainly thought-provoking. Blowtorching a steel chain to open world&amp;#39;s longest suspension bridge after 4 years of construction vs finger scissors on toilet paper to reopen bathrooms that were closed 20 years ago.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;Abundance agenda&amp;amp;quot; from @DKThomp, @ezraklein is very important. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SHDhgr0MBF&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SHDhgr0MBF&amp;#34;&amp;gt;https://t.co/SHDhgr0MBF&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Crazy talk. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/XYoEXoVfNm&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/XYoEXoVfNm&amp;#34;&amp;gt;https://t.co/XYoEXoVfNm&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Tonight&amp;#39;s topic: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/UAxP0F9xp9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/UAxP0F9xp9&amp;#34;&amp;gt;https://t.co/UAxP0F9xp9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20220203-200635/</link>
      <pubDate>Thu, 03 Feb 2022 20:06:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20220203-200635/</guid>
      <description>I’ve decided that in light of the current atrocities happening across Afghanistan, I need to write this informal blog to get some things off my chest about the American Experience … &amp;amp;lt;a href=&amp;amp;quot; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;amp;quot&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;amp;amp;amp;quot&amp;#34;&amp;gt;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;amp;amp;amp;quot&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; ; class=&amp;amp;quot;more-link&amp;amp;quot;&amp;amp;gt;Continue reading &amp;amp;lt;span class=&amp;amp;quot;screen-reader-text&amp;amp;quot;&amp;amp;gt;[Guest Writer] My Thoughts On Afghanistan As A Member Of The US Military&amp;amp;lt;/span&amp;amp;gt;&amp;amp;lt;/a&amp;amp;gt;&amp;lt;br&amp;gt;
America’s Frontline Doctors. This viral video has been circulating over the last day or so and I’ve been replying to some on their posts, but I figured since so many … &amp;amp;lt;a href=&amp;amp;quot; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;amp;quot&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;amp;amp;amp;quot&amp;#34;&amp;gt;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;amp;amp;amp;quot&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; ; class=&amp;amp;quot;more-link&amp;amp;quot;&amp;amp;gt;Continue reading &amp;amp;lt;span class=&amp;amp;quot;screen-reader-text&amp;amp;quot;&amp;amp;gt;STOP POLITICIZING MEDICINE: Facts vs. Myths of the Frontline Doctors Video&amp;amp;lt;/span&amp;amp;gt;&amp;amp;lt;/a&amp;amp;gt;&amp;lt;br&amp;gt;
I am not a religious person. I would consider myself “Agnostic” if I had to put myself in a category. However, for the sake of my narrative, let’s assume that … &amp;amp;lt;a href=&amp;amp;quot; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;amp;quot&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;amp;amp;amp;quot&amp;#34;&amp;gt;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;amp;amp;amp;quot&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; ; class=&amp;amp;quot;more-link&amp;amp;quot;&amp;amp;gt;Continue reading &amp;amp;lt;span class=&amp;amp;quot;screen-reader-text&amp;amp;quot;&amp;amp;gt;Facebook is a disease.&amp;amp;lt;/span&amp;amp;gt;&amp;amp;lt;/a&amp;amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220203-121205/</link>
      <pubDate>Thu, 03 Feb 2022 12:12:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220203-121205/</guid>
      <description>Therefore the wordchad. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/UiJyl4pvEa&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/UiJyl4pvEa&amp;#34;&amp;gt;https://t.co/UiJyl4pvEa&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
roon &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/tszzl&amp;#34;&amp;gt;@tszzl&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/G1sAhMTIg4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/G1sAhMTIg4&amp;#34;&amp;gt;https://t.co/G1sAhMTIg4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/miJBvQwRdB&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/miJBvQwRdB&amp;#34;&amp;gt;https://t.co/miJBvQwRdB&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; To be continued…&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220203-081205/</link>
      <pubDate>Thu, 03 Feb 2022 08:12:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220203-081205/</guid>
      <description>James Clark ¯_(ツ)_/¯ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/mr_james_c&amp;#34;&amp;gt;@mr_james_c&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Wordcels: I&amp;#39;ve got no head for shape rotation
Society: That&amp;#39;s ok, modern society was build for Wordceling
Shape Rotators: But I &amp;lt;em&amp;gt;built&amp;lt;/em&amp;gt; modern society &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/cri2Inozic&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/cri2Inozic&amp;#34;&amp;gt;https://t.co/cri2Inozic&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Bret Weinstein &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/BretWeinstein&amp;#34;&amp;gt;@BretWeinstein&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca There is truth here, but much is missing. What makes humans special is in the cognitive layer:  consciousness (meme generation) and culture (meme transmission. But until the present, most memetic transmission was vertical. Modernity is dominated by horizontal—and noise dominates&amp;lt;br&amp;gt;
the post man &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/deepfates&amp;#34;&amp;gt;@deepfates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
unified meme theory states that the &amp;amp;quot;meme&amp;amp;quot;, defined as the transmissible unit of human thought, and defined has a picture with some words on it that gets copied on the internet, are not different. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/tkLy9gSydI&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/tkLy9gSydI&amp;#34;&amp;gt;https://t.co/tkLy9gSydI&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220203-041816/</link>
      <pubDate>Thu, 03 Feb 2022 04:18:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220203-041816/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2014/05/08/avoiding-the-axiom-of-choice-part-i/&amp;#34;&amp;gt;Avoiding the axiom of choice, part I&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220203-041810/</link>
      <pubDate>Thu, 03 Feb 2022 04:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220203-041810/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/02/02/technology/meta-facebook-earnings-metaverse.html&amp;#34;&amp;gt;Meta spent $10 billion on the metaverse in 2021, dragging down profit. Quarterly profits decreased 8 percent, to $10.3 billion, from a year earlier. Shares of Meta’s stock plunged about 22 percent in after-hours trading. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2022/02/02/espanol/facebook-meta.html&amp;#34;&amp;gt;‘Este es el futuro de la ciencia ficción’: la transformación de Facebook en Meta El cambio de una empresa de redes sociales de 68.000 personas hacia el metaverso teórico ha causado grandes cambios internos e incertidumbre. By Sheera Frenkel, Mike Isaac and Ryan Mac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220203-041742/</link>
      <pubDate>Thu, 03 Feb 2022 04:17:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220203-041742/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/02/retrospective-and-technical-details-on-the-recent-firefox-outage/&amp;#34;&amp;gt;Retrospective and Technical Details on the recent Firefox Outage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
On January 13th 2022, Firefox became unusable for close to two hours for users worldwide. This incident interrupted many people’s workflow. This post highlights the complex series of events and circumstances that, together, triggered a bug deep in the networking code of Firefox.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220203-041408/</link>
      <pubDate>Thu, 03 Feb 2022 04:14:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220203-041408/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-learner-track&amp;#34;&amp;gt;c&#43;&#43;-learner-track&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#holy-wars&amp;#34;&amp;gt;holy-wars&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#memes&amp;#34;&amp;gt;memes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Two convergent observations from my corner of the C&#43;&#43; world:&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;Multiple book authors pushing the idea that Scott Meyers’ original
phrase “universal reference” (for&amp;lt;br&amp;gt;
T&amp;amp;amp;&amp;amp;amp;&amp;lt;br&amp;gt;
) is actually preferable to the now-Standard term “forwarding reference.”&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Multiple C&#43;&#43; learners (or perhaps intermediate-level C&#43;&#43; programmers
having a senior moment) asking whether there’s an easy way to pass an rvalue expression to a function expecting a const lvalue reference.&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220203-041141/</link>
      <pubDate>Thu, 03 Feb 2022 04:11:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220203-041141/</guid>
      <description>But they&amp;#39;ve always been wordcels. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/YGQxN09hzP&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/YGQxN09hzP&amp;#34;&amp;gt;https://t.co/YGQxN09hzP&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Colorized photo of shape rotator circa 1775. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/GNhQyIHxjz&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/GNhQyIHxjz&amp;#34;&amp;gt;https://t.co/GNhQyIHxjz&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Appeal to Authoritycel Fallacy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/bVXHBOOT4b&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/bVXHBOOT4b&amp;#34;&amp;gt;https://t.co/bVXHBOOT4b&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220202-001317/</link>
      <pubDate>Wed, 02 Feb 2022 00:13:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220202-001317/</guid>
      <description>Ryan Delk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/delk&amp;#34;&amp;gt;@delk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
We’ve villainized hard work, having kids, and religion — and are left with a crisis of meaning. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/ZIwNR6QMhu&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/ZIwNR6QMhu&amp;#34;&amp;gt;https://t.co/ZIwNR6QMhu&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>https://moxie.org/blog</title>
      <link>https://www.whatsupup.com/blog/sunbelt/debunk/000000-000000/</link>
      <pubDate>Tue, 01 Feb 2022 20:27:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sunbelt/debunk/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220201-201321/</link>
      <pubDate>Tue, 01 Feb 2022 20:13:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220201-201321/</guid>
      <description>Made in Cosmos &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/made_in_cosmos&amp;#34;&amp;gt;@made_in_cosmos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca Admitting that life has a meaning would require evaluating some choices as more valuable than others, and that’s a hard pill to swallow in the postmodern world.&amp;lt;br&amp;gt;
&amp;amp;quot;There is a subject nowadays which is taboo in the way that sexuality was once taboo, which is to talk about life as if it had any meaning.&amp;amp;quot; &amp;amp;ndash; Nicholas Mosley&amp;lt;br&amp;gt;
&amp;amp;quot;Oh, come now, we must never lose our sense of humor. Nothing’s really sacred but a sense of humor.&amp;amp;quot; &amp;amp;ndash; Ellsworth Toohey&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220201-082347/</link>
      <pubDate>Tue, 01 Feb 2022 08:23:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220201-082347/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-saving-podcasts-patent-troll&amp;#34;&amp;gt;H2FTI - Marc Maron - Ep 110&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220201-082337/</link>
      <pubDate>Tue, 01 Feb 2022 08:23:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220201-082337/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-saving-podcasts-patent-troll&amp;#34;&amp;gt;H2FTI - Marc Maron - Ep 110&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220201-081258/</link>
      <pubDate>Tue, 01 Feb 2022 08:12:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220201-081258/</guid>
      <description>mypetgoat.se &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Brett_Fujioka&amp;#34;&amp;gt;@Brett_Fujioka&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca @tszzl if we&amp;#39;re talking about David Foster Wallace: post-irony-cel.&amp;lt;br&amp;gt;
Irony pandemic. Herd immunity nowhere in sight.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SAOI56UDl4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SAOI56UDl4&amp;#34;&amp;gt;https://t.co/SAOI56UDl4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20220201-080754/</link>
      <pubDate>Tue, 01 Feb 2022 08:07:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20220201-080754/</guid>
      <description>Welcome to Monday Night Itch, a harebrained scheme to encourage folks to play more non- AAA games by adding a touch of social gamification.  I thought I would be tweeting my adventures here, but I just had an experience so profound it can only be captured within a blog post.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2022/01/31/monday-night-itch-1-mystery-trap-adventure/&amp;#34;&amp;gt;Monday Night Itch #1: Mystery Trap Adventure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220201-041432/</link>
      <pubDate>Tue, 01 Feb 2022 04:14:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220201-041432/</guid>
      <description>Ironycel -&amp;amp;gt; nihilcel -&amp;amp;gt; wokecel pipeline? CC @tszzl&amp;lt;br&amp;gt;
And for the rest of us… &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/TK3m2RBWWV&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/TK3m2RBWWV&amp;#34;&amp;gt;https://t.co/TK3m2RBWWV&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/N6zMSHbKL6&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/N6zMSHbKL6&amp;#34;&amp;gt;https://t.co/N6zMSHbKL6&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7dvn4c9SnS&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7dvn4c9SnS&amp;#34;&amp;gt;https://t.co/7dvn4c9SnS&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/yk7CfH54IQ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/yk7CfH54IQ&amp;#34;&amp;gt;https://t.co/yk7CfH54IQ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220201-002157/</link>
      <pubDate>Tue, 01 Feb 2022 00:21:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220201-002157/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/31/science/milky-way.html&amp;#34;&amp;gt;Out There An Electrifying View of the Heart of the Milky Way A new radio-wave image of the center of our galaxy reveals all the forms of frenzy that a hundred million or so stars can get up to. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220131-202113/</link>
      <pubDate>Mon, 31 Jan 2022 20:21:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220131-202113/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/01/hacks-decoded-adewale-adetona/&amp;#34;&amp;gt;Hacks Decoded: Adewale Adetona →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/01/hacks-decoded-adewale-adetona/&amp;#34;&amp;gt;Hacks Decoded: Adewale Adetona&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Adetona Adewale Akeem, more popularly known as iSlimfit, is a Nigeria-born revered digital technologist and marketing expert. He is the co-founder of Menopays, a fintech startup offering another Buy Now Pay Later (BNPL) option across Africa. We chatted with him about founding Menopays and the impact of tech solutions developed in Nigeria.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220131-161906/</link>
      <pubDate>Mon, 31 Jan 2022 16:19:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220131-161906/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292581/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$300 Sony PlayStation 4 PS4 500GB Console With 20th Anniversary C&amp;amp;hellip;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292559/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$68,000 2019 Audi e-tron&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220131-122039/</link>
      <pubDate>Mon, 31 Jan 2022 12:20:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220131-122039/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/31/technology/facebook-meta-change.html&amp;#34;&amp;gt;How Facebook Is Morphing Into Meta Shifting a 68,000-person social networking company toward the theoretical metaverse has caused internal disruption and uncertainty. By Sheera Frenkel, Mike Isaac and Ryan Mac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220131-081448/</link>
      <pubDate>Mon, 31 Jan 2022 08:14:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220131-081448/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;GitHub, f*ck your name change. Last summer an(other) unarmed black man was killed by police in Minneapolis, Minnesota. The subsequent 8 minute and 46 second video clip swept across social media and raised widespread condemnation. Hours of discourse and weeks of protests followed. Every company and their grandma released performative statements of solidarity with the…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/tag/github?source=user_profile--------------------github--------------------&amp;#34;&amp;gt;Github&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;6 min read&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220130-202127/</link>
      <pubDate>Sun, 30 Jan 2022 20:21:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220130-202127/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/04/17/an-interesting-monoid/&amp;#34;&amp;gt;An interesting monoid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220130-200754/</link>
      <pubDate>Sun, 30 Jan 2022 20:07:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220130-200754/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-new-meaning-of-hard-work&amp;#34;&amp;gt;The new meaning of hard work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/abstinence-isnt-recovery&amp;#34;&amp;gt;Abstinence isn’t recovery&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-go-back-to-things-you-used-to-be-addicted-to-in-the-past&amp;#34;&amp;gt;How to go back to things you used to be addicted to in the past&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220130-121254/</link>
      <pubDate>Sun, 30 Jan 2022 12:12:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220130-121254/</guid>
      <description>Martijn - mdk.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/mdekuijper&amp;#34;&amp;gt;@mdekuijper&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Wow &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/26hOa913aC&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/26hOa913aC&amp;#34;&amp;gt;https://t.co/26hOa913aC&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220130-120742/</link>
      <pubDate>Sun, 30 Jan 2022 12:07:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220130-120742/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220130-081301/</link>
      <pubDate>Sun, 30 Jan 2022 08:13:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220130-081301/</guid>
      <description>&amp;lt;p&amp;gt;Antonio García Martínez (agm.eth) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/antoniogm&amp;#34;&amp;gt;@antoniogm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I have absolute freedom to write whatever I like on @SubstackInc and don&amp;#39;t fear any reprisals.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;They don&amp;#39;t arbitrarily yank people off their platform&amp;amp;hellip;.as happened many times on Twitter when you were in charge, @jack. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/rPCiU9UGWt&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/rPCiU9UGWt&amp;#34;&amp;gt;https://t.co/rPCiU9UGWt&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220130-080647/</link>
      <pubDate>Sun, 30 Jan 2022 08:06:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220130-080647/</guid>
      <description>Several articles here have delved into the history of John Bernard , the pseudonym used by a fake billionaire technology investor who tricked dozens of startups into giving him tens of millions of dollars. Bernard’s latest victim — a Norwegian company hoping to build a fleet of environmentally friendly shipping vessels — is now embroiled in a lawsuit over a deal gone bad, in which Bernard falsely claimed to have secured $100 million from six other wealthy investors, including the founder of Uber and the artist Abel Makkonen Tesfaye , better known as The Weeknd .&amp;lt;br&amp;gt;
John Bernard is a pseudonym used by John Clifton Davies , a convicted fraudster from the United Kingdom who is currently a fugitive from justice and residing in Ukraine. Davies’ Bernard persona has fleeced dozens of technology companies out of an estimated $30 million with the promise of lucrative investments.&amp;lt;br&amp;gt;
For several years until reinventing himself again quite recently, Bernard &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/09/due-diligence-that-money-cant-buy/&amp;#34;&amp;gt;pretended to be a billionaire Swiss investor&amp;lt;/a&amp;gt; who made his fortunes in the dot-com boom 20 years ago and who was seeking investment opportunities. Bernard generated a stream of victims by offering extraordinarily generous finder’s fees for investment brokers who helped him secure new clients. But those brokers would eventually get stiffed as well because Bernard’s company would never consummate a deal.&amp;lt;br&amp;gt;
In case after case, Bernard would promise to invest millions in tech startups, and then insist that companies pay tens of thousands of dollars worth of due diligence fees up front. However, the due diligence company he insisted on using — another Swiss firm called Inside Knowledge — also was secretly owned by Bernard, who would invariably pull out of the deal after receiving the due diligence money.&amp;lt;br&amp;gt;
The scam artist John Bernard (left) in a recent Zoom call, and a photo of John Clifton Davies from 2015.&amp;lt;br&amp;gt;
But Bernard would adopt a slightly different approach to stealing from Freidig Shipping Ltd. , a Norwegian company formed in 2017 that was seeking the equivalent of USD $100 million investment to bring its green fleet of 30 new offshore service vessels to fruition.&amp;lt;br&amp;gt;
Journalists Harald Vanvik and Harald Berglihn from the Norwegian Business Daily write that through investment advisors in London, Bernard was introduced to Nils-Odd Tønnevold , co-founder of Freidig Shipping and an investment advisor with 20 years of experience.&amp;lt;br&amp;gt;
“Both Bernard and Inside Knowledge appeared to be professionals,” the reporters wrote in a story that’s behind a paywall. “Bernard appeared to be experienced. He knew a lot about start-ups and got into things quickly. Credible and reliable was the impression of him, said Tønnevold.”&amp;lt;br&amp;gt;
“Bernard eventually took on the role of principal investor, claiming he had six other wealthy investors on the team, including artist Abel Makkonen Tesfaye, known as The Weeknd, Uber founder Garrett Camp and Norilsk Nickel owner Russian Vladimir Potanin ,” the Norwegian journalists wrote. “These committed to contribute $99.25 million to Freidig.”&amp;lt;br&amp;gt;
So in this case Bernard conveniently claimed he’d come up with almost all of the investment, which came $750,000 short of the goal. Another investor, a Belgian named Guy Devos , contributed the remaining $750,000.&amp;lt;br&amp;gt;
But by the spring of 2020, it was clear that Devos and others involved in the shipping project had been tricked, and that all the money which had been paid to Bernard — an estimated NOK 15 million (~USD $1.67 million) — had been lost. By that time the two co-founders and their families had borrowed USD $1.5 million, and had transferred the funds to Inside Knowledge. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/fake-investor-john-bernard-sinks-norwegian-green-shipping-dreams/#more-58153&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/fake-investor-john-bernard-sinks-norwegian-green-shipping-dreams/&amp;#34;&amp;gt;Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220130-041302/</link>
      <pubDate>Sun, 30 Jan 2022 04:13:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220130-041302/</guid>
      <description>You can&amp;#39;t argue with math. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/QHdGftWmDu&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/QHdGftWmDu&amp;#34;&amp;gt;https://t.co/QHdGftWmDu&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Debo Olaosebikan &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/dolaoseb&amp;#34;&amp;gt;@dolaoseb&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Personally i think what people think is the log is the true count&amp;amp;hellip; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/u46lzs6eG1&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/u46lzs6eG1&amp;#34;&amp;gt;https://t.co/u46lzs6eG1&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/t3pI5tAbdO&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/t3pI5tAbdO&amp;#34;&amp;gt;https://t.co/t3pI5tAbdO&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CGgxIUU6sp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CGgxIUU6sp&amp;#34;&amp;gt;https://t.co/CGgxIUU6sp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220130-001614/</link>
      <pubDate>Sun, 30 Jan 2022 00:16:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220130-001614/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#compiler-diagnostics&amp;#34;&amp;gt;compiler-diagnostics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I just ran into some code like this in a test suite:&amp;lt;br&amp;gt;
struct MoveOnlyWidget {
    MoveOnlyWidget(int);
    MoveOnlyWidget(const MoveOnlyWidget&amp;amp;amp;) = delete;
    MoveOnlyWidget(MoveOnlyWidget&amp;amp;amp;&amp;amp;amp;) = default;
    MoveOnlyWidget&amp;amp;amp; operator=(const MoveOnlyWidget&amp;amp;amp;) = delete;
    MoveOnlyWidget&amp;amp;amp; operator=(MoveOnlyWidget&amp;amp;amp;&amp;amp;amp;) = default;
    MoveOnlyWidget() = default;
};&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220130-001336/</link>
      <pubDate>Sun, 30 Jan 2022 00:13:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220130-001336/</guid>
      <description>Me too. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/66muPLG8jh&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/66muPLG8jh&amp;#34;&amp;gt;https://t.co/66muPLG8jh&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“Post more!” &amp;amp;lt;slap&amp;amp;gt; “Post less!” &amp;amp;lt;slap&amp;amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/1nqWnlfxXU&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/1nqWnlfxXU&amp;#34;&amp;gt;https://t.co/1nqWnlfxXU&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
But this should make it &amp;lt;em&amp;gt;easier&amp;lt;/em&amp;gt; to see all these supposed “people”, not harder. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/rtCdmgMDJB&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/rtCdmgMDJB&amp;#34;&amp;gt;https://t.co/rtCdmgMDJB&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220129-161304/</link>
      <pubDate>Sat, 29 Jan 2022 16:13:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220129-161304/</guid>
      <description>Zack Kanter &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/zackkanter&amp;#34;&amp;gt;@zackkanter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Fat Eartherism in a nutshell. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/iNBbe5eG2M&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/iNBbe5eG2M&amp;#34;&amp;gt;https://t.co/iNBbe5eG2M&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220129-121303/</link>
      <pubDate>Sat, 29 Jan 2022 12:13:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220129-121303/</guid>
      <description>The real Fermi Paradox was here on Earth all along. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/eyVv1Vq0hM&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/eyVv1Vq0hM&amp;#34;&amp;gt;https://t.co/eyVv1Vq0hM&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Market Mystic &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/LoveCheeseH8Gov&amp;#34;&amp;gt;@LoveCheeseH8Gov&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
All this over-counting of everyone in everything just happens to conveniently make a lot of very smart and good people feel like an insignificant minority &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/zYfKRK2oFy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/zYfKRK2oFy&amp;#34;&amp;gt;https://t.co/zYfKRK2oFy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220129-081249/</link>
      <pubDate>Sat, 29 Jan 2022 08:12:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220129-081249/</guid>
      <description>SEE? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/XKmgz6WZ6e&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/XKmgz6WZ6e&amp;#34;&amp;gt;https://t.co/XKmgz6WZ6e&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
QED: American, Italian, Indian, Chinese, Taco Bell, Chick-fil-A. Why don&amp;#39;t we have more kinds of food? So weird. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/kCBWBpnB4B&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/kCBWBpnB4B&amp;#34;&amp;gt;https://t.co/kCBWBpnB4B&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Right. We&amp;#39;d have more than like 6 kinds of food too. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/hli1GFhmQr&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/hli1GFhmQr&amp;#34;&amp;gt;https://t.co/hli1GFhmQr&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220129-041352/</link>
      <pubDate>Sat, 29 Jan 2022 04:13:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220129-041352/</guid>
      <description>My God, this happens to me too. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/zcCV6PJ7sp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/zcCV6PJ7sp&amp;#34;&amp;gt;https://t.co/zcCV6PJ7sp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
To be clear, I&amp;#39;m not questioning the Kumbh Mela, I&amp;#39;m questioning the existence of &amp;amp;quot;&amp;amp;quot;&amp;amp;quot;space cameras&amp;amp;quot;&amp;amp;quot;&amp;amp;quot;. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/5SZoNwiU8z&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/5SZoNwiU8z&amp;#34;&amp;gt;https://t.co/5SZoNwiU8z&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Clickfraud committed by the 14 people who actually work at Google. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/f3unFT5Q6m&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/f3unFT5Q6m&amp;#34;&amp;gt;https://t.co/f3unFT5Q6m&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220128-202010/</link>
      <pubDate>Fri, 28 Jan 2022 20:20:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220128-202010/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/27/science/james-webb-space-telescope.html&amp;#34;&amp;gt;Out There The James Webb Space Telescope and a Quest Every Human Shares Building, launching and deploying the giant observatory required the best of what our species has to offer the cosmos. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220128-201314/</link>
      <pubDate>Fri, 28 Jan 2022 20:13:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220128-201314/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SizqY2z6lZ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SizqY2z6lZ&amp;#34;&amp;gt;https://t.co/SizqY2z6lZ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220128-200645/</link>
      <pubDate>Fri, 28 Jan 2022 20:06:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220128-200645/</guid>
      <description>That same ToX ID was claimed by a user called “ smiseo ” on the Russian forum BHF, in which smiseo &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/01/rustclipper.png&amp;#34;&amp;gt;advertises “clipper” malware&amp;lt;/a&amp;gt; written in Rust that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/man-robbed-of-16-bitcoin-sues-young-thieves-parents/&amp;#34;&amp;gt;swaps in the attacker’s bitcoin address&amp;lt;/a&amp;gt; when the victim copies a cryptocurrency address to their computer’s temporary clipboard.&amp;lt;br&amp;gt;
The nickname “ YBCat ” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2022/01/ybcatcookiedays.png&amp;#34;&amp;gt;advertised&amp;lt;/a&amp;gt; that same ToX ID on Carder[.]uk, where this user claimed ownership over the Telegram account @CookieDays , and said they could be hired to do software and bot development “of any level of complexity.” YBCat mostly sold “installs,” offering paying customers to ability to load malware of their choice on thousands of hacked computers simultaneously.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220128-161950/</link>
      <pubDate>Fri, 28 Jan 2022 16:19:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220128-161950/</guid>
      <description>January 28, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/01/28/Implementing-mime-in-xxxx.html&amp;#34;&amp;gt;Implementing a MIME database in XXXX&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220128-161521/</link>
      <pubDate>Fri, 28 Jan 2022 16:15:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220128-161521/</guid>
      <description>means it really happens&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-learner-track&amp;#34;&amp;gt;c&#43;&#43;-learner-track&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concurrency&amp;#34;&amp;gt;concurrency&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slogans&amp;#34;&amp;gt;slogans&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
During my CppCon 2020 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/F6Ipn7gCOsY&amp;#34;&amp;gt;“Back to Basics: Concurrency,”&amp;lt;/a&amp;gt; someone asked, “Do we ever need to use&amp;lt;br&amp;gt;
?” To which I said, “No. Please don’t
use&amp;lt;br&amp;gt;
for anything ever.” This was perhaps a bit overstated, but at least in the context of basic concurrency it was accurate. To describe the role of&amp;lt;br&amp;gt;
in C and C&#43;&#43;, I often use the following slogan:&amp;lt;br&amp;gt;
Marking a variable as&amp;lt;br&amp;gt;
means that reads and writes to that variable really happen.&amp;lt;br&amp;gt;
If you don’t know what this means, then you shouldn’t use&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#holy-wars&amp;#34;&amp;gt;holy-wars&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220128-160629/</link>
      <pubDate>Fri, 28 Jan 2022 16:06:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220128-160629/</guid>
      <description>In December 2021, researchers discovered a new ransomware-as-a-service named ALPHV (a.k.a. “ BlackCat “), considered to be the first professional cybercrime group to create and use a ransomware strain written in the Rust programming language. In this post, we’ll explore some of the clues left behind by a developer who was reputedly hired to code the ransomware variant.&amp;lt;br&amp;gt;
Image: Varonis.&amp;lt;br&amp;gt;
According to an analysis &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.varonis.com/blog/alphv-blackcat-ransomware&amp;#34;&amp;gt;released this week by Varonis&amp;lt;/a&amp;gt; , ALPHV is actively recruiting operators from several ransomware organizations — including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=REvil&amp;#34;&amp;gt;REvil&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=blackmatter&amp;#34;&amp;gt;BlackMatter&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=darkside&amp;#34;&amp;gt;DarkSide&amp;lt;/a&amp;gt; — and is offering affiliates up to 90 percent of any ransom paid by a victim organization.&amp;lt;br&amp;gt;
“The group’s leak site, active since early December 2021, has named over twenty victim organizations as of late January 2022, though the total number of victims, including those that have paid a ransom to avoid exposure, is likely greater,” Varonis’s Jason Hill wrote.&amp;lt;br&amp;gt;
One concern about more malware shifting to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Rust_(programming_language)&amp;#34;&amp;gt;Rust&amp;lt;/a&amp;gt; is that it is considered a much more secure programming language compared to C and C&#43;&#43;, writes Catalin Cimpanu for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://therecord.media/alphv-blackcat-is-the-first-professional-ransomware-gang-to-use-rust/&amp;#34;&amp;gt;The Record&amp;lt;/a&amp;gt; . The upshot? Security defenders are constantly looking for coding weaknesses in many ransomware strains, and if more start moving to Rust it could become more difficult to find those soft spots.&amp;lt;br&amp;gt;
Researchers at Recorded Future say they believe the ALPHV/BlackCat author was previously involved with the infamous REvil ransomware cartel in some capacity. Earlier this month the Russian government announced that at the United States’ request it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/&amp;#34;&amp;gt;arrested 14 individuals in Russia thought to be REvil operators&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Still, REvil rolls on despite these actions, according to Paul Roberts at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com&amp;#34;&amp;gt;ReversingLabs&amp;lt;/a&amp;gt; . “The recent arrests have NOT led to a noticeable change in detections of REvil malicious files,” Roberts wrote. “In fact, detections of files and other software modules associated with the REvil ransomware increased modestly in the week following the arrests by Russia’s FSB intelligence service.”&amp;lt;br&amp;gt;
Meanwhile, the U.S. State Department has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.state.gov/reward-offers-for-information-to-bring-sodinokibi-revil-ransomware-variant-co-conspirators-to-justice/&amp;#34;&amp;gt;a standing $10 million reward&amp;lt;/a&amp;gt; for information leading to the identification or location of any individuals holding key leadership positions in REvil.&amp;lt;br&amp;gt;
WHO IS BINRS?&amp;lt;br&amp;gt;
A confidential source recently had a private conversation with a support representative who fields questions and inquiries on several cybercrime forums on behalf of a large and popular ransomware affiliate program. The affiliate rep confirmed that a coder for ALPHV was known by the handle “ Binrs ” on multiple Russian-language forums.&amp;lt;br&amp;gt;
On the cybercrime forum RAMP , the user Binrs says they are a Rust developer who’s been coding for 6 years. “My stack is Rust, nodejs, php, golang,” Binrs said in an introductory post, in which they claim to be fluent in English. Binrs then signs the post with their identification number for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Tox_(protocol)&amp;#34;&amp;gt;ToX&amp;lt;/a&amp;gt; , a peer-to-peer instant messaging service.&amp;lt;br&amp;gt;
That same ToX ID was claimed by a user called “ smiseo ” on the Russian forum BHF, in which smiseo advertises “clipper” malware written in Rust that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/man-robbed-of-16-bitcoin-sues-young-thieves-parents/&amp;#34;&amp;gt;swaps in the attacker’s bitcoin address&amp;lt;/a&amp;gt; when the victim copies a cryptocurrency address to their computer’s temporary clipboard.&amp;lt;br&amp;gt;
The nickname “ YBCat ” advertised that same ToX ID on Carder[.]uk, where this user claimed ownership over the Telegram account @CookieDays , and said they could be hired to do software and bot development “of any level of complexity.” YBCat mostly sold “installs,” offering paying customers to ability to load malware of their choice on thousands of hacked computers simultaneously.&amp;lt;br&amp;gt;
There is also an active user named Binrs on the Russian crime forum wwh-club[.]co who says they’re a Rust coder who can be reached at the @CookieDays Telegram account.&amp;lt;br&amp;gt;
On the Russian forum Lolzteam, a member with the username “ DuckerMan ” uses the @CookieDays Telegram account in his signature. In one thread, DuckerMan promotes an affiliate program called CookieDays that lets people make money by getting others to install cryptomining programs that are infected with malware. In another thread, DuckerMan is selling a different clipboard hijacking program called Chloe Clipper.&amp;lt;br&amp;gt;
The CookieDays moneymaking program.&amp;lt;br&amp;gt;
According to threat intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.flashpoint-intel.com&amp;#34;&amp;gt;Flashpoint&amp;lt;/a&amp;gt; , the Telegram user DuckerMan employed another alias — Sergey Duck . These accounts were most active in the Telegram channels “Bank Accounts Selling,” “Malware developers community,” and “Raidforums,” a popular English-language cybercrime forum. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/who-wrote-the-alphv-blackcat-ransomware-strain/#more-58279&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/who-wrote-the-alphv-blackcat-ransomware-strain/&amp;#34;&amp;gt;Who Wrote the ALPHV/BlackCat Ransomware Strain?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20220128-121634/</link>
      <pubDate>Fri, 28 Jan 2022 12:16:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20220128-121634/</guid>
      <description>Blog&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220128-041808/</link>
      <pubDate>Fri, 28 Jan 2022 04:18:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220128-041808/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health&amp;#34;&amp;gt;Tech Can Help Solve Our Mental Health Crisis. But We Can’t Forget The Human Element.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health&amp;#34;&amp;gt;Tom Insel was the director of the National Institute of Mental Health from 2002-2015 and led the mental health team at Alphabet&amp;#39;s Verily. Tech alone can&amp;#39;t solve our mental health crisis, he writes.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/profile/55917650-thomas-insel&amp;#34;&amp;gt;Thomas Insel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220128-041305/</link>
      <pubDate>Fri, 28 Jan 2022 04:13:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220128-041305/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/W0W6fsJh4k&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/W0W6fsJh4k&amp;#34;&amp;gt;https://t.co/W0W6fsJh4k&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/DeVPiJcXAL&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/DeVPiJcXAL&amp;#34;&amp;gt;https://t.co/DeVPiJcXAL&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220127-161930/</link>
      <pubDate>Thu, 27 Jan 2022 16:19:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220127-161930/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/27/science/james-webb-space-telescope.html&amp;#34;&amp;gt;Out There With the James Webb Space Telescope, Humanity Did the Right Thing Every person on Earth shares in the quest that the giant observatory will now begin. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220127-121440/</link>
      <pubDate>Thu, 27 Jan 2022 12:14:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220127-121440/</guid>
      <description>Last summer an(other) unarmed black man was killed by police in Minneapolis, Minnesota. The subsequent 8 minute and 46 second video clip swept across social media and raised widespread condemnation. Hours of discourse and weeks of protests followed. Every company and their grandma released performative statements of solidarity with the…&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220127-081329/</link>
      <pubDate>Thu, 27 Jan 2022 08:13:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220127-081329/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/k50bCwdMvx&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/k50bCwdMvx&amp;#34;&amp;gt;https://t.co/k50bCwdMvx&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/VBPLNTxwvt&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/VBPLNTxwvt&amp;#34;&amp;gt;https://t.co/VBPLNTxwvt&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Notice with immediate effect: Anyone who disregards my Calendly links will be permabanned from raising venture capital in Silicon Valley.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220127-042037/</link>
      <pubDate>Thu, 27 Jan 2022 04:20:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220127-042037/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/04/30/code-style-and-moral-absolutes/&amp;#34;&amp;gt;Code style and moral absolutes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220127-001903/</link>
      <pubDate>Thu, 27 Jan 2022 00:19:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220127-001903/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292374/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$400 CLEAN&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292408/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$110 CLEAN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>privacy Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/evildoer/onionskin/20220127-001034/</link>
      <pubDate>Thu, 27 Jan 2022 00:10:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/evildoer/onionskin/20220127-001034/</guid>
      <description>Mozilla recently submitted its comments to a public consultation on reforming the UK’s data protection regime launched by the UK Department for Digital, Culture, Media &amp;amp;amp; Sport. With the public … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/11/29/mozilla-files-comments-on-uk-data-protection-consultation/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220126-201248/</link>
      <pubDate>Wed, 26 Jan 2022 20:12:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220126-201248/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/wl7NGwD8kX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/wl7NGwD8kX&amp;#34;&amp;gt;https://t.co/wl7NGwD8kX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/JSTVyBNzjI&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/JSTVyBNzjI&amp;#34;&amp;gt;https://t.co/JSTVyBNzjI&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220126-121429/</link>
      <pubDate>Wed, 26 Jan 2022 12:14:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220126-121429/</guid>
      <description>Strong endorse. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Cz6GUD22Tl&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Cz6GUD22Tl&amp;#34;&amp;gt;https://t.co/Cz6GUD22Tl&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20220126-081109/</link>
      <pubDate>Wed, 26 Jan 2022 08:11:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20220126-081109/</guid>
      <description>&amp;lt;p&amp;gt;A Chronicling of the Lyfe and Times of one Miss Pearl Twig Woods, who has Passed at a Young Age from Troubles of the Heart.  She is survived by Anise, her Arch Nemesis; Cheeseball, her Adoptive Ruffian; and Napoleon, her Star-Crossed Suitor for Whom she Longed from Afar.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2022/01/25/goodbye-pearl/&amp;#34;&amp;gt;Goodbye, Pearl&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/birthday/&amp;#34;&amp;gt;birthday&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/cats/&amp;#34;&amp;gt;cats&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/cheezball-rising/&amp;#34;&amp;gt;cheezball rising&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/culture/&amp;#34;&amp;gt;culture&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/doom/&amp;#34;&amp;gt;doom&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/dywypi/&amp;#34;&amp;gt;dywypi&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/eulogy/&amp;#34;&amp;gt;eulogy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/food/&amp;#34;&amp;gt;food&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/gadgets/&amp;#34;&amp;gt;gadgets&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/game-night/&amp;#34;&amp;gt;game night&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/gamedev/&amp;#34;&amp;gt;gamedev&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/gender/&amp;#34;&amp;gt;gender&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/git/&amp;#34;&amp;gt;git&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/identity/&amp;#34;&amp;gt;identity&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/infosec/&amp;#34;&amp;gt;infosec&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/isaacs-descent/&amp;#34;&amp;gt;isaac&amp;amp;#39;s descent&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/law/&amp;#34;&amp;gt;law&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/linux/&amp;#34;&amp;gt;linux&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/making-things/&amp;#34;&amp;gt;making things&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/mario-maker/&amp;#34;&amp;gt;mario maker&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/media/&amp;#34;&amp;gt;media&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/meta/&amp;#34;&amp;gt;meta&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/nsfw/&amp;#34;&amp;gt;nsfw&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/patreon/&amp;#34;&amp;gt;patreon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/perl/&amp;#34;&amp;gt;perl&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/personal/&amp;#34;&amp;gt;personal&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/photos/&amp;#34;&amp;gt;photos&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/php/&amp;#34;&amp;gt;php&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/plt/&amp;#34;&amp;gt;plt&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/pokemon/&amp;#34;&amp;gt;pokemon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/popular/&amp;#34;&amp;gt;popular&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/project-euler/&amp;#34;&amp;gt;project euler&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/puzzles/&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/pyramid/&amp;#34;&amp;gt;pyramid&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/python/&amp;#34;&amp;gt;python&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/raidne/&amp;#34;&amp;gt;raidne&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/reference/&amp;#34;&amp;gt;reference&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/runed-awakening/&amp;#34;&amp;gt;runed awakening&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/rust/&amp;#34;&amp;gt;rust&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/sanpera/&amp;#34;&amp;gt;sanpera&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/spline/&amp;#34;&amp;gt;spline&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/squiggle/&amp;#34;&amp;gt;squiggle&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/status/&amp;#34;&amp;gt;status&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/styx/&amp;#34;&amp;gt;styx&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/systems/&amp;#34;&amp;gt;systems&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/tech/&amp;#34;&amp;gt;tech&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/tools/&amp;#34;&amp;gt;tools&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/typography/&amp;#34;&amp;gt;typography&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/ui/&amp;#34;&amp;gt;ui&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/unicode/&amp;#34;&amp;gt;unicode&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/veekun/&amp;#34;&amp;gt;veekun&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/web/&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/tags/yelling/&amp;#34;&amp;gt;yelling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220126-001446/</link>
      <pubDate>Wed, 26 Jan 2022 00:14:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220126-001446/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/OynV4SXWEa&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/OynV4SXWEa&amp;#34;&amp;gt;https://t.co/OynV4SXWEa&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220125-202540/</link>
      <pubDate>Tue, 25 Jan 2022 20:25:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220125-202540/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-data-doppelgangers&amp;#34;&amp;gt;Podcast Episode: Data Doppelgängers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220125-202538/</link>
      <pubDate>Tue, 25 Jan 2022 20:25:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220125-202538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-data-doppelgangers&amp;#34;&amp;gt;Podcast Episode: Data Doppelgängers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220125-201847/</link>
      <pubDate>Tue, 25 Jan 2022 20:18:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220125-201847/</guid>
      <description>The ambitious observatory has arrived at its home — near a gravitationally special spot called L2 — for a premier view of the Universe.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220125-201412/</link>
      <pubDate>Tue, 25 Jan 2022 20:14:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220125-201412/</guid>
      <description>&amp;lt;p&amp;gt;The wait is over!&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;@pmarca at his best &amp;amp;hellip; in depth and unfiltered&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Apple: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/drwQ44qfGl&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/drwQ44qfGl&amp;#34;&amp;gt;https://t.co/drwQ44qfGl&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; Spotify: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HySEzG1arX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HySEzG1arX&amp;#34;&amp;gt;https://t.co/HySEzG1arX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; Youtube: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/QB9NbjcXKX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/QB9NbjcXKX&amp;#34;&amp;gt;https://t.co/QB9NbjcXKX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CyV2gT52Oy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CyV2gT52Oy&amp;#34;&amp;gt;https://t.co/CyV2gT52Oy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Shane Parrish &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/ShaneAParrish&amp;#34;&amp;gt;@ShaneAParrish&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Here&amp;#39;s my conversation with @pmarca.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;This one was epic. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/g8f5FXdEik&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/g8f5FXdEik&amp;#34;&amp;gt;https://t.co/g8f5FXdEik&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220125-200727/</link>
      <pubDate>Tue, 25 Jan 2022 20:07:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220125-200727/</guid>
      <description>What’s worse than finding out that identity thieves took out a 546 percent interest payday loan in your name? How about a 900 percent interest loan? Or how about not learning of the fraudulent loan until it gets handed off to collection agents? One reader’s nightmare experience spotlights what can happen when ID thieves and hackers start targeting online payday lenders.&amp;lt;br&amp;gt;
The reader who shared this story (and copious documentation to go with it) asked to have his real name omitted to avoid encouraging further attacks against his identity. So we’ll just call him “Jim.” Last May, someone applied for some type of loan in Jim’s name. The request was likely sent to an online portal that takes the borrower’s loan application details and shares them with multiple prospective lenders, because Jim said over the next few days he received dozens of emails and calls from lenders wanting to approve him for a loan.&amp;lt;br&amp;gt;
Many of these lenders were eager to give Jim money because they were charging exorbitant 500-900 percent interest rates for their loans. But Jim has long had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/09/credit-freezes-are-free-let-the-ice-age-begin/&amp;#34;&amp;gt;a security freeze on his credit file with the three major consumer credit reporting bureaus&amp;lt;/a&amp;gt; , and none of the lenders seemed willing to proceed without at least a peek at his credit history.&amp;lt;br&amp;gt;
Among the companies that checked to see if Jim still wanted that loan he never applied for last May was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.mountainsummitfinancial.com&amp;#34;&amp;gt;Mountain Summit Financial&amp;lt;/a&amp;gt; (MSF), a lending institution owned by a Native American tribe in California called the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.hpultribe-nsn.gov/&amp;#34;&amp;gt;Habematelol Pomo of Upper Lake&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Jim told MSF and others who called or emailed that identity thieves had applied for the funds using his name and information; that he would never take out a payday loan; and would they please remove his information from their database? Jim says MSF assured him it would, and the loan was never issued.&amp;lt;br&amp;gt;
Jim spent months sorting out that mess with MSF and other potential lenders, but after a while the inquiries died down. Then on Nov. 27 — Thanksgiving Day weekend — Jim got a series of rapid-fire emails from MSF saying they’ve received his loan application, that they’d approved it, and that the funds requested were now available at the bank account specified in his MSF profile.&amp;lt;br&amp;gt;
Curiously, the fraudsters had taken out a loan in Jim’s name with MSF using his real email address — the same email address the fraudsters had used to impersonate him to MSF back in May 2021. Although he didn’t technically have an account with MSF, their authentication system is based on email addresses, so Jim requested that a password reset link be sent to his email address. That worked, and once inside the account Jim could see more about the loan details:&amp;lt;br&amp;gt;
The terms of the unauthorized loan in Jim’s name from MSF.&amp;lt;br&amp;gt;
Take a look at that 546.56 percent interest rate and finance charges listed in this $1,000 loan. If you pay this loan off in a year at the suggested bi-weekly payment amounts, you will have paid $3,903.57 for that $1,000.&amp;lt;br&amp;gt;
Jim contacted MSF as soon as they opened the following week and found out the money had already been dispersed to a Bank of America account Jim didn’t recognize. MSF had Jim fill out an affidavit claiming the loan was the result of identity theft, which necessitated filing a report with the local police and a number of other steps. Jim said numerous calls to Bank of America’s fraud team went nowhere because they refused to discuss an account that was not in his name.&amp;lt;br&amp;gt;
Jim said MSF ultimately agreed that the loan wasn’t legitimate, but they couldn’t or wouldn’t tell him how his information got pushed through to a loan — even though MSF was never able to pull his credit file.&amp;lt;br&amp;gt;
Then in mid-January, Jim heard from MSF via snail mail that they’d discovered a data breach.&amp;lt;br&amp;gt;
“We believe the outsider may have had an opportunity to access the accounts of certain customers, including your account, at which point they would be able to view personal information pertaining to that customer and potentially obtain an unauthorized loan using the customer’s credentials,” MSF said.&amp;lt;br&amp;gt;
MSF said the personal information involved in this incident may have included name, date of birth, government-issued identification numbers (e.g., SSN or DLN), bank account number and routing number, home address, email address, phone number and other general loan information.&amp;lt;br&amp;gt;
A portion of the Jan. 14, 2022 breach notification letter from tribal lender Mountain Summit Financial.&amp;lt;br&amp;gt;
Nevermind that his information was only in MSF’s system because of an earlier attempt by ID thieves: The intruders were able to update his existing (never-deleted) record with new banking information and then push the application through MSF’s systems.&amp;lt;br&amp;gt;
“MSF was the target of a suspected third-party attack,” the company said, noting that it was working with the FBI, the California Sheriff’s Office, and the Tribal Commission for Lake County, Calif.  “Ultimately, MSF confirmed that these trends were part of an attack that originated outside of the company.”&amp;lt;br&amp;gt;
MSF has not responded to questions about the aforementioned third party or parties that may be involved. But it is possible that other tribal lenders could have been affected: Jim said that not long after the phony MSF payday loan was pushed through, he received at least three inquiries in rapid succession from other lenders who were all of a sudden interested in offering him a loan.&amp;lt;br&amp;gt;
In a statement sent to KrebsOnSecurity, MSF said it was “the victim of a malicious attack that originated outside of the company, by unknown perpetrators.”&amp;lt;br&amp;gt;
“As soon as the issue was uncovered, the company initiated cybersecurity incident response measures to protect and secure its information; and notified law enforcement and regulators,” MSF wrote. “Additionally, the company has notified individuals whose personal identifiable information may have been impacted by this crime and is actively working with law enforcement in its investigation. As this is an ongoing criminal investigation, we can make no additional comment at this time.”&amp;lt;br&amp;gt;
According to the Native American Financial Services Association (NAFSA), a trade group in Washington, D.C. representing tribal lenders, the short-term installment loan products offered by NAFSA members are not payday loans but rather “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nativefinance.org/truth-tribal-lending/&amp;#34;&amp;gt;installment loans&amp;lt;/a&amp;gt; ” — which are amortized, have a definite loan term, and require payments that go toward not just interest, but that also pay down the loan principal.&amp;lt;br&amp;gt;
NAFSA did not respond to multiple requests for comment.&amp;lt;br&amp;gt;
Nearly all U.S. states have usury laws that limit the amount of interest a company can charge on a loan, but those limits traditionally haven’t applied to tribal lenders. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/scary-fraud-ensues-when-id-theft-usury-collide/#more-58202&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/scary-fraud-ensues-when-id-theft-usury-collide/&amp;#34;&amp;gt;Scary Fraud Ensues When ID Theft &amp;amp;amp; Usury Collide&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20220125-162035/</link>
      <pubDate>Tue, 25 Jan 2022 16:20:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20220125-162035/</guid>
      <description>Good news: we removed all cookie banners from GitHub! No one likes cookie banners. But cookie banners are everywhere. So how did we pull this off? Well, EU law requires you to use cookie banners if your website contains cookies that are not required for it to work. Common examples of such cookies are […]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20220125-122042/</link>
      <pubDate>Tue, 25 Jan 2022 12:20:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20220125-122042/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-04-19-open-source-goes-to-mars/&amp;#34;&amp;gt;Open source goes to Mars 🚀&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Good news: we removed all cookie banners from GitHub! 🎉 No one likes cookie banners. But cookie banners are everywhere. So how did we pull this off? Well, EU law requires you to use cookie banners if your website contains cookies that are not required for it to work. Common examples of such cookies are […]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>From the Canyon Edge</title>
      <link>https://www.whatsupup.com/blog/audiometry/cottony/20220125-042206/</link>
      <pubDate>Tue, 25 Jan 2022 04:22:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/audiometry/cottony/20220125-042206/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/reHackable/awesome-reMarkable&amp;#34;&amp;gt;dustinkirkland starred reHackable/awesome-reMarkable&amp;lt;/a&amp;gt; - 1/24/2022&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20220125-042038/</link>
      <pubDate>Tue, 25 Jan 2022 04:20:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20220125-042038/</guid>
      <description>&amp;lt;p&amp;gt;November 17, 2021&amp;lt;br&amp;gt;
The modern internet was built on a legal framework of safe harbors for user-generated content. These safe harbors are widely credited with having enabled global internet innovation by protecting online platforms from liability for user content they host. Despite this, they are increasingly at risk around the world as regulators look to curb objectionable content […]&amp;lt;br&amp;gt;
At GitHub, we put developers first, and we work hard to provide a safe, open, and inclusive platform for code collaboration. This means we are committed to minimizing the disruption of software projects, protecting developer privacy, and being transparent with developers about content moderation and disclosure of user information. This kind of transparency is vital […]&amp;lt;br&amp;gt;
We regularly update our policies to reflect the evolution of our products, changing legal requirements, and user feedback. In this update, we’ve made some changes to our Terms of Service, Privacy Statement, and other site policies. We’ve also made some updates to the process for updating our site policies. We welcome your feedback in our […]&amp;lt;br&amp;gt;
As policymakers grapple with how to address hate speech and disinformation on the internet, they’re eying the legal structure underpinning collaborative software development: legal safe harbors. These safe harbors protect online platforms from liability for the user content that they host, and without these safe harbors, countless user-generated content platforms like GitHub wouldn’t be here […]&amp;lt;br&amp;gt;
We&amp;#39;re excited to share GitHub’s 2018 Transparency Report, a by-the-numbers look at how we handle requests for user data and moderate content on GitHub.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2018-11-15-global-commitments-on-building-an-internet-of-trust/&amp;#34;&amp;gt;Developers on the world stage—global commitments on building an internet of trust&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
At the Paris Peace Forum and the Internet Governance Forum, governments, companies, and civil society made commitments to building an internet of trust. Developers are central to making these commitments a reality.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2018-10-23-github-goes-to-brussels/&amp;#34;&amp;gt;EU copyright update: GitHub goes to Brussels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Read about our open source and copyright event in Brussels–plus the latest on the EU copyright negotiations.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2018-09-17-whats-next-for-the-eu-copyright-proposal/&amp;#34;&amp;gt;What’s next for the EU copyright proposal?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
EU Parliament voted last week on the Copyright Directive. Find out what they decided, how this affects software, and what you can do next.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20220125-042025/</link>
      <pubDate>Tue, 25 Jan 2022 04:20:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20220125-042025/</guid>
      <description>&amp;lt;p&amp;gt;November 3, 2021&amp;lt;br&amp;gt;
Today, we&amp;#39;re launching a technical preview of GitHub Copilot, a new AI pair programmer that helps you write better code.&amp;lt;br&amp;gt;
This morning, we watched in awe as the first Mars Helicopter, Ingenuity, took flight in the thin Martian atmosphere. This is an incredible achievement for the teams at NASA and the Jet Propulsion Lab (JPL). It’s also an achievement powered, in part, by an invisible team of open source developers from around the world. In […]&amp;lt;br&amp;gt;
We&amp;#39;re excited to announce that npm will be joining GitHub.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-01-07-new-year-new-github/&amp;#34;&amp;gt;New year, new GitHub: Announcing unlimited free private repos and unified Enterprise offering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Today we’re announcing two major updates to make GitHub more accessible to developers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2018-10-26-github-and-microsoft/&amp;#34;&amp;gt;Pull request successfully merged. Starting build…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
With the Microsoft acquisition of GitHub complete, Nat Friedman joins as CEO.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220125-041408/</link>
      <pubDate>Tue, 25 Jan 2022 04:14:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220125-041408/</guid>
      <description>RIP my father-in-law and hero John Arrillaga, 1937-2022. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SxCb6j9kNu&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SxCb6j9kNu&amp;#34;&amp;gt;https://t.co/SxCb6j9kNu&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220125-002420/</link>
      <pubDate>Tue, 25 Jan 2022 00:24:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220125-002420/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290758/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$80&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292380/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$5,660 chair&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220125-002318/</link>
      <pubDate>Tue, 25 Jan 2022 00:23:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220125-002318/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00128-0&amp;#34;&amp;gt;Webb telescope reaches its final destination far from Earth&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The ambitious observatory has arrived at its home — near a gravitationally stable spot called L2 — for a premier view of the Universe.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220124-202030/</link>
      <pubDate>Mon, 24 Jan 2022 20:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220124-202030/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/24/technology/google-location-services-lawsuit.html&amp;#34;&amp;gt;Four Attorneys General Claim Google Secretly Tracked People Three states and the District of Columbia allege that the tech giant misled consumers by continuing to track those who had changed their privacy settings to prevent data collection. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220124-042341/</link>
      <pubDate>Mon, 24 Jan 2022 04:23:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220124-042341/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2016/09/20/the-generic-random-library-part-1-simple-generic-arbitrary-instances/&amp;#34;&amp;gt;The generic-random library, part 1: simple generic Arbitrary instances&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220124-041731/</link>
      <pubDate>Mon, 24 Jan 2022 04:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220124-041731/</guid>
      <description>all the things?&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Last week someone posted a /r/cpp thread titled &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://old.reddit.com/r/cpp/comments/s823vk/declaring_all_variables_local_to_a_function_as/&amp;#34;&amp;gt;“Declaring all variables local to a function as const”&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
Ok, so I’m an old-school C&#43;&#43; programmer using the language now since the early ’90s.
I’m a fan of const-correctness for function and member declarations, parameters, and
the like. Where, I believe, it actually matters.&amp;lt;br&amp;gt;
Now we have a team member who has jumped on the “everything is const” bandwagon.
Every code review includes dozens of lines of local function variables now declared&amp;lt;br&amp;gt;
that litter the review.&amp;lt;br&amp;gt;
Intellectually, I understand the (what I consider mostly insignificant) arguments
in favor of this practice, but in nearly 30 years I have never had a bug introduced
into my code because a local function variable was mutable when I didn’t expect it.
It does nothing for me to aid in code analysis or tracking. It has at most a tiny
impact on performance.&amp;lt;br&amp;gt;
Maybe I’m just an old dog finally unable to learn a new trick. So, on this fine
Wednesday, who’s up for a religious war? What are y’all doing?&amp;lt;br&amp;gt;
TLDR: I’m not putting&amp;lt;br&amp;gt;
on all the things, either.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220124-041633/</link>
      <pubDate>Mon, 24 Jan 2022 04:16:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220124-041633/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/16/Pulp-Fiction&amp;#34;&amp;gt;Pulp Fiction&amp;lt;/a&amp;gt; · A dozen years ago, our growing family created a problem: Too many books! So after I finished &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/200x/2009/06/12/Music-Migration-Done&amp;#34;&amp;gt;ripping our thousand CDs&amp;lt;/a&amp;gt; , we repurposed the CD rack into a     bookcase, stuffed it with our genre paperbacks, and put it in the guest room.  A few years later, the guest room became our     son’s room and the pulp fiction went into boxes. But just now after another bout of domestic reorganization, they’re back out     among us. I find their dingy colorful presence cheering. Check out the picture! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/16/Pulp-Fiction&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [6 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220123-121229/</link>
      <pubDate>Sun, 23 Jan 2022 12:12:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220123-121229/</guid>
      <description>&amp;lt;p&amp;gt;FS &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/farnamstreet&amp;#34;&amp;gt;@farnamstreet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@morganhousel @pmarca @ShaneAParrish This lines up with what Historian John Lewis Gaddis told us. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/f9uWnKHljD&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/f9uWnKHljD&amp;#34;&amp;gt;https://t.co/f9uWnKHljD&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Morgan Housel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/morganhousel&amp;#34;&amp;gt;@morganhousel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;amp;quot;What people think of as technological change is actually societal change and specifically societal change of the form of a reordering of the power and status structure.&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;The further back I read the more universal themes I find. And the more things that I think are remarkable and unique to our era actually turn out to be quite universal.&amp;amp;quot;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Good podcast with @pmarca and @ShaneAParrish. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/5D07JXL90J&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/5D07JXL90J&amp;#34;&amp;gt;https://t.co/5D07JXL90J&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220122-041024/</link>
      <pubDate>Sat, 22 Jan 2022 04:10:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220122-041024/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/event-driven-architecture-and-reactive-programming/&amp;#34;&amp;gt;This article will look at the terminology of event-driven architecture and reactive programming, and the problems they are trying to solve.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220122-002312/</link>
      <pubDate>Sat, 22 Jan 2022 00:23:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220122-002312/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/21/technology/twitter-security-team.html&amp;#34;&amp;gt;Twitter shakes up its security team. Parag Agrawal, the new chief executive, fired the company’s head of security this week. Twitter’s chief information security officer is also leaving. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220122-001500/</link>
      <pubDate>Sat, 22 Jan 2022 00:15:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220122-001500/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/GyvWv8UI8w&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/GyvWv8UI8w&amp;#34;&amp;gt;https://t.co/GyvWv8UI8w&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/wBh7mdeL5g&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/wBh7mdeL5g&amp;#34;&amp;gt;https://t.co/wBh7mdeL5g&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HG4DM8Eubi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HG4DM8Eubi&amp;#34;&amp;gt;https://t.co/HG4DM8Eubi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/oX4tvkk20a&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/oX4tvkk20a&amp;#34;&amp;gt;https://t.co/oX4tvkk20a&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220121-201336/</link>
      <pubDate>Fri, 21 Jan 2022 20:13:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220121-201336/</guid>
      <description>The head chef presenting the first course during dinner at @jack&amp;#39;s. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/qXmPP1ucw4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/qXmPP1ucw4&amp;#34;&amp;gt;https://t.co/qXmPP1ucw4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220121-200716/</link>
      <pubDate>Fri, 21 Jan 2022 20:07:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220121-200716/</guid>
      <description>Up for the “Most Meta Cybercrime Offering” award this year is Accountz Club , a new cybercrime store that sells access to purloined accounts at services built for cybercriminals, including shops peddling stolen payment cards and identities, spamming tools, email and phone bombing services, and those selling authentication cookies for a slew of popular websites.&amp;lt;br&amp;gt;
Criminals ripping off other crooks is a constant theme in the cybercrime underworld; Accountz Club’s slogan  — “the best autoshop for your favorite shops’ accounts” — just normalizes this activity by making logins stolen from users of various cybercrime shops for sale at a fraction of their account balances.&amp;lt;br&amp;gt;
The site says it sells “cracked” accounts, or those that used passwords which could be easily guessed or enumerated by automated tools. All of the credentials being sold by Accountz provide access to services that in turn sell access to stolen information or hijacked property, as in the case of “bot shops” that resell access to infected computers.&amp;lt;br&amp;gt;
One example is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://digitalshadows.com/blog-and-research/the-technology-adoption-lifecycle-of-genesis-market/&amp;#34;&amp;gt;Genesis Market&amp;lt;/a&amp;gt; , where customers can search for stolen credentials and authentication cookies from a broad range of popular online destinations. Genesis even offers a custom-made web browser where you can load authentication cookies from botted PCs and waltz right into the account without having to enter a username or password or mess with multi-factor authentication.&amp;lt;br&amp;gt;
Accountz is currently selling four different Genesis logins for about 40-50 percent of their unspent balances. Genesis mostly gets its inventory of botted computers and stolen logins from resellers who specialize in deploying infostealer malware via email and booby-trapped websites. Likewise, it appears Accountz also derives much of its stock from a handful of resellers, who presumably are the same ones doing the cybercrime service account cracking.&amp;lt;br&amp;gt;
The Genesis bot shop.&amp;lt;br&amp;gt;
In essence, Accountz customers are paying for illicit access to cybercrime services that sell access to compromised resources that can be abused for cybercrime. That’s seriously meta. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/crime-shop-sells-hacked-logins-to-other-crime-shops/#more-58194&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“This is Russian ransomware diplomacy,” Alperovitch said on Twitter.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/crime-shop-sells-hacked-logins-to-other-crime-shops/&amp;#34;&amp;gt;Crime Shop Sells Hacked Logins to Other Crime Shops&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220121-121944/</link>
      <pubDate>Fri, 21 Jan 2022 12:19:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220121-121944/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/21/technology/twitter-security-team.html&amp;#34;&amp;gt;Twitter shakes up its security team. Parag Agrawal, Twitter’s new chief executive, terminated the company’s head of security this week. Twitter’s chief information security officer is also leaving. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220121-121533/</link>
      <pubDate>Fri, 21 Jan 2022 12:15:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220121-121533/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/01/zooming-in-on-zero-click-exploits.html&amp;#34;&amp;gt;Zooming in on Zero-click Exploits&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220121-081944/</link>
      <pubDate>Fri, 21 Jan 2022 08:19:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220121-081944/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/21/technology/twitter-security-team.html&amp;#34;&amp;gt;Twitter Shakes Up Security Team Parag Agrawal, Twitter’s new chief executive, terminated the company’s head of security this week. Twitter’s chief information security officer is also leaving. By Mike Isaac and Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220121-081724/</link>
      <pubDate>Fri, 21 Jan 2022 08:17:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220121-081724/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/cooling-stock-market-has-some-tech&amp;#34;&amp;gt;Cooling Stock Market Has Some Tech Giant Employees Exploring Their Options&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/cooling-stock-market-has-some-tech&amp;#34;&amp;gt;Stock-based compensation is less exciting when the stock goes down.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220121-081237/</link>
      <pubDate>Fri, 21 Jan 2022 08:12:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220121-081237/</guid>
      <description>It&amp;#39;s times like this when I&amp;#39;m glad I turned leadership of the World Economic Forum over to @jack. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/5Os991fpn8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/5Os991fpn8&amp;#34;&amp;gt;https://t.co/5Os991fpn8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220121-041624/</link>
      <pubDate>Fri, 21 Jan 2022 04:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220121-041624/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00108-4&amp;#34;&amp;gt;Has Biden followed the science? What researchers say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
As the US president’s first year in office ends, Nature assesses whether he’s kept his promise to make evidence-based decisions.&amp;lt;br&amp;gt;
Max Kozlov&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220121-001724/</link>
      <pubDate>Fri, 21 Jan 2022 00:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220121-001724/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104289797/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$29,000 1935 Harley Davidson Trike&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292274/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$47,000 2019 Tesla Model 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292174/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$200 Sony PlayStation 4 ,PS4 Original Slim Pro 500GB 1TB 2TB Choi&amp;amp;hellip;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292171/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$600 Apple MacBook Air 13.3&amp;amp;quot; M1 Chip 8GB 512GB SSD 2020 Model Spa&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220121-001646/</link>
      <pubDate>Fri, 21 Jan 2022 00:16:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220121-001646/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/technology/big-tech-senate-bill.html&amp;#34;&amp;gt;Efforts to Rein In Big Tech May Be Running Out of Time With midterm elections approaching, a vote taken on Thursday could be the first of several that Congress takes on bills aimed at the industry. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220120-201734/</link>
      <pubDate>Thu, 20 Jan 2022 20:17:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220120-201734/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/technology/big-tech-senate-bill.html&amp;#34;&amp;gt;Efforts to Rein in Big Tech May Be Running Out of Time With midterm elections approaching, a vote taken on Thursday could be the first of several that Congress takes on bills aimed at the industry. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220120-161635/</link>
      <pubDate>Thu, 20 Jan 2022 16:16:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220120-161635/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/technology/big-tech-senate-bill.html&amp;#34;&amp;gt;Efforts to Rein in Big Tech May Be Running Out of Time With midterm elections approaching, a vote expected on Thursday could be the first of several that Congress takes on bills aimed at the industry. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220120-161442/</link>
      <pubDate>Thu, 20 Jan 2022 16:14:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220120-161442/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slogans&amp;#34;&amp;gt;slogans&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#sre&amp;#34;&amp;gt;sre&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Two economists are walking down the street. One of them notices
what appears to be a $100 bill just lying on the sidewalk, and
points it out to the other. “Nonsense,” declares his friend.
“If that were a real $100 bill, someone would have picked it
up already.”&amp;lt;br&amp;gt;
Before you read this post — which contains spoilers — you should read &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2022/01/06/memcached-interview/&amp;#34;&amp;gt;“The best engineering interview question I’ve ever gotten, Part 1”&amp;lt;/a&amp;gt; (2022-01-06).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220120-121721/</link>
      <pubDate>Thu, 20 Jan 2022 12:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220120-121721/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/20/science/milky-way-local-bubble-stars.html&amp;#34;&amp;gt;Out There A New Map of the Sun’s Local Bubble At the edge of a vast region devoid of gas and dust, scientists find an explanation for “how all nearby star formation began.” By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220120-081332/</link>
      <pubDate>Thu, 20 Jan 2022 08:13:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220120-081332/</guid>
      <description>310 Followers&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220120-000612/</link>
      <pubDate>Thu, 20 Jan 2022 00:06:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220120-000612/</guid>
      <description>These days, ID.me is perhaps better known as the online identity verification service that many states now use to help stanch the loss of billions of dollars in unemployment insurance and pandemic assistance stolen each year by identity thieves. The privately-held company says it has approximately 64 million users, and gains roughly 145,000 new users each day.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220119-200648/</link>
      <pubDate>Wed, 19 Jan 2022 20:06:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220119-200648/</guid>
      <description>If you created an online account to manage your tax records with the U.S. Internal Revenue Service (IRS), those login credentials will cease to work later this year. The agency says that by the summer of 2022, the only way to log in to irs.gov will be through ID.me , an online identity verification service that requires applicants to submit copies of bills and identity documents, as well as a live video feed of their faces via a mobile device.&amp;lt;br&amp;gt;
The IRS says it will require ID.me for all logins later this summer.&amp;lt;br&amp;gt;
McLean, Va.-based ID.me was originally launched in 2010 with the goal of helping e-commerce sites validate the identities of customers who might be &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shop.id.me/&amp;#34;&amp;gt;eligible for discounts&amp;lt;/a&amp;gt; at various retail establishments, such as veterans, teachers, students, nurses and first responders.&amp;lt;br&amp;gt;
These days, ID.me is perhaps better known as the online identity verification service that many states now use to help staunch the loss of billions of dollars in unemployment insurance and pandemic assistance stolen each year by identity thieves. The privately-held company says it has approximately 64 million users, and gains roughly 145,000 new users each day.&amp;lt;br&amp;gt;
Some 27 states already use ID.me to screen for identity thieves applying for benefits in someone else’s name, and now the IRS is joining them. The service requires applicants to supply a great deal more information than typically requested for online verification schemes, such as scans of their driver’s license or other government-issued ID, copies of utility or insurance bills, and details about their mobile phone service.&amp;lt;br&amp;gt;
When an applicant doesn’t have one or more of the above — or if something about their application triggers potential fraud flags — ID.me may require a recorded, live video chat with the person applying for benefits.&amp;lt;br&amp;gt;
Since my credentials at the IRS will soon no longer work, I opted to create an ID.me account and share the experience here. An important preface to this walk-through is that verifying one’s self with Id.me requires one to be able to take a live, video selfie — either with the camera on a mobile device or a webcam attached to a computer (your webcam must be able to open on the device you’re using to apply for the ID.me account). &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/irs-will-soon-require-selfies-for-online-access/#more-58154&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/irs-will-soon-require-selfies-for-online-access/&amp;#34;&amp;gt;IRS Will Soon Require Selfies for Online Access&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220119-161900/</link>
      <pubDate>Wed, 19 Jan 2022 16:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220119-161900/</guid>
      <description>January 19, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/01/19/Help-Chile-promote-digital-freedoms.html&amp;#34;&amp;gt;Help Chile write free software values, privacy, and digital sovereignty into their constitution&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20220119-161627/</link>
      <pubDate>Wed, 19 Jan 2022 16:16:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20220119-161627/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/blog/smartcar-series-b-funding/&amp;#34;&amp;gt;Announcing Smartcar&amp;#39;s $24M Series B Funding&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20220119-161455/</link>
      <pubDate>Wed, 19 Jan 2022 16:14:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20220119-161455/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2022/01/reducing-security-risks-in-open-source.html&amp;#34;&amp;gt;Reducing Security Risks in Open Source Software at Scale: Scorecards Launches V4&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Laurent Simon and Azeem Shaikh, Google Open Source Security Team (GOSST)&amp;lt;br&amp;gt;
Since our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/measuring-security-risks-in-open-source.html&amp;#34;&amp;gt;July announcement&amp;lt;/a&amp;gt; of Scorecards V2, the Scorecards project—an automated security tool to flag risky supply chain practices in open source projects—has grown steadily to over 40 unique contributors and 18 implemented security checks. Today we are proud to announce the V4 release of Scorecards, with larger scaling, a new security check, and a new Scorecards GitHub Action for easier security automation. The Scorecards Action is released in partnership with GitHub and is available from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/marketplace/actions/ossf-scorecard-action&amp;#34;&amp;gt;GitHub&amp;amp;#39;s Marketplace&amp;lt;/a&amp;gt; . The Action makes using Scorecards easier than ever: it runs automatically on repository changes to alert developers about risky supply-chain practices. Maintainers can view the alerts on GitHub&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/managing-code-scanning-alerts-for-your-repository&amp;#34;&amp;gt;code scanning dashboard&amp;lt;/a&amp;gt; , which is available for free to public repositories on GitHub.com and via GitHub Advanced Security for private repositories. Additionally, we have scaled our weekly Scorecards scans to over one million GitHub repositories, and have partnered with the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://deps.dev/&amp;#34;&amp;gt;Open Source Insights&amp;lt;/a&amp;gt; website for easy user access to the data. For more details about the release, including the new Dangerous-Workflow security check, visit the OpenSSF&amp;amp;#39;s official blog post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220119-122046/</link>
      <pubDate>Wed, 19 Jan 2022 12:20:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220119-122046/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292175/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$1,260 50CC TRIKE MEAN DOGG II SCOOTER GAS MOPED&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292107/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$3,000 Joss West Pool Cue….&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292141/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$300 P s 5&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291898/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$700 Gibson 1949 TB150 5 string conversion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220119-082253/</link>
      <pubDate>Wed, 19 Jan 2022 08:22:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220119-082253/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/07/18/competitive-programming-in-haskell-cycle-decomposition-with-mutable-arrays/&amp;#34;&amp;gt;Competitive programming in Haskell: cycle decomposition with mutable arrays&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220119-042112/</link>
      <pubDate>Wed, 19 Jan 2022 04:21:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220119-042112/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/18/technology/video-games-activision-microsoft.html&amp;#34;&amp;gt;‘New Eyes’: Gamers Greet Microsoft’s Activision Deal With Guarded Optimism Some players, unhappy with Activision in recent years, said the Microsoft deal could reverse a decline in quality. By Erin Woo and Kellen Browning&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220119-041309/</link>
      <pubDate>Wed, 19 Jan 2022 04:13:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220119-041309/</guid>
      <description>Important clarification: I have been informed I am not actually the new Chairman of the WEF. Instead, it turns out I am the new Chairman of the WWE. I regret the error. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/edMe736vYR&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/edMe736vYR&amp;#34;&amp;gt;https://t.co/edMe736vYR&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
As my first act as Chairman, the World Economic Forum is hereby renamed Wef3. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0BNrfFaOWE&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0BNrfFaOWE&amp;#34;&amp;gt;https://t.co/0BNrfFaOWE&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Proud to announce my new job as Chairman of the World Economic Forum. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CaOSqTJVMj&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CaOSqTJVMj&amp;#34;&amp;gt;https://t.co/CaOSqTJVMj&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20220119-040936/</link>
      <pubDate>Wed, 19 Jan 2022 04:09:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20220119-040936/</guid>
      <description>© mmxxii pg&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220119-002552/</link>
      <pubDate>Wed, 19 Jan 2022 00:25:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220119-002552/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-how-private-is-your-bank-account&amp;#34;&amp;gt;Podcast Episode: How private is your bank account?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220119-002551/</link>
      <pubDate>Wed, 19 Jan 2022 00:25:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220119-002551/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-how-private-is-your-bank-account&amp;#34;&amp;gt;Podcast Episode: How private is your bank account?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220118-201935/</link>
      <pubDate>Tue, 18 Jan 2022 20:19:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220118-201935/</guid>
      <description>January 18, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/01/18/Pine64s-weird-priorities.html&amp;#34;&amp;gt;Pine64 should re-evaluate their community priorities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220118-201758/</link>
      <pubDate>Tue, 18 Jan 2022 20:17:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220118-201758/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2022/01/18/business/stock-market-economy-news/regulators-aim-to-rewrite-rules-for-big-mergers&amp;#34;&amp;gt;Regulators aim to rewrite rules for big mergers. U.S. antitrust leaders said they would focus on the tech industry’s free services as they strengthened the review process for corporate consolidation. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20220118-201606/</link>
      <pubDate>Tue, 18 Jan 2022 20:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20220118-201606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2022/01/zooming-in-on-zero-click-exploits.html&amp;#34;&amp;gt;Zooming in on Zero-click Exploits&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Natalie Silvanovich, Project Zero&amp;lt;br&amp;gt;
Zoom is a video conferencing platform that has gained popularity throughout the pandemic. Unlike other video conferencing systems that I have investigated, where one user initiates a call that other users must immediately accept or reject, Zoom calls are typically scheduled in advance and joined via an email invitation. In the past, I hadn’t prioritized reviewing Zoom because I believed that any attack against a Zoom client would require multiple clicks from a user. However, a zero-click attack against the Windows Zoom client was recently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.zoom.us/zoom-sponsors-pwn2own-security-competition/&amp;#34;&amp;gt;revealed&amp;lt;/a&amp;gt; at Pwn2Own, showing that it does indeed have a fully remote attack surface. The following post details my investigation into Zoom.&amp;lt;br&amp;gt;
This analysis resulted in two vulnerabilities being reported to Zoom. One was a buffer overflow that affected both Zoom clients and MMR servers, and one was an info leak that is only useful to attackers on MMR servers. Both of these vulnerabilities were fixed on November 24, 2021.&amp;lt;br&amp;gt;
Zoom Attack Surface Overview&amp;lt;br&amp;gt;
Zoom’s main feature is multi-user conference calls called meetings that support a variety of features including audio, video, screen sharing and in-call text messages. There are several ways that users can join Zoom meetings. To start, Zoom provides full-featured installable clients for many platforms, including Windows, Mac, Linux, Android and iPhone. Users can also join Zoom meetings using a browser link, but they are able to use fewer features of Zoom. Finally, users can join a meeting by dialing phone numbers provided in the invitation on a touch-tone phone, but this only allows access to the audio stream of a meeting. This research focused on the Zoom client software, as the other methods of joining calls use existing device features.&amp;lt;br&amp;gt;
Zoom clients support several communication features other than meetings that are available to a user’s Zoom Contacts. A Zoom Contact is a user that another user has added as a contact using the Zoom user interface. Both users must consent before they become Zoom Contacts. Afterwards, the users can send text messages to one another outside of meetings and start channels for persistent group conversations. Also, if either user hosts a meeting, they can invite the other user in a manner that is similar to a phone call: the other user is immediately notified and they can join the meeting with a single click. These features represent the zero-click attack surface of Zoom. Note that this attack surface is only available to attackers that have convinced their target to accept them as a contact. Likewise, meetings are part of the one-click attack surface only for Zoom Contacts, as other users need to click several times to enter a meeting.&amp;lt;br&amp;gt;
That said, it’s likely not that difficult for a dedicated attacker to convince a target to join a Zoom call even if it takes multiple clicks, and the way some organizations use Zoom presents interesting attack scenarios. For example, many groups host public Zoom meetings, and Zoom supports a paid Webinar feature where large groups of unknown attendees can join a one-way video conference. It could be possible for an attacker to join a public meeting and target other attendees. Zoom also relies on a server to transmit audio and video streams, and end-to-end encryption is off by default. It could be possible for an attacker to compromise Zoom’s servers and gain access to meeting data.&amp;lt;br&amp;gt;
Zoom Messages&amp;lt;br&amp;gt;
I started out by looking at the zero-click attack surface of Zoom. Loading the Linux client into IDA, it appeared that a great deal of its server communication occurred over XMPP. Based on strings in the binary, it was clear that XMPP parsing was performed using a library called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://camaya.net/gloox/&amp;#34;&amp;gt;gloox&amp;lt;/a&amp;gt; . I fuzzed this library using AFL and other coverage-guided fuzzers, but did not find any vulnerabilities. I then looked at how Zoom uses the data provided over XMPP.&amp;lt;br&amp;gt;
XMPP traffic seemed to be sent over SSL, so I located the SSL_write function in the binary based on log strings, and hooked it using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://frida.re/&amp;#34;&amp;gt;Frida&amp;lt;/a&amp;gt; . The output contained many XMPP stanzas (messages) as well as other network traffic, which I analyzed to determine how XMPP is used by Zoom. XMPP is used for most communication between Zoom clients outside of meetings, such as messages and channels, and is also used for signaling (call set-up) when a Zoom Contact invites another Zoom Contact to a meeting.&amp;lt;br&amp;gt;
I spent some time going through the client binary trying to determine how the client processes XMPP, for example, if a stanza contains a text message, how is that message extracted and displayed in the client. Even though the Zoom client contains many log strings, this was challenging, and I eventually asked my teammate Ned Williamson for help locating symbols for the client. He discovered that several old versions of the Android Zoom SDK contained symbols. While these versions are roughly five years old, and do not present a complete view of the client as they only include some libraries that it uses, they were immensely helpful in understanding how Zoom uses XMPP.&amp;lt;br&amp;gt;
Application-defined tags can be added to gloox’s XMPP parser by extending the class StanzaExtension and implementing the method newInstance to define how the tag is converted into a C&#43;&#43; object. Parsed XMPP stanzas are then processed using the MessageHandler class. Application developers extend this class, implementing the method handleMessage with code that performs application functionality based on the contents of the stanza received. Zoom implements its XMPP handling in CXmppIMSession::handleMessage , which is a large function that is an entrypoint to most messaging and calling features. The final processing stage of many XMPP tags is in the class ns_zoom_messager::CZoomMMXmppWrapper , which contains many methods starting with ‘On’ that handle specific events. I spent a fair amount of time analyzing these code paths, but didn’t find any bugs. Interestingly, Thijs Alkemade and Daan Keuper released a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sector7.computest.nl/post/2021-08-zoom/&amp;#34;&amp;gt;write-up&amp;lt;/a&amp;gt; of their Pwn2Own bug after I completed this research, and it involved a vulnerability in this area.&amp;lt;br&amp;gt;
RTP Processing&amp;lt;br&amp;gt;
Afterwards, I investigated how Zoom clients process audio and video content. Like all other video conferencing systems that I have analyzed, it uses Real-time Transport Protocol (RTP) to transport this data. Based on log strings included in the Linux client binary, Zoom appears to use a branch of WebRTC for audio. Since I have looked at this library a great deal in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-1.html&amp;#34;&amp;gt;previous&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/08/exploiting-android-messengers-part-1.html&amp;#34;&amp;gt;posts&amp;lt;/a&amp;gt; , I did not investigate it further. For video, Zoom implements its own RTP processing and uses a custom underlying codec named Zealot (libzlt).&amp;lt;br&amp;gt;
Analyzing the Linux client in IDA, I found what I believed to be the video RTP entrypoint, and fuzzed it using afl-qemu. This resulted in several crashes, mostly in RTP extension processing. I tried modifying the RTP sent by a client to reproduce these bugs, but it was not received by the device on the other side and I suspected the server was filtering it. I tried to get around this by enabling end-to-end encryption, but Zoom does not encrypt RTP headers, only the contents of RTP packets (as is typical of most RTP implementations).&amp;lt;br&amp;gt;
Curious about how Zoom server filtering works, I decided to set up &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.zoom.us/hc/en-us/articles/360034064852-Zoom-On-Premise-Deployment&amp;#34;&amp;gt;Zoom On-Premises Deployment&amp;lt;/a&amp;gt; . This is a Zoom product that allows customers to set up on-site servers to process their organization’s Zoom calls. This required a fair amount of configuration, and I ended up reaching out to the Zoom Security Team for assistance. They helped me get it working, and I greatly appreciate their contribution to this research.&amp;lt;br&amp;gt;
Zoom On-Premises Deployments consist of two hosts: the controller and the Multimedia Router (MMR) . Analyzing the traffic to each server, it became clear that the MMR is the host that transmits audio and video content between Zoom clients. Loading the code for the MMR process into IDA, I located where RTP is processed, and it indeed parses the extensions as a part of its forwarding logic and verifies them correctly, dropping any RTP packets that are malformed.&amp;lt;br&amp;gt;
The code that processes RTP on the MMR appeared different than the code that I fuzzed on the device, so I set up fuzzing on the server code as well. This was challenging, as the code was in the MMR binary, which was not compiled as a relocatable binary (more on this later). This meant that I couldn’t load it as a library and call into specific offsets in the binary as I usually do to fuzz binaries that don’t have source code available. Instead, I compiled my own fuzzing stub that called the function I wanted to fuzz as a relocatable that defined fopen , and loaded it using LD_PRELOAD when executing the MMR binary. Then my code would take control of execution the first time that the MMR binary called fopen , and was able to call the function being fuzzed.&amp;lt;br&amp;gt;
This approach has a lot of downsides, the biggest being that the fuzzing stub can’t accept command line parameters, execution is fairly slow and a lot of fuzzing tools don’t honor LD_PRELOAD on the target. That said, I was able to fuzz with code coverage using Mateusz Jurczyk’s excellent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/DrSancov&amp;#34;&amp;gt;DrSanCov&amp;lt;/a&amp;gt; , with no results.&amp;lt;br&amp;gt;
Packet Processing&amp;lt;br&amp;gt;
When analyzing RTP traffic, I noticed that both Zoom clients and the MMR server process a great deal of packets that didn’t appear to be RTP or XMPP. Looking at the SDK with symbols, one library appeared to do a lot of serialization: libssb_sdk.so. This library contains a great deal of classes with the methods load_from and save_to defined with identical declarations, so it is likely that they all implement the same virtual class.&amp;lt;br&amp;gt;
One parameter to the load_from methods is an object of class msg_db_t ,  which implements a buffer that supports reading different data types. Deserialization is performed by load_from methods by reading needed data from the msg_db_t object, and serialization is performed by save_to methods by writing to it.&amp;lt;br&amp;gt;
After hooking a few save_to methods with Frida and comparing …</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20220118-162130/</link>
      <pubDate>Tue, 18 Jan 2022 16:21:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20220118-162130/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/01/contributing-to-mdn-meet-the-contributors/&amp;#34;&amp;gt;Contributing to MDN: Meet the Contributors →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2022/01/contributing-to-mdn-meet-the-contributors/&amp;#34;&amp;gt;Contributing to MDN: Meet the Contributors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
If you’ve ever built anything with web technologies, you’re probably familiar with MDN Web Docs. With about 13,000 pages documenting how to use programming languages such as HTML, CSS and JavaScript, the site has about 8,000 people using it at any given moment. MDN relies on contributors to help maintain its ever-expanding and up to date documentation. We reached out to 4 long-time community contributors to talk about how and why they started contributing, why they kept going, and ask what advice they have for new contributors.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220118-081451/</link>
      <pubDate>Tue, 18 Jan 2022 08:14:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220118-081451/</guid>
      <description>Josh Kopelman &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/joshk&amp;#34;&amp;gt;@joshk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
One of my favorite pastimes when spending time with other VC&amp;#39;s is to try to decide which phase of the VC lifecycle they are currently in&amp;amp;hellip; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/8yjcI5O0cl&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/8yjcI5O0cl&amp;#34;&amp;gt;https://t.co/8yjcI5O0cl&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220118-001626/</link>
      <pubDate>Tue, 18 Jan 2022 00:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220118-001626/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/12/New-Years-Day&amp;#34;&amp;gt;New Year’s Day&amp;lt;/a&amp;gt; · In Vancouver, we have a tradition of going for a walk on New Year’s Day, no matter how foul the weather, if only to prove to     Other Canadians that the thing is possible.  2022 too, despite its being an extremely low-expectations year. And it wasn’t the worst     New Year’s Day beachwalk ever, so maybe it won’t be the worst year ever.  And it leaves me with advice for the world. But first… &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/12/New-Years-Day&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220117-201245/</link>
      <pubDate>Mon, 17 Jan 2022 20:12:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220117-201245/</guid>
      <description>Since we can&amp;#39;t make it to Davos this year&amp;amp;hellip; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HLuIwImJJ0&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HLuIwImJJ0&amp;#34;&amp;gt;https://t.co/HLuIwImJJ0&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Davos DeVille &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/DavosDeville&amp;#34;&amp;gt;@DavosDeville&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
SPECIAL ADDRESS: DAVOS UNLEASHED #WEF22 #WEF2022 #WIF2022 #davosunleashed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/vcDRLB05Fx&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/vcDRLB05Fx&amp;#34;&amp;gt;https://t.co/vcDRLB05Fx&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220117-161841/</link>
      <pubDate>Mon, 17 Jan 2022 16:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220117-161841/</guid>
      <description>Our use of cookies&amp;lt;br&amp;gt;
We use necessary cookies to make our site work. We also set performance and functionality cookies that help us make improvements by measuring traffic on our site. For more detailed information about the cookies we use, please see our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/privacy#cookies&amp;#34;&amp;gt;privacy policy&amp;lt;/a&amp;gt; . ✖&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220117-160709/</link>
      <pubDate>Mon, 17 Jan 2022 16:07:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220117-160709/</guid>
      <description>“This is Russian ransomware diplomacy,” Alperovitch said on Twitter. “It is a signal to the United States — if you don’t enact severe sanctions against us for invasion of Ukraine, we will continue to cooperate with you on ransomware investigations.”&amp;lt;br&amp;gt;
The REvil arrests were announced as many government websites in Ukraine were &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/14/world/europe/hackers-ukraine-government-sites.html&amp;#34;&amp;gt;defaced by hackers&amp;lt;/a&amp;gt; with an ominous message warning Ukrainians that their personal data was being uploaded to the Internet. “Be afraid and expect the worst,” the message warned. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/#more-58116&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220117-042107/</link>
      <pubDate>Mon, 17 Jan 2022 04:21:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220117-042107/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/10/28/collecting-attributes/&amp;#34;&amp;gt;Collecting attributes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220117-001945/</link>
      <pubDate>Mon, 17 Jan 2022 00:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220117-001945/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292107/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$3,000 Joss West Pool Cue….&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292141/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$300 P s 5&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20220117-000738/</link>
      <pubDate>Mon, 17 Jan 2022 00:07:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20220117-000738/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2022/01/16/hydra-states.html&amp;#34;&amp;gt;Hydra (Diablo 3 Season 25), simplified&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220116-041636/</link>
      <pubDate>Sun, 16 Jan 2022 04:16:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220116-041636/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291898/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$700 Gibson 1949 TB150 5 string conversion&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292109/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$800 Made by RC Designs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291531/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$39,984 2019 Tesla Model 3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290697/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$18,000 1977 Mercedes-Benz 450SL&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20220115-161820/</link>
      <pubDate>Sat, 15 Jan 2022 16:18:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20220115-161820/</guid>
      <description>January 15, 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2022/01/15/2022-01-15-The-RISC-V-experience.html&amp;#34;&amp;gt;The RISC-V experience&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220115-121809/</link>
      <pubDate>Sat, 15 Jan 2022 12:18:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220115-121809/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/15/technology/crypto-gamers-nfts.html&amp;#34;&amp;gt;Crypto Enthusiasts Meet Their Match: Angry Gamers Game publishers are offering NFTs, but skeptical gamers smell a moneymaking scheme and are fighting back. By Mike Isaac and Kellen Browning&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20220115-001713/</link>
      <pubDate>Sat, 15 Jan 2022 00:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20220115-001713/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ukraine-crisis-cyber-impact/no-lights-no-heat-no-money-thats-life-in-ukraine-during-cyber-warfare-idUSKBN2JO29P&amp;#34;&amp;gt;No lights, no heat, no money - that&amp;#39;s life in Ukraine during cyber warfare&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hackers who defaced and interrupted access to numerous Ukrainian government websites https://www.reuters.com/world/europe/exclusive-hackers-likely-used-software-administration-rights-third-party-hit-2022-01-14 on Friday could be setting the stage for more serious cyberattacks that would disrupt the lives of ordinary Ukrainians, experts said.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220115-001618/</link>
      <pubDate>Sat, 15 Jan 2022 00:16:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220115-001618/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/14/technology/facebook-antitrust-case.html&amp;#34;&amp;gt;States appeal a judge’s decision to throw out their Facebook antitrust case. The states’ central claim is that Facebook acquired competitors — particularly Instagram in 2012 and WhatsApp in 2014 — in a predatory manner, by crushing competition. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/14/business/martin-shkreli-barred.html&amp;#34;&amp;gt;Martin Shkreli is barred from the drug industry and ordered to repay $64.6 million. A federal judge found that Mr. Shkreli violated state and federal antitrust laws by trying to maintain a monopoly over a lifesaving drug and must pay back the excess profits. By Rebecca Robbins and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220115-001201/</link>
      <pubDate>Sat, 15 Jan 2022 00:12:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220115-001201/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/bPjrehGY26&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/bPjrehGY26&amp;#34;&amp;gt;https://t.co/bPjrehGY26&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/B1yVWx16Wq&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/B1yVWx16Wq&amp;#34;&amp;gt;https://t.co/B1yVWx16Wq&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Please join us in building American Dynamism! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/bPjrehGY26&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/bPjrehGY26&amp;#34;&amp;gt;https://t.co/bPjrehGY26&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220115-000608/</link>
      <pubDate>Sat, 15 Jan 2022 00:06:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220115-000608/</guid>
      <description>The Russian government said today it arrested 14 people accused of working for “ REvil ,” a particularly aggressive ransomware group that has extorted hundreds of millions of dollars from victim organizations. The Russian Federal Security Service (FSB) said the actions were taken in response to a request from U.S. officials, but many experts believe the crackdown is part of an effort to reduce tensions over Russian President Vladimir Putin’s decision to station 100,000 troops along the nation’s border with Ukraine.&amp;lt;br&amp;gt;
The FSB &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.fsb.ru/fsb/press/message/single.htm%21id%3D10439388%40fsbMessage.html&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; it arrested 14 REvil ransomware members, and searched more than two dozen addresses in Moscow, St. Petersburg, Leningrad and Lipetsk. As part of the raids, the FSB seized more than $600,000 US dollars, 426 million rubles (~$USD 5.5 million), 500,000 euros, and 20 “premium cars” purchased with funds obtained from cybercrime.&amp;lt;br&amp;gt;
“The search activities were based on the appeal of the US authorities, who reported on the leader of the criminal community and his involvement in encroaching on the information resources of foreign high-tech companies by introducing malicious software, encrypting information and extorting money for its decryption,” the FSB said. “Representatives of the US competent authorities have been informed about the results of the operation.”&amp;lt;br&amp;gt;
The FSB did not release the names of any of the individuals arrested, although a report from the Russian news agency TASS &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tass.ru/proisshestviya/13431845&amp;#34;&amp;gt;mentions two defendants&amp;lt;/a&amp;gt; : Roman Gennadyevich Muromsky , and Andrey Sergeevich Bessonov . Russian media outlet RIA Novosti released video footage from some of the raids:&amp;lt;br&amp;gt;
REvil is widely thought to be a reincarnation of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=gandcrab&amp;#34;&amp;gt;GandCrab&amp;lt;/a&amp;gt; , a Russian-language ransomware affiliate program that bragged of stealing more than $2 billion when it closed up shop in the summer of 2019. For roughly the next two years, REvil’s “Happy Blog” would churn out press releases naming and shaming dozens of new victims each week. A February 2021 analysis from researchers at IBM found the REvil gang &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ibm.com/security/data-breach/threat-intelligence&amp;#34;&amp;gt;earned more than $120 million in 2020 alone&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
But all that changed last summer, when REvil associates working with another ransomware group — DarkSide — attacked Colonial Pipeline , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/&amp;#34;&amp;gt;causing fuel shortages and price spikes across the United States&amp;lt;/a&amp;gt; . Just months later, a multi-country law enforcement operation allowed investigators &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;to hack into the REvil gang’s operations and force the group offline&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
In November 2021, Europol &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.europol.europa.eu/media-press/newsroom/news/five-affiliates-to-sodinokibi/revil-unplugged&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; it arrested seven REvil affliates who collectively made more than $230 million worth of ransom demands since 2019. At the same time, U.S. authorities &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/&amp;#34;&amp;gt;unsealed two indictments against a pair of accused REvil cybercriminals&amp;lt;/a&amp;gt; , which referred to the men as “REvil Affiliate #22” and “REvil Affiliate #23.”&amp;lt;br&amp;gt;
It is clear that U.S. authorities have known for some time the real names of REvil’s top captains and moneymakers. Last fall, President Biden told Putin that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cnbc.com/2021/07/09/ransomware-biden-presses-putin-to-disrupt-cybercriminals-in-russia.html&amp;#34;&amp;gt;he expects Russia to act&amp;lt;/a&amp;gt; when the United States shares information on specific Russians involved in ransomware activity.&amp;lt;br&amp;gt;
So why now? Russia has amassed approximately 100,000 troops along its southern border with Ukraine, and diplomatic efforts to defuse the situation have reportedly broken down. The Washington Post and other media outlets today &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/national-security/russia-ukraine-invasion-sabotage-operations/2022/01/14/769314a2-754f-11ec-8ec6-9d61f7afbe17_story.html&amp;#34;&amp;gt;report&amp;lt;/a&amp;gt; that the Biden administration has accused Moscow of sending saboteurs into Eastern Ukraine to stage an incident that could give Putin a pretext for ordering an invasion.&amp;lt;br&amp;gt;
“The most interesting thing about these arrests is the timing,” said Kevin Breen , director of threat research at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.immersivelabs.com&amp;#34;&amp;gt;Immersive Labs&amp;lt;/a&amp;gt; . “For years, Russian Government policy on cybercriminals has been less than proactive to say the least. With Russia and the US currently at the diplomatic table, these arrests are likely part of a far wider, multi-layered, political negotiation.”&amp;lt;br&amp;gt;
President Biden has warned that Russia can expect severe sanctions should it choose to invade Ukraine. But Putin in turn has said such sanctions could cause a complete break in diplomatic relations between the two countries.&amp;lt;br&amp;gt;
Dmitri Alperovitch , co-founder of and former chief technology officer for the security firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.crowdstrike.com&amp;#34;&amp;gt;CrowdStrike&amp;lt;/a&amp;gt; , called the REvil arrests in Russia “ransomware diplomacy.”&amp;lt;br&amp;gt;
“This is Russian ransomware diplomacy,” Alperovitch said on Twitter. “It is a signal to the United States — if you don’t enact severe sanctions against us for invasion of Ukraine, we will continue to cooperate with you on ransomware investigations.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/#more-58116&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/at-request-of-u-s-russia-rounds-up-14-revil-ransomware-affiliates/&amp;#34;&amp;gt;At Request of U.S., Russia Rounds Up 14 REvil Ransomware Affiliates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-201614/</link>
      <pubDate>Fri, 14 Jan 2022 20:16:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-201614/</guid>
      <description>If you already know what MetaMask does, skip this part.&amp;lt;br&amp;gt;
Yet another dependency: this time to something called “&amp;lt;br&amp;gt;
Update (1/14): the comments below discuss key generation in&amp;lt;br&amp;gt;
, but MetaMask uses a BIP39-based keyphrase, which means that most ECDSA keys are actually generated elsewhere (allegedly in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/bitcoinjs/bip39&amp;#34;&amp;gt;bitcoinjs/bip39&amp;lt;/a&amp;gt; ). In retrospect this should have been obvious to me, but thanks to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/kumavis_&amp;#34;&amp;gt;@kumavis_&amp;lt;/a&amp;gt; for pointing it out. I’m keeping the section below just to be complete, but this code (probably) isn’t used by MetaMask.&amp;lt;br&amp;gt;
A basic point to make here is that much of this review has come down to examining code that solves a single problem: (deterministically) sampling integers within a precise range. So far I’ve reviewed at least two different custom implementations of the same process, both with slightly different results. Why is the same code repeated so often? Just make this a subroutine so we can analyze it and be sure it’s working correctly.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220114-201340/</link>
      <pubDate>Fri, 14 Jan 2022 20:13:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220114-201340/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/?source=user_profile----------------------------------------&amp;#34;&amp;gt;Jaana Dogan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/followers?source=user_profile----------------------------------------&amp;#34;&amp;gt;9.98K Followers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/about?source=user_profile----------------------------------------&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Follow&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com&amp;#34;&amp;gt;Sign in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Get started&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;Jul 7, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Having end-to-end distributed traces is a huge challenge for any project. In distributed tracing, end-to-end tracing is a term often used to refer to traces that capture most components in a critical path. Imagine an HTTP request made to trigger a Lambda function. Being able to see the HTTP client…&amp;lt;br&amp;gt;
257&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?responsesOpen=true&amp;amp;source=user_profile---------0-------------------------------&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/why-is-metric-collection-still-a-hard-problem-in-2020-a901ba1e028f?source=user_profile---------1-------------------------------&amp;#34;&amp;gt;Why is metric collection still a hard problem in 2020?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Metric collection keeps being one of the hard problems. We’ve been collecting metrics for a very long time, so why is this a hard problem still in 2020? Our workloads are becoming larger and more sophisticated. In order to produce useful metric data, we are producing and collecting richer metric…&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/what-did-i-forget-by-working-for-the-same-company-c51b52ce2f8c?source=user_profile---------2-------------------------------&amp;#34;&amp;gt;What did I forget by working for the same company?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
“xooglers always be like ‘at google we…’ — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/devonbl/status/1329905383175929858&amp;#34;&amp;gt;devonbl&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A month into my departure from Google, I can relate to this. It annoys me probably more than my current coworkers at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/rakyll/status/1315068454873907200&amp;#34;&amp;gt;AWS&amp;lt;/a&amp;gt; because they know it’s ok to make comparisons when…&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/correlation-in-latency-analysis-419357b93287?source=user_profile---------3-------------------------------&amp;#34;&amp;gt;Correlation in Latency Analysis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
This article was my response to Amazon’s writing assessment when I was interviewed. I answered the question of “What is the most inventive or innovative thing you’ve done? It doesn’t have to be something that’s patented. …&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud?source=user_profile---------4-------------------------------&amp;#34;&amp;gt;Published in Google Cloud - Community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud/spanners-sql-story-79bda8bb632d?source=user_profile---------4-------------------------------&amp;#34;&amp;gt;· Jul 22, 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud/spanners-sql-story-79bda8bb632d?source=user_profile---------4-------------------------------&amp;#34;&amp;gt;Spanner’s SQL Story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Spanner is a distributed database Google initiated a while ago to build a highly available and highly consistent database for its own workloads. Spanner was initially built to be a key/value and was in a completely different shape than it is today and it had different goals. Since the beginning…&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud/how-does-spanner-avoid-single-point-of-failures-in-writes-4f7765cd894?source=user_profile---------5-------------------------------&amp;#34;&amp;gt;How Does Spanner Avoid Single Point of Failures in Writes?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Google’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/spanner&amp;#34;&amp;gt;Spanner&amp;lt;/a&amp;gt; is a relational database with 99.999% availability which translates to 5 mins of downtime a year. Spanner is a distributed system and can span multiple machines, multiple datacenters (and even geographical regions when configured). It splits the records automatically among its replicas and provides automatic failover. …&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/things-i-wished-more-developers-knew-about-databases-2d0178464f78?source=user_profile---------6-------------------------------&amp;#34;&amp;gt;Things I Wished More Developers Knew About Databases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A large majority of computer systems have some state and are likely to depend on a storage system. My knowledge on databases accumulated over time, but along the way our design mistakes caused data loss and outages. In data-heavy systems, databases are at the core of system design goals and…&amp;lt;br&amp;gt;
10.4K&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud/persistent-disks-and-replication-9b9412fd9565?source=user_profile---------7-------------------------------&amp;#34;&amp;gt;Persistent Disks and Replication&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
If you are a cloud user, you probably have seen how unconventional storage options can get. This is even true for disks you access from your virtual machines. There are not many ongoing conversations or references about the underlying details of core infrastructure. …&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/observability?source=user_profile---------8-------------------------------&amp;#34;&amp;gt;Published in Observability&#43;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/observability/health-availability-debuggability-5b0ab300b35c?source=user_profile---------8-------------------------------&amp;#34;&amp;gt;Health, Availability, Debuggability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
As we collect various observability signals from systems, it fosters a new conversation around the classification of the signals.&amp;lt;br&amp;gt;
There is a significant discussion on observability signals and even strong advocacy for one signal over the other. Metrics, events, logs, traces or others? …&amp;lt;br&amp;gt;
Show more&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/google-cloud/google-cloud-run-for-go-ec09ddbba111?source=user_profile---------9-------------------------------&amp;#34;&amp;gt;Google Cloud Run for Go&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Google Cloud recently launched a fully managed container execution environment called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com&amp;#34;&amp;gt;Cloud Run&amp;lt;/a&amp;gt; . It is an environment specifically for request-driven workloads. It provides autoscaling, scaling down to zero, pretty fast deployments, automatic HTTPS support, global names and more. Google Cloud Run doesn’t have language runtime restrictions as soon as the…&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://help.medium.com/hc/en-us?source=user_profile----------------------------------------&amp;#34;&amp;gt;Help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://policy.medium.com/medium-terms-of-service-9db0094a1e0f?source=user_profile----------------------------------------&amp;#34;&amp;gt;Legal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-161540/</link>
      <pubDate>Fri, 14 Jan 2022 16:15:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-161540/</guid>
      <description>I want to stress that this was an informal code review : I didn’t use any tooling, didn’t even download (most) code to my computer. In fact my “review” mostly involved poking around various Github repositories to see if I could find anything that immediately jumped out as incorrect, and failing that, at least could give me a feeling for the quality of MetaMask’s crypto code. (In fact I did about half the work on my phone while eating a burrito bowl at Chipotle.)&amp;lt;br&amp;gt;
And this last part isn’t just a personal gripe. My TL;DR is that finding and reviewing the correct code was made difficult because there were far too many different organizations owning the dependencies that led to the crypto routines themselves. This made me uncomfortable, given how much money these routines are responsible for securing.&amp;lt;br&amp;gt;
Since many readers have probably never used DeFi, I figure I should give a quick background here on “web3” and MetaMask in particular. If you know something about MetaMask, skip this part.&amp;lt;br&amp;gt;
Ok, so forget everything I did above. That was my mistake. I promise to come back to those newer code paths soon, but that’s for the future. My goal in this review was to look at MetaMask as it exists today. Apparently that means I need to look at Fedor’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/indutny/elliptic&amp;#34;&amp;gt;elliptic&amp;lt;/a&amp;gt; library.&amp;lt;br&amp;gt;
seems poorly defined and serves two slightly different purposes, triggered by a boolean flag — which is just omitted in some calls.&amp;lt;br&amp;gt;
A basic point to make here is that much of this review has come down to reviewing code that solves a simple problem: (deterministically) sampling integers within a precise range. So far I’ve reviewed at least two different custom implementations of the same process, both with slightly different results. Why is the same code repeated so often? Just make this a subroutine so we can analyze it and be sure it’s working correctly.&amp;lt;br&amp;gt;
Anyway the (possible) issues above probably don’t really matter. I’ll assume in most cases private keys are generated correctly using a secure random number generator, which takes the most obvious risks off the table.&amp;lt;br&amp;gt;
If you’re writing a security-critical routine like “sample random integer in a precise range,” write that routine one time , not multiple times. Please!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220114-041907/</link>
      <pubDate>Fri, 14 Jan 2022 04:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220114-041907/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/13/us/politics/jan-6-tech-subpoenas.html&amp;#34;&amp;gt;Jan. 6 Committee Subpoenas Four Big Tech Firms The panel investigating the attack on the Capitol is demanding information from Alphabet, Meta, Reddit and Twitter. By Luke Broadwater and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220114-041648/</link>
      <pubDate>Fri, 14 Jan 2022 04:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220114-041648/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-needs-to-stop-day-trading&amp;#34;&amp;gt;Congress Needs To Stop Day Trading, Says Sen. Mark Warner&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-needs-to-stop-day-trading&amp;#34;&amp;gt;“If you take these jobs of responsibility, you have to be willing to give up something,&amp;amp;quot; Warner tells Big Technology.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/profile/52351-alex-kantrowitz&amp;#34;&amp;gt;Alex Kantrowitz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about&amp;#34;&amp;gt;What is Big Technology?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive&amp;#34;&amp;gt;Archive&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about?sort=people&amp;#34;&amp;gt;Authors&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/account&amp;#34;&amp;gt;My Account&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-041546/</link>
      <pubDate>Fri, 14 Jan 2022 04:15:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20220114-041546/</guid>
      <description>NB: This post describes a very casual code review of a few cryptography functions used by MetaMask. It does not describe any vulnerabilities. If you’re the kind of person who likes a meandering and amateurish code review that goes absolutely nowhere, you’ll enjoy this post. Otherwise you might want to read something more exciting: I suggest Moxie’s recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://moxie.org/2022/01/07/web3-first-impressions.html&amp;#34;&amp;gt;post on web3&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
For reasons I can’t fully explain, the other day I decided that it might be fun to spend an hour or two investigating the cryptography used by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://metamask.io/&amp;#34;&amp;gt;MetaMask&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
For those who aren’t familiar with the tool, MetaMask is a browser-based cryptocurrency wallet that is used used to access decentralized applications (dapps) on networks like Ethereum. My interest in MetaMask is mostly just based on curiosity: I recently invested about $100 into a decentralized finance application and I wanted to see how safe it really was. While there are lots of different ways I could lose that money, taking a look at MetaMask’s crypto seemed like as good a place to start as any.&amp;lt;br&amp;gt;
I want to stress that this was an extremely casual code review : I didn’t use any tooling, didn’t even download (most) code to my computer. In fact my “review” mostly involved poking around various Github repositories to see if I could find anything that immediately jumped out as incorrect, and failing that, at least could give me a feeling for the quality of MetaMask’s crypto code. (In fact I did about half the work on my phone while eating a burrito bowl at Chipotle.)&amp;lt;br&amp;gt;
After an hour or two of hunting through dependencies, I made the mistake of tweeting about my feelings:&amp;lt;br&amp;gt;
I decided to look at MetaMask’s crypto, and oh wow I wish I could unlook.&amp;lt;br&amp;gt;
— Matthew Green (@matthew_d_green) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/matthew_d_green/status/1481327159599841280?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;January 12, 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I swear that this offhand Tweet was not meant to make anyone unhappy or scare people that their funds were at risk. Although I had a couple of scary moments, those were entirely on me. So let me be clear as possible right now: I did not find any exploitable vulnerabilities in MetaMask’s crypto!&amp;lt;br&amp;gt;
What I did come back with is an uncomfortable feeling about the complexity and quality of MetaMask’s (current) crypto code, and some unhappy feelings about its dependency structure. Some of this stuff is basically unavoidable: file it under “browser crypto is scary.” Some is specific to the way the code is laid out. And some of it is a (non-trivial) gripe: this code is is much harder to audit than it should be.&amp;lt;br&amp;gt;
And this last part isn’t just a personal gripe. My TL;DR is that finding and reviewing the correct code was much harder than it had to be. Moreover, there were far too many different organizations owning the dependencies that led to the crypto routines themselves. This made me uncomfortable, given how much money these routines are responsible for securing.&amp;lt;br&amp;gt;
In this post I’m going to justify these opinions by walking you through a casual skim of MetaMask’s code and and crypto dependencies. To make you feel “like you were there”, I’m going to discuss the review  more or less in the order it occurred — including the embarrassing part where I went off the rails and reviewed the wrong code.&amp;lt;br&amp;gt;
If you enjoy reading crypto code for entertainment, this post might be for you. If you’re hoping that this will actually lead to anything exciting, I suspect you’ll be very disappointed.&amp;lt;br&amp;gt;
Quick explainer: what is MetaMask?&amp;lt;br&amp;gt;
Since many readers have probably never used DeFi, I figure I should give a quick background here on “web3” and MetaMask in particular.&amp;lt;br&amp;gt;
From a technical perspective, web3 is pretty straightforward. It consists of many “decentralized apps” (dapps), each of which typically comprises a (typically Javascript) front-end web app, as well as some back-end business logic. What makes dapps special is the back-end portion, which is decentralized. Generally this means it relies on a smart contract running in a network like Ethereum.&amp;lt;br&amp;gt;
Web3 front-ends are just web apps, and typically they’re served to your browser via standard web infrastructure. (Security here usually means HTTPS, so anyone who hacks a server or steals a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bloomberg.com/news/articles/2021-12-10/badgerdao-says-cloudflare-flaw-led-to-130-million-heist&amp;#34;&amp;gt;Cloudflare API key&amp;lt;/a&amp;gt; can change these apps’ code in malicious ways.)&amp;lt;br&amp;gt;
Of course, web apps can’t communicate directly to blockchains, nor are they a good place to store private keys. This is why MetaMask exists. In its most popular instantiation, MetaMask ships as a browser extension for Chrome and Firefox. When a web application needs to send a transaction to a smart contract (e.g., because you want to deposit money into &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://aave.com/&amp;#34;&amp;gt;Aave&amp;lt;/a&amp;gt; ), MetaMask is responsible for signing the transaction and shipping the transaction to the chain.&amp;lt;br&amp;gt;
On the bright side for this review, the actual cryptography in MetaMask is fairly limited: as a wallet, it must generate and store Ethereum public and private keys and it also needs to handle “simple” operations like ECDSA signing. On the other hand: we’re in a browser . So nothing is actually simple.&amp;lt;br&amp;gt;
Climbing the dependency ladder&amp;lt;br&amp;gt;
To put some bounds on the effort required, I decided to only look at the implementation of ECDSA signing and key generation (excluding the curve operations.) This seemed like an easy task I could get done in an hour or two while eating an extended lunch.&amp;lt;br&amp;gt;
Finding the starting point for a review like this was harder than I expected. In short: it isn’t easy to grok the control flow of a complex event-based &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/MetaMask/metamask-extension&amp;#34;&amp;gt;Javascript browser extension&amp;lt;/a&amp;gt; to find out exactly which calls are “real” and which are tests or dead code. To shortcut this problem, my approach amounts to “grepping and hoping”, starting from the “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/MetaMask/metamask-extension&amp;#34;&amp;gt;develop” branch of MetaMask’s extension repository.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A quick search for “sign” leads us to a promising call in the file &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/MetaMask/metamask-extension/blob/develop/app/scripts/metamask-controller.js&amp;#34;&amp;gt;metamask-controller.js&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/MetaMask/metamask-extension/blob/develop/app/scripts/metamask-controller.js&amp;#34;&amp;gt;source file&amp;lt;/a&amp;gt; )&amp;lt;br&amp;gt;
Sadly, following this call path quickly leads us into dependency hell.&amp;lt;br&amp;gt;
First, we reach a library called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.npmjs.com/package/eth-keyring-controller&amp;#34;&amp;gt;eth-keyring-controller&amp;lt;/a&amp;gt; , which presumably manages Ethereum keyrings. A quick scan of that library shows it calling a second dependency: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/MetaMask/eth-sig-util&amp;#34;&amp;gt;eth-sig-util&amp;lt;/a&amp;gt; . (Both are NPM packages developed by MetaMask.) We’ll jump right to the latter package, which… you guessed it, calls yet another package:&amp;lt;br&amp;gt;
This call takes us out of MetaMask-owned code and out to a new package called “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.npmjs.com/package/ethereumjs-util&amp;#34;&amp;gt;ethereum-jsutil&amp;lt;/a&amp;gt; ” that’s maintained by the “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ethereumjs&amp;#34;&amp;gt;Ethereum Javascript community&amp;lt;/a&amp;gt; “, whoever they are. (Don’t worry, we won’t stay here long enough to care.) Of course, in this package we find yet another layer of dependency indirection:&amp;lt;br&amp;gt;
From here, we head over to a package called “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ethereum/js-ethereum-cryptography/blob/master/src/secp256k1.ts&amp;#34;&amp;gt;js-ethereum-cryptography&amp;lt;/a&amp;gt; “, which holy cow is actually a repository maintained by the Ethereum project itself!&amp;lt;br&amp;gt;
At this point I’m about halfway into my allotted review time and asking myself questions like “why didn’t MetaMask just call this library directly” and “why do I make poor life choices”. But never mind, we’re almost there: surely we are going to see some actual crypto code soon!&amp;lt;br&amp;gt;
Except no, we are not. This is what we find in the Ethereum library:&amp;lt;br&amp;gt;
Yet another call and yet another dependency: this time to something called “&amp;lt;br&amp;gt;
noble&amp;lt;br&amp;gt;
“. Here my quick-and-dirty approach to dependency resolution (Google “npm &amp;amp;lt;package-name&amp;amp;gt;”) fails me, since NPM says that “noble” is is a “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.npmjs.com/package/noble&amp;#34;&amp;gt;Node.js Bluetooth Low Energy library&amp;lt;/a&amp;gt; .” As cool as that would be — access the blockchain through Bluetooth! — I’m guessing this is not right.&amp;lt;br&amp;gt;
A bit more searching leads me to believe that&amp;lt;br&amp;gt;
is actually the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://paulmillr.com/noble/&amp;#34;&amp;gt;Noble cryptography library&amp;lt;/a&amp;gt; , which appears to have been developed by Paul Miller. And hey, this code looks promising! The page lists actual cryptography design goals that seem reasonable, and the code is written in TypeScript. Even better: the library has been subject to an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cure53.de/pentest-report_noble-lib.pdf&amp;#34;&amp;gt;audit&amp;lt;/a&amp;gt; by Cure53.&amp;lt;br&amp;gt;
Nonetheless, and with no disrespect to Paul or anyone else in this community: I would like to take a moment to complain about this dependency structure:&amp;lt;br&amp;gt;
Resolving all these pointless dependencies has eaten up a lot more of my review time than you might imagine. (I’m leaving out all the times I accidentally visited the wrong libraries because they used some combination of “js” and “ethereum” and “cryptography” and just Googling is risky here.)&amp;lt;br&amp;gt;
More substantively, I can’t help but notice that there are a lot of code owners in this critical path. So far I’ve traveled through repositories owned by four different organizations, and the last one is someone’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/paulmillr/noble-secp256k1&amp;#34;&amp;gt;personal Github account&amp;lt;/a&amp;gt; . Is this normal for a system that secures billions of dollars of user funds? Maybe it should not be.&amp;lt;br&amp;gt;
But enough complaining. There is actual crypto code here! We can finally look at ECDSA.&amp;lt;br&amp;gt;
Except… it turns out that we can’t do that, because I made a stupid mistake.&amp;lt;br&amp;gt;
After speaking with Paul Miller on Twitter, I learned that this whole code review has been premised on a very foolish assumption: namely that the code in the main (development) branches of MetaMask and its dependencies is actually the code people are using in MetaMask today. That turns out to be wrong. In fact, Paul tells me, the&amp;lt;br&amp;gt;
library is slated for deployment in an upcoming release. The current release of MetaMask relies on a library called “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/indutny/elliptic&amp;#34;&amp;gt;elliptic&amp;lt;/a&amp;gt; “, which was written by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/indutny&amp;#34;&amp;gt;Fedor Indutny&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
I’m now scraping up those last bits of cheese in the burrito bowl.&amp;lt;br&amp;gt;
Let’s look at elliptic&amp;lt;br&amp;gt;
Ok, forget everything I did above. That was my mistake. I promise to come back to those newer code paths soon, but that’s for the future. My goal in this review was to look at MetaMask as it exists today. Apparently that means I need to look at Fedor’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/indutny/elliptic&amp;#34;&amp;gt;elliptic&amp;lt;/a&amp;gt; library.&amp;lt;br&amp;gt;
(Note: if I was being professional then what I would really do is review all the release branches of MetaMask and all of its dependencies just to make sure I’m in the right place, and to see what the calls looked like. But life is too short: I’m going to trust Paul.)&amp;lt;br&amp;gt;
The&amp;lt;br&amp;gt;
elliptic&amp;lt;br&amp;gt;
library is written in “plain old” Javascript, so types will tend to be confusing. On the bright side, it’s relatively compact. The core library supports Ed25519 (for EdDSA) and Secp256k1 for ECDSA  on networks like Ethereum. Let’s focus on the latter.&amp;lt;br&amp;gt;
I’m not a …</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220114-001747/</link>
      <pubDate>Fri, 14 Jan 2022 00:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220114-001747/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292068/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$45,995 2018 Tesla Model 3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291502/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$225 New 6/6 Double Lap Steel Slide Electric Guitar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291882/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$230 Apple Watch Series 4 44 mm Space Grey Aluminum Case with Bla&amp;amp;hellip;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292047/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$500 Apple iPhone 11 pro max 64gb AT&amp;amp;amp;T Midnight Green Hairline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220114-001219/</link>
      <pubDate>Fri, 14 Jan 2022 00:12:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220114-001219/</guid>
      <description>&amp;amp;quot;All history, and most especially the history of the 20th century, argues against placing ideas in the saddle and allowing them to ride mankind.&amp;amp;quot; &amp;amp;ndash; Terry Teachout, RIP&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220113-081410/</link>
      <pubDate>Thu, 13 Jan 2022 08:14:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220113-081410/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/12/New-Years-Day&amp;#34;&amp;gt;New Year’s Day&amp;lt;/a&amp;gt; · In Vancouver, we have a tradition of going for a walk on New Year’s Day, no matter how foul the weather, if only to prove to     Other Canadians that the thing is possible.  2022 too, despite its being an extremely low-expectations year. And it wasn’t the worst     New Year’s Day beachwalk ever, so maybe it won’t be the worst year ever.  And it leaves me with advice for the world. But first… &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/12/New-Years-Day&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
early in each month, recommending long-form pieces that I’d had     the time to read, acknowledging that people who aren’t semi-retired wouldn’t have time for all of them but perhaps one or two     would add value even for the busy.  I fell out of that habit but now it’s 2022 and there are plenty of tabs I meant to     write about, some dating back to early 2021.  So… Welcome, everyone, to 2022, and let’s go long! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/05/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220113-001722/</link>
      <pubDate>Thu, 13 Jan 2022 00:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220113-001722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Five Ways China Is Trying To Unaddict Kids From Social Media&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Blackout hours, educational content, time limits, and interspersed pauses. This is how China is attempting to mitigate social media addiction…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;A Xiaomi Phone Might’ve Shipped With A Censorship List In Europe. Now What?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;European researchers say they found hundreds of terms the phone could block, including “Tiananmen” and “Hong Kong Independence.” There’s no playbook for…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220112-080617/</link>
      <pubDate>Wed, 12 Jan 2022 08:06:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220112-080617/</guid>
      <description>In a great many ransomware attacks, the criminals who pillage the victim’s network are not the same crooks who gained the initial access to the victim organization. More commonly, the infected PC or stolen VPN credentials the gang used to break in were purchased from a cybercriminal middleman known as an initial access broker. This post examines some of the clues left behind by “ Wazawaka ,” the hacker handle chosen by a major access broker in the Russian-speaking cybercrime scene.&amp;lt;br&amp;gt;
Wazawaka has been a highly active member of multiple cybercrime forums over the past decade, but his favorite is the Russian-language community Exploit . Wazawaka spent his early days on Exploit and other forums selling distributed denial-of-service (DDoS) attacks that could knock websites offline for about USD $80 a day. But in more recent years, Wazawaka has focused on peddling access to organizations and to databases stolen from hacked companies.&amp;lt;br&amp;gt;
“Come, rob, and get dough!,” reads a thread started by Wazawaka on Exploit in March 2020, in which he sold access to a Chinese company with more than $10 billion in annual revenues. “Show them who is boss.”&amp;lt;br&amp;gt;
According to their posts on Exploit, Wazawaka has worked with at least two different ransomware affiliate programs, including LockBit. Wazawaka said LockBit had paid him roughly $500,000 in commissions for the six months leading up to September 2020.&amp;lt;br&amp;gt;
Wazawaka also said he’d teamed up with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=darkside&amp;#34;&amp;gt;DarkSide&amp;lt;/a&amp;gt; , the ransomware affiliate group responsible for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/&amp;#34;&amp;gt;the six-day outage&amp;lt;/a&amp;gt; at Colonial Pipeline last year that caused nationwide fuel shortages and price spikes. The U.S. Department of State has since offered a $5 million reward for information leading to the arrest and conviction of any DarkSide affiliates.&amp;lt;br&amp;gt;
Wazawaka seems to have adopted the uniquely communitarian view that when organizations being held for ransom decline to cooperate or pay up, any data stolen from the victim should be published on the Russian cybercrime forums for all to plunder — not privately sold to the highest bidder. In thread after thread on the crime forum XSS , Wazawaka’s alias “ Uhodiransomwar ” can be seen posting download links to databases from companies that have refused to negotiate after five days.&amp;lt;br&amp;gt;
“The only and the main principle of ransomware is: the information that you steal should never be sold,” Uhodiransomwar wrote in August 2020. “The community needs to receive it absolutely free of charge if the ransom isn’t paid by the side that this information is stolen from.”&amp;lt;br&amp;gt;
Wazawaka hasn’t always been so friendly to other cybercrooks. Over the past ten years, his contact information has been used to register numerous phishing domains intended to siphon credentials from people trying to transact on various dark web marketplaces. In 2018, Wazawaka registered a slew of domains spoofing the real domain for the Hydra dark web market. In 2014, Wazawaka confided to another crime forum member via private message that he made good money stealing accounts from drug dealers on these marketplaces.&amp;lt;br&amp;gt;
“I used to steal their QIWI accounts with up to $500k in them,” Wazawaka recalled. “A dealer would never go to the cops and tell them he was selling stuff online and someone stole his money.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/#more-58018&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/who-is-the-network-access-broker-wazawaka/&amp;#34;&amp;gt;Who is the Network Access Broker ‘Wazawaka?’&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Sahil Lavingia</title>
      <link>https://www.whatsupup.com/blog/barbecuing/persuadably/20220112-041826/</link>
      <pubDate>Wed, 12 Jan 2022 04:18:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/barbecuing/persuadably/20220112-041826/</guid>
      <description>Funder&amp;lt;br&amp;gt;
Investing $15&#43; million a year into early-stage startups. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shl.capital&amp;#34;&amp;gt;Co-invest with me?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Painter&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220112-041648/</link>
      <pubDate>Wed, 12 Jan 2022 04:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220112-041648/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291965/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$70 Jordan Flight 23 UK 8.5&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291822/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$158 Jackson JS Series Rhoads&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292007/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$82,000 2015 BMW i8&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291137/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$12,500 47 WILLY&amp;#39;S SEDAN DELIVERY&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20220112-041618/</link>
      <pubDate>Wed, 12 Jan 2022 04:16:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20220112-041618/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/11/technology/facebook-antitrust-ftc.html&amp;#34;&amp;gt;A Facebook antitrust suit can move forward, a judge says, in a win for the F.T.C. The government can proceed with its claims that the company abused its monopoly power through acquisitions. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220112-041147/</link>
      <pubDate>Wed, 12 Jan 2022 04:11:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220112-041147/</guid>
      <description>Ref &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/iZTGIoD1eu&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/iZTGIoD1eu&amp;#34;&amp;gt;https://t.co/iZTGIoD1eu&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; for the kids in the back. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/eAEpxVuDy5&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/eAEpxVuDy5&amp;#34;&amp;gt;https://t.co/eAEpxVuDy5&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/VM2E1SpniE&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/VM2E1SpniE&amp;#34;&amp;gt;https://t.co/VM2E1SpniE&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220112-001659/</link>
      <pubDate>Wed, 12 Jan 2022 00:16:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220112-001659/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291822/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$158 Jackson JS Series Rhoads&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104292007/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$82,000 2015 BMW i8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291137/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$12,500 47 WILLY&amp;#39;S SEDAN DELIVERY&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290760/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;CLEAN 1964 FORD FALCON DELUXE WAGON&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220112-001552/</link>
      <pubDate>Wed, 12 Jan 2022 00:15:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220112-001552/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00059-w&amp;#34;&amp;gt;How to protect US science from political meddling after Trump&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In a fresh report, federal researchers recommend ways to strengthen scientific integrity and preserve public trust in government.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220112-000637/</link>
      <pubDate>Wed, 12 Jan 2022 00:06:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220112-000637/</guid>
      <description>Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is “wormable,” meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.&amp;lt;br&amp;gt;
Nine of the vulnerabilities fixed in this month’s Patch Tuesday received Microsoft’s “critical” rating, meaning malware or miscreants can exploit them to gain remote access to vulnerable Windows systems through no help from the user.&amp;lt;br&amp;gt;
By all accounts, the most severe flaw addressed today is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907&amp;#34;&amp;gt;CVE-2022-21907,&amp;lt;/a&amp;gt; a critical, remote code execution flaw in the “ HTTP Protocol Stack .” Microsoft says the flaw affects Windows 10 and Windows 11 , as well as Server 2019 and Server 2022 .&amp;lt;br&amp;gt;
“While this is definitely more server-centric, remember that Windows clients can also run http.sys, so all affected versions are affected by this bug,” said Dustin Childs from Trend Micro’s Zero Day Initiative . “Test and deploy this patch quickly.”&amp;lt;br&amp;gt;
Quickly indeed. In May 2021, Microsoft patched a similarly critical and wormable vulnerability in the HTTP Protocol Stack; less than a week later, computer code made to exploit the flaw &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/exploit-released-for-wormable-windows-http-vulnerability/&amp;#34;&amp;gt;was posted online&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Microsoft also fixed three more remote code execution flaws in Exchange Server , a technology that hundreds of thousands of organizations worldwide use to manage their email. Exchange flaws are a major target of malicious hackers. Almost a year ago, hundreds of thousands of Exchange servers worldwide were compromised by malware after attackers started mass-exploiting four zero-day flaws in Exchange.&amp;lt;br&amp;gt;
Microsoft says the limiting factor with these three newly found Exchange flaws is that an attacker would need to be tied to the target’s network somehow to exploit them. But Satnam Narang at Tenable notes Microsoft has labeled all three Exchange flaws as “exploitation more likely.”&amp;lt;br&amp;gt;
“One of the flaws, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21846&amp;#34;&amp;gt;CVE-2022-21846&amp;lt;/a&amp;gt; , was disclosed to Microsoft by the National Security Agency ,” Narang said. “Despite the rating, Microsoft notes the attack vector is adjacent, meaning exploitation will require more legwork for an attacker, unlike the ProxyLogon and ProxyShell vulnerabilities which were remotely exploitable.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/wormable-flaw-leads-january-2022-patch-tuesday/#more-58072&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/wormable-flaw-leads-january-2022-patch-tuesday/&amp;#34;&amp;gt;‘Wormable’ Flaw Leads January 2022 Patch Tuesday&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20220111-202004/</link>
      <pubDate>Tue, 11 Jan 2022 20:20:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20220111-202004/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-algorithms-just-future&amp;#34;&amp;gt;Podcast Episode 107&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20220111-201957/</link>
      <pubDate>Tue, 11 Jan 2022 20:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20220111-201957/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2022/01/podcast-episode-algorithms-just-future&amp;#34;&amp;gt;Podcast Episode 107&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20220111-160722/</link>
      <pubDate>Tue, 11 Jan 2022 16:07:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20220111-160722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-protect-your-intentions-from-getting-hijacked&amp;#34;&amp;gt;How to protect your intentions from getting hijacked&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/let-your-discontent-crystallize&amp;#34;&amp;gt;Let your discontent crystallize&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Access denied | mooseyanon.medium.com used Cloudflare to restrict access</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220111-121217/</link>
      <pubDate>Tue, 11 Jan 2022 12:12:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220111-121217/</guid>
      <description>What happened?&amp;lt;br&amp;gt;
This website is using a security service to protect itself from online attacks.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Access denied | rakyll.medium.com used Cloudflare to restrict access</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220111-121152/</link>
      <pubDate>Tue, 11 Jan 2022 12:11:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220111-121152/</guid>
      <description>What happened?&amp;lt;br&amp;gt;
This website is using a security service to protect itself from online attacks.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Access denied | medium.com used Cloudflare to restrict access</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220111-120742/</link>
      <pubDate>Tue, 11 Jan 2022 12:07:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220111-120742/</guid>
      <description>What happened?&amp;lt;br&amp;gt;
This website is using a security service to protect itself from online attacks.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20220110-201136/</link>
      <pubDate>Mon, 10 Jan 2022 20:11:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20220110-201136/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/new-year-new-ceo/&amp;#34;&amp;gt;New year, new CEO&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
It’s a new year, and I’ve decided it’s a good time to replace myself as the CEO of Signal.&amp;lt;br&amp;gt;
I have now been working on Signal for almost a decade. It has always been my goal for Signal to grow and sustain beyond my involvement, but four years ago that would still not have been possible. I was writing all the Android code, was writing all of the server code, was the only person on call for the service, was facilitating all product development, and was managing everyone. I couldn’t ever leave cell service, had to take my laptop with me everywhere in case of emergencies, and occasionally found myself sitting alone on the sidewalk in the rain late at night trying to diagnose a service degradation.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20220109-001921/</link>
      <pubDate>Sun, 09 Jan 2022 00:19:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20220109-001921/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2022/01/how-to-check-you-re-in-the-initial-pid-namespace.html&amp;#34;&amp;gt;How to check you&amp;#39;re in the initial pid namespace?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
It all started with a simple question: how can a Linux process
determine whether it is the init process of a freshly booted system?&amp;lt;br&amp;gt;
A dozen years ago, the Unix textbook answer to this would have been:
well, if its process id (pid) is 1, then it is&amp;lt;br&amp;gt;
init&amp;lt;br&amp;gt;
by definition.&amp;lt;br&amp;gt;
These days, things are not that simple anymore.  Containerization
creates situations where pid is 1, but the process runs, well, in a
container.  In Linux, this is realized by using a feature called “pid
namespaces”.  The clone(2) syscall can take the flag&amp;lt;br&amp;gt;
CLONE_NEWPID&amp;lt;br&amp;gt;
(“since Linux 2.6.24”), which puts the new process into a new pid
namespace.  This means that this process will have pid 1 inside the
pid namespace, but outside (i.e. in the parent pid namespace), the
process has a regular pid.  Various Linux API transparently translate
pids between these namespaces.&amp;lt;br&amp;gt;
The pid namespaces form a hierarchy, and the one at the very top is
called “initial pid namespace”.&amp;lt;br&amp;gt;
You can use the tool unshare(1) to play with pid namespaces:&amp;lt;br&amp;gt;
% unshare --fork --map-root-user --pid bash -c &amp;amp;#39;echo $$&amp;amp;#39; 
1&amp;lt;br&amp;gt;
This is a way to spawn (as a regular user!) a process that has pid 1,
at least, that’s what it looks like to the process.&amp;lt;br&amp;gt;
We can try to find some evidence that we’re a freshly booted&amp;lt;br&amp;gt;
, but
none of it is really conclusive:&amp;lt;br&amp;gt;
Our user id is 0, we are root (necessary but not sufficient of course).&amp;lt;br&amp;gt;
$TERM&amp;lt;br&amp;gt;
should be&amp;lt;br&amp;gt;
linux&amp;lt;br&amp;gt;
; trivial to override.&amp;lt;br&amp;gt;
$BOOT_IMAGE&amp;lt;br&amp;gt;
is set, but this depends on the boot loader.&amp;lt;br&amp;gt;
System uptime is “low”, but it takes the initrd boot time into account.
Our non-root&amp;lt;br&amp;gt;
could be spawned in a container at boot time.&amp;lt;br&amp;gt;
There are also some indicators the process runs in a container using
one of the popular solutions such as&amp;lt;br&amp;gt;
docker&amp;lt;br&amp;gt;
or&amp;lt;br&amp;gt;
podman&amp;lt;br&amp;gt;
The process has a lot of supplementary groups already.&amp;lt;br&amp;gt;
If we were put inside a cgroup, reading&amp;lt;br&amp;gt;
/proc/1/cgroup&amp;lt;br&amp;gt;
will indicate it.&amp;lt;br&amp;gt;
The file&amp;lt;br&amp;gt;
/.dockerenv&amp;lt;br&amp;gt;
exists.&amp;lt;br&amp;gt;
But there are still situations, such as the&amp;lt;br&amp;gt;
unshare&amp;lt;br&amp;gt;
call above,
where all of these things may not be true.&amp;lt;br&amp;gt;
Therefore I tried to find the ultimate way to detect whether we are
in the initial pid namespace.&amp;lt;br&amp;gt;
I started to research this and quickly found the ioctl(2)&amp;lt;br&amp;gt;
NS_GET_PARENT&amp;lt;br&amp;gt;
which seemed to be useful: “Returns a file descriptor
that refers to the parent namespace of the namespace referred to by
fd.”  However, it is useless for this purpose:&amp;lt;br&amp;gt;
EPERM  The requested namespace is outside of the caller&amp;amp;#39;s
       namespace scope.  This error can occur if, for example,
       the owning user namespace is an ancestor of the caller&amp;amp;#39;s
       current user namespace.  It can also occur on attempts to
       obtain the parent of the initial user or PID namespace.&amp;lt;br&amp;gt;
Of course, it makes a lot of sense that we cannot get a handle to the
surrounding pid namespace, as this would make the encapsulation
provided by namespaces futile.  However, coalescing these two error
conditions (namespace is outside the caller namespace, and namespace
is initial pid namespace) doesn’t make our life easier.&amp;lt;br&amp;gt;
So, we need to bring out bigger guns in.  I searched the kernel source for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/A/ident/init_pid_ns&amp;#34;&amp;gt;occurrences of init_pid_ns&amp;lt;/a&amp;gt; ,
as this namespace is called in the Linux source code.  There are not
too many occurrences we can rely on.  The taskstats module limits the&amp;lt;br&amp;gt;
TASKSTATS_CMD_ATTR_REGISTER_CPUMASK&amp;lt;br&amp;gt;
command to the initial pid
namespace only, but to use this requires speaking the netlink
interface, which is terrible.
Also, the behavior could change in future versions.&amp;lt;br&amp;gt;
One interesting, and viable approach, is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://elixir.bootlin.com/linux/v5.15/source/kernel/pid_namespace.c#L300&amp;#34;&amp;gt;this limitation&amp;lt;/a&amp;gt; of the reboot(2) syscall: only some&amp;lt;br&amp;gt;
LINUX_REBOOT_CMD_*&amp;lt;br&amp;gt;
commands are allowed
to be sent inside a nested pid namespace.  Now, we need to find a
“harmless” command to call reboot(2) with to test this!  (Obviously,
only being able to suspend the machine from the initial pid namespace
is not a very useful check…)  There are two commands that do
not do much harm:&amp;lt;br&amp;gt;
LINUX_REBOOT_CMD_CAD_{ON,OFF}&amp;lt;br&amp;gt;
will toggle the action
that Ctrl-Alt-Delete performs.  Unfortunately, it is impossible to
read the state of this flag, making this test a destructive operation
still. (But if you are pid 1, you may want to set it anyway, so you get
pid namespace detection for free.)&amp;lt;br&amp;gt;
So I kept looking for other ways until I realized there’s a quite
natural property to check for, and that is to find out if there are kernel threads in the pid namespace.  Kernel threads are spawned by
the kernel in the initial pid namespace and help perform certain
asynchronous actions the kernel has to do, subject to process
scheduling.  As far as I know, kernel threads never occur in a nested
pid namespace, and at least the parent process of kernel threads,&amp;lt;br&amp;gt;
kthreadd&amp;lt;br&amp;gt;
, will always exist.  Conveniently, it also always has pid 2.&amp;lt;br&amp;gt;
Thus, we just need to figure out if pid 2 is a kernel thread!  Note
that just checking whether pid 2 exists is cheap, but racy: the
container runtime could have spawned another process before we are
scheduled to do the check, and this process will as well get pid 2 then.&amp;lt;br&amp;gt;
Luckily, kernel threads have quite a few special properties, that are
of different difficulty to check from a C program:&amp;lt;br&amp;gt;
/proc/PID/cmdline&amp;lt;br&amp;gt;
is empty (not a good indicator, user space processes
can clear it too).&amp;lt;br&amp;gt;
kernel threads have parent pid 0 (requires parsing&amp;lt;br&amp;gt;
/proc/PID/stat&amp;lt;br&amp;gt;
,
which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://unix.stackexchange.com/a/409493&amp;#34;&amp;gt;everyone gets wrong&amp;lt;/a&amp;gt; the first time, or&amp;lt;br&amp;gt;
/proc/PID/status&amp;lt;br&amp;gt;
kernel threads have no&amp;lt;br&amp;gt;
Vm*&amp;lt;br&amp;gt;
data in&amp;lt;br&amp;gt;
kernel threads have the flag&amp;lt;br&amp;gt;
PF_KTHREAD&amp;lt;br&amp;gt;
set (requires parsing&amp;lt;br&amp;gt;
again).&amp;lt;br&amp;gt;
kernel threads have an empty symlink for&amp;lt;br&amp;gt;
/proc/PID/exe&amp;lt;br&amp;gt;
I decided to go with the latter.  On Linux, empty symlinks are
impossible to create as a user, so we just need to check that and we’re
done, right?&amp;lt;br&amp;gt;
On a regular file system, using lstat(2) would have filled&amp;lt;br&amp;gt;
st_size&amp;lt;br&amp;gt;
with the length of the symlink.  But on a&amp;lt;br&amp;gt;
procfs&amp;lt;br&amp;gt;
, lstat is not to be
trusted, and even non-empty symlinks have&amp;lt;br&amp;gt;
equal to 0.
We thus really need to use the readlink(2) syscall to read the link.
After doing this, you will notice that it returns&amp;lt;br&amp;gt;
ENOENT&amp;lt;br&amp;gt;
… exactly
the same as if pid 2 did not exist!&amp;lt;br&amp;gt;
We therefore need another check, to verify that pid 2 does exist. Luckily, here a lstat on&amp;lt;br&amp;gt;
/proc/2/exe&amp;lt;br&amp;gt;
file is fine.  It must return zero.&amp;lt;br&amp;gt;
Note that you need to do these operations in exactly this order , else
you are subject to race conditions again: the only reason this works
is that if pid 2 is&amp;lt;br&amp;gt;
, it will not have terminated before the
lstat check (because it cannot terminate).&amp;lt;br&amp;gt;
Therefore, readlink(2) failing with&amp;lt;br&amp;gt;
and lstat(2) succeeding
is exactly the combination required to check pid 2 is&amp;lt;br&amp;gt;
,
which implies there are kernel threads in our pid namespace, which
implies that we are in the initial namespace.&amp;lt;br&amp;gt;
Phew, this went deeper than expected.&amp;lt;br&amp;gt;
NP: David Bowie—Lazarus&amp;lt;br&amp;gt;
NP: Sade—Keep Looking&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220109-001704/</link>
      <pubDate>Sun, 09 Jan 2022 00:17:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220109-001704/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291903/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$25,995 2018 BMW i3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291898/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$700 Gibson 1949 TB150 5 string conversion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20220109-001550/</link>
      <pubDate>Sun, 09 Jan 2022 00:15:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20220109-001550/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-022-00035-4&amp;#34;&amp;gt;Landmark Webb observatory is now officially a telescope&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The observatory has flawlessly unfurled its mirrors and sunshield — although more steps are needed before the science can begin.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220108-201731/</link>
      <pubDate>Sat, 08 Jan 2022 20:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220108-201731/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2007/06/26/deducing-code-from-types-filterm/&amp;#34;&amp;gt;Deducing code from types: filterM&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220108-201644/</link>
      <pubDate>Sat, 08 Jan 2022 20:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220108-201644/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/james-webb-telescope-nasa-deployment.html&amp;#34;&amp;gt;A Giant Telescope Grows in Space Everything is going great for the James Webb Space Telescope. So far. By Dennis Overbye and Joey Roulette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/webb-telescope-nasa-time-livestream.html&amp;#34;&amp;gt;What We Know About Unfolding the James Webb Space Telescope Engineers sent commands to deploy the mirrors on the space observatory, then latch them into place, a critical milestone before it begins its science mission. By Joey Roulette and Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220108-200536/</link>
      <pubDate>Sat, 08 Jan 2022 20:05:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220108-200536/</guid>
      <description>Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/norton-360-now-comes-with-a-cryptominer/&amp;#34;&amp;gt;make money mining virtual currency&amp;lt;/a&amp;gt; . But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the product free — was recently bought by the same company that owns Norton 360 and is introducing its customers to a service called Avira Crypto .&amp;lt;br&amp;gt;
Avira Crypto&amp;lt;br&amp;gt;
Founded in 2006, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Avira&amp;#34;&amp;gt;Avira Operations GmbH &amp;amp;amp; Co. KG&amp;lt;/a&amp;gt; is a German multinational software company best known for their Avira Free Security (a.k.a. Avira Free Antivirus). In January 2021, Avira was acquired by Tempe, Ariz.-based NortonLifeLock Inc ., the same company that now owns Norton 360.&amp;lt;br&amp;gt;
In 2017, the identity theft protection company LifeLock was acquired by Symantec Corp. , which was renamed to NortonLifeLock in 2019. LifeLock is now included in the Norton 360 service; Avira offers users a similar service called Breach Monitor.&amp;lt;br&amp;gt;
Like Norton 360, Avira comes with a cryptominer already installed, but customers have to opt in to using the service that powers it. Avira’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.avira.com/hc/en-us/articles/4407469485585-What-is-Avira-Crypto-&amp;#34;&amp;gt;FAQ on its cryptomining service&amp;lt;/a&amp;gt; is somewhat sparse. For example, it doesn’t specify how much NortonLifeLock gets out of the deal (NortonLifeLock keeps 15 percent of any cryptocurrency mined by Norton Crypto).&amp;lt;br&amp;gt;
“Avira Crypto allows you to use your computer’s idle time to mine the cryptocurrency Ethereum (ETH),” the FAQ explains. “Since cryptomining requires a high level of processing power, it is not suitable for users with an average computer. Even with compatible hardware, mining cryptocurrencies on your own can be less rewarding. Your best option is to join a mining pool that shares their computer power to improve their chance of mining cryptocurrency. The rewards are then distributed evenly to all members in the pool.”&amp;lt;br&amp;gt;
NortonLifeLock hasn’t yet responded to requests for comment, so it’s unclear whether Avira uses the same cryptomining code as Norton Crypto. But there are clues that suggest that’s the case. NortonLifeLock &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.avira.com/en/blog/avira-unveils-extended-features-with-avira-crypto-game-booster-and-breach-monitor&amp;#34;&amp;gt;announced Avira Crypto in late October 2021&amp;lt;/a&amp;gt; , but multiple other antivirus products have flagged Avira’s installer as malicious or unsafe for including a cryptominer as far back as Sept. 9, 2021.&amp;lt;br&amp;gt;
Avira was detected as potentially unsafe for including a cryptominer back in Sept. 2021. Image: Virustotal.com.&amp;lt;br&amp;gt;
The above screenshot was taken on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.virustotal.com&amp;#34;&amp;gt;Virustotal.com&amp;lt;/a&amp;gt; , a service owned by Google that scans submitted files against dozens of antivirus products. The detection report pictured was found by searching Virustotal for “ANvOptimusEnablementCuda,” a function included in the Norton Crypto mining component “Ncrypt.exe.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/500m-avira-antivirus-users-introduced-to-cryptomining/#more-58020&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/500m-avira-antivirus-users-introduced-to-cryptomining/&amp;#34;&amp;gt;500M Avira Antivirus Users Introduced to Cryptomining&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220108-161847/</link>
      <pubDate>Sat, 08 Jan 2022 16:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220108-161847/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/webb-telescope-nasa-time-livestream.html&amp;#34;&amp;gt;Watch Live: James Webb Space Telescope Finishes Unfolding While there are no cameras aboard the spacecraft, NASA is providing updates as the telescope deploys its mirrors. Here’s what you need to know. By Joey Roulette and Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20220108-081743/</link>
      <pubDate>Sat, 08 Jan 2022 08:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20220108-081743/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/08/science/webb-telescope-nasa-time-livestream.html&amp;#34;&amp;gt;The James Webb Space Telescope Finishes Unfolding: How to Watch While there are no cameras aboard the spacecraft, NASA is providing updates as the telescope deploys its mirrors. Here’s what you need to know. By Joey Roulette and Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20220108-080553/</link>
      <pubDate>Sat, 08 Jan 2022 08:05:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20220108-080553/</guid>
      <description>Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. Norton’s parent firm says the cloud-based service that activates the program and allows customers to profit from the scheme — in which the company keeps 15 percent of any currencies mined — is “opt-in,” meaning users have to agree to enable it. But many Norton users complain the mining program is difficult to remove, and reactions from longtime customers have ranged from unease and disbelief to, “Dude, where’s my crypto?”&amp;lt;br&amp;gt;
Norton 360 is owned by Tempe, Ariz.-based NortonLifeLock Inc . In 2017, the identity theft protection company LifeLock was acquired by Symantec Corp. , which was renamed to NortonLifeLock in 2019 (LifeLock is now included in the Norton 360 service).&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://community.norton.com/en/forums/faq-norton-crypto&amp;#34;&amp;gt;the FAQ posted on its site&amp;lt;/a&amp;gt; , “ Norton Crypto ” will mine &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Ethereum&amp;#34;&amp;gt;Ethereum&amp;lt;/a&amp;gt; (ETH) cryptocurrency while the customer’s computer is idle. The FAQ also says Norton Crypto will only run on systems that meet certain hardware and software requirements (such as an NVIDIA graphics card with at least 6 GB of memory).&amp;lt;br&amp;gt;
“Norton creates a secure digital Ethereum wallet for each user,” the FAQ reads. “The key to the wallet is encrypted and stored securely in the cloud. Only you have access to the wallet.”&amp;lt;br&amp;gt;
NortonLifeLock began offering the mining service in July 2021, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/cryptocurrency/norton-360-antivirus-now-lets-you-mine-ethereum-cryptocurrency/&amp;#34;&amp;gt;early news coverage of the program&amp;lt;/a&amp;gt; did not immediately receive widespread attention. That changed on Jan. 4, when &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/&amp;#34;&amp;gt;Boing Boing&amp;lt;/a&amp;gt; co-editor Cory Doctorow &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/doctorow/status/1478479483585933312&amp;#34;&amp;gt;tweeted&amp;lt;/a&amp;gt; that NortonCrypto would run by default for Norton 360 users.&amp;lt;br&amp;gt;
NortonLifeLock says Norton Crypto is an opt-in feature only and is not enabled without user permission.&amp;lt;br&amp;gt;
“If users have turned on Norton Crypto but no longer wish to use the feature, it can be disabled by temporarily shutting off ‘tamper protection’ (which allows users to modify the Norton installation) and deleting NCrypt.exe from your computer,” NortonLifeLock said in a written statement. However, many users &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.digitaltrends.com/computing/no-easy-way-to-uninstall-norton-crypto/&amp;#34;&amp;gt;have reported difficulty removing the mining program&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
From reading user posts on the Norton Crypto community forum, it seems some longtime Norton customers were horrified at the prospect of their antivirus product installing coin-mining software, regardless of whether the mining service was turned off by default.&amp;lt;br&amp;gt;
“How on Earth could anyone at Norton think that adding crypto mining within a security product would be a good thing?,” reads &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://community.norton.com/en/comment/8518793#comment-8518793&amp;#34;&amp;gt;a Dec. 28 thread&amp;lt;/a&amp;gt; titled “Absolutely furious.”&amp;lt;br&amp;gt;
“Norton should be DETECTING and killing off crypto mining hijacking, not installing their own,” the post reads. “The product people need firing. What’s the next ‘bright idea’? Norton Botnet? ‘ And I was just about to re-install Norton 360 too, but this has literally has caused me to no longer trust Norton and their direction.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/norton-360-now-comes-with-a-cryptominer/#more-57993&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2022/01/norton-360-now-comes-with-a-cryptominer/&amp;#34;&amp;gt;Norton 360 Now Comes With a Cryptominer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220108-042004/</link>
      <pubDate>Sat, 08 Jan 2022 04:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220108-042004/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/12/16/how-to-solve-this-differential-equation/&amp;#34;&amp;gt;How to solve this differential equation?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220108-041706/</link>
      <pubDate>Sat, 08 Jan 2022 04:17:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220108-041706/</guid>
      <description>Jan 7 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;4&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-jack-dorsey-went-to-war-with/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220108-041202/</link>
      <pubDate>Sat, 08 Jan 2022 04:12:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220108-041202/</guid>
      <description>&amp;lt;p&amp;gt;Dan Primack &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/danprimack&amp;#34;&amp;gt;@danprimack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Both @bhorowitz and @pmarca are listed a general partners on all three funds @a16z raised today (totaling $9b).&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Means they&amp;#39;re committing for several years forward. In other words, not retired.&amp;lt;br&amp;gt;
I am looking forward to helping our great entrepreneur partners build a better future. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/i2YPD3hxY4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/i2YPD3hxY4&amp;#34;&amp;gt;https://t.co/i2YPD3hxY4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220107-201107/</link>
      <pubDate>Fri, 07 Jan 2022 20:11:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220107-201107/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/bio-health/&amp;#34;&amp;gt;bio &#43; health&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220107-041823/</link>
      <pubDate>Fri, 07 Jan 2022 04:18:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220107-041823/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-jack-dorsey-went-to-war-with&amp;#34;&amp;gt;Why Jack Dorsey Went To War With Andreessen Horowitz&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-jack-dorsey-went-to-war-with&amp;#34;&amp;gt;“Jack was always a slightly restrained volcano.”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2 hr ago &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;4&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-jack-dorsey-went-to-war-with/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220107-001841/</link>
      <pubDate>Fri, 07 Jan 2022 00:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220107-001841/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291822/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$158 Jackson JS Series Rhoads&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291879/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$500 Pioneer DJM-S9 Pro DJ Scratch Style 2-channel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104289739/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$1,200 Ken Griffey Jr. Rookie card&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291818/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$531 1979 Honda other&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220107-001504/</link>
      <pubDate>Fri, 07 Jan 2022 00:15:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220107-001504/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/?source=user_profile----------------------------------------&amp;#34;&amp;gt;MooseyAnon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/followers?source=user_profile----------------------------------------&amp;#34;&amp;gt;309 Followers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/about?source=user_profile----------------------------------------&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Follow&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com&amp;#34;&amp;gt;Sign in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Get started&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;GitHub, f*ck your name change.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A black square for solidarity.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?readmore=1&amp;amp;source=user_profile---------0-------------------------------&amp;#34;&amp;gt;Read more · 6 min read&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
16.7K&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?responsesOpen=true&amp;amp;source=user_profile---------0-------------------------------&amp;#34;&amp;gt;107&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://help.medium.com/hc/en-us?source=user_profile----------------------------------------&amp;#34;&amp;gt;Help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://policy.medium.com/medium-terms-of-service-9db0094a1e0f?source=user_profile----------------------------------------&amp;#34;&amp;gt;Legal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220107-001303/</link>
      <pubDate>Fri, 07 Jan 2022 00:13:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220107-001303/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/YhK3aBv77O&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/YhK3aBv77O&amp;#34;&amp;gt;https://t.co/YhK3aBv77O&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/XKqn7WYlpo&amp;#34;&amp;gt;https://t.co/XKqn7WYlpo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220106-201314/</link>
      <pubDate>Thu, 06 Jan 2022 20:13:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220106-201314/</guid>
      <description>Please wait&amp;amp;hellip;&amp;lt;br&amp;gt;
We are checking your browser&amp;amp;hellip; mooseyanon.medium.com&amp;lt;br&amp;gt;
Please stand by, while we are checking your browser&amp;amp;hellip;&amp;lt;br&amp;gt;
Why do I have to complete a CAPTCHA?&amp;lt;br&amp;gt;
Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.&amp;lt;br&amp;gt;
What can I do to prevent this in the future?&amp;lt;br&amp;gt;
If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.&amp;lt;br&amp;gt;
If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.&amp;lt;br&amp;gt;
Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chrome.google.com/webstore/detail/privacy-pass/ajhmfdgkijocedmfjonnpjfojldioehi&amp;#34;&amp;gt;Chrome Web Store&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20220106-201218/</link>
      <pubDate>Thu, 06 Jan 2022 20:12:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20220106-201218/</guid>
      <description>Please wait&amp;amp;hellip;&amp;lt;br&amp;gt;
We are checking your browser&amp;amp;hellip; rakyll.medium.com&amp;lt;br&amp;gt;
Please stand by, while we are checking your browser&amp;amp;hellip;&amp;lt;br&amp;gt;
Why do I have to complete a CAPTCHA?&amp;lt;br&amp;gt;
Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.&amp;lt;br&amp;gt;
What can I do to prevent this in the future?&amp;lt;br&amp;gt;
If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.&amp;lt;br&amp;gt;
If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.&amp;lt;br&amp;gt;
Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chrome.google.com/webstore/detail/privacy-pass/ajhmfdgkijocedmfjonnpjfojldioehi&amp;#34;&amp;gt;Chrome Web Store&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220106-200756/</link>
      <pubDate>Thu, 06 Jan 2022 20:07:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220106-200756/</guid>
      <description>Please stand by, while we are checking your browser&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220106-161635/</link>
      <pubDate>Thu, 06 Jan 2022 16:16:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220106-161635/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#sre&amp;#34;&amp;gt;sre&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#war-stories&amp;#34;&amp;gt;war-stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
It’s been a while since I was on the receiving end of a software engineering
interview. But I still remember my favorite interview question. It was at MemSQL circa 2013.
(They &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.singlestore.com/blog/revolution/&amp;#34;&amp;gt;haven’t even kept their name&amp;lt;/a&amp;gt; ,
so I assume they’re not still relying on this specific interview question.
I don’t feel bad for revealing it. It’s a great story that I tell people a lot;
I’ve just never blogged it before.)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220106-121241/</link>
      <pubDate>Thu, 06 Jan 2022 12:12:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220106-121241/</guid>
      <description>&amp;lt;p&amp;gt;Balaji Srinivasan &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/balajis&amp;#34;&amp;gt;@balajis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
People forget just how completely non-obvious the entire digital revolution was every step of the way.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;1995: WWW will fail
2002: Google will fail
2007: iPhone will fail
2013: Facebook will fail &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/wZtpj9bg6E&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/wZtpj9bg6E&amp;#34;&amp;gt;https://t.co/wZtpj9bg6E&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220106-081312/</link>
      <pubDate>Thu, 06 Jan 2022 08:13:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220106-081312/</guid>
      <description>From a friend! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/OReCKc6SrX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/OReCKc6SrX&amp;#34;&amp;gt;https://t.co/OReCKc6SrX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
From a friend! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/dKxtwlpJkG&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/dKxtwlpJkG&amp;#34;&amp;gt;https://t.co/dKxtwlpJkG&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
From a friend! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7jNt7KcwTu&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7jNt7KcwTu&amp;#34;&amp;gt;https://t.co/7jNt7KcwTu&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20220106-041848/</link>
      <pubDate>Thu, 06 Jan 2022 04:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20220106-041848/</guid>
      <description>I&amp;#39;m GitHub&amp;#39;s Director of Platform Policy and Counsel, building and guiding implementation of GitHub’s approach to content moderation. My work focuses on developing GitHub’s policy positions, providing legal support on content policy development and enforcement, and engaging with policymakers to support policy outcomes that empower developers and shape the future of software.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20220106-041515/</link>
      <pubDate>Thu, 06 Jan 2022 04:15:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20220106-041515/</guid>
      <description>Long Links&amp;lt;br&amp;gt;
early in each month, recommending long-form pieces that I’d had     the time to read, acknowledging that people who aren’t semi-retired wouldn’t have time for all of them but perhaps one or two     would add value even for the busy.  I fell out of that habit but now it’s 2022 and there are plenty of tabs I meant to     write about, some dating back to early 2021.  So… Welcome, everyone, to 2022, and let’s go long! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2022/01/05/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/27/Small-Utopia&amp;#34;&amp;gt;Locally Optimal&amp;lt;/a&amp;gt; · It’s six months since my second Covid shot (team AZ/Moderna) and thus booster time. Which I found out this     morning via SMS from my local (BC, Canada) Centre for Disease Control.  The registration process was fast and painless.     This is exactly the sort of thing we thought we were building the Internet for, and has lessons to teach &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/27/Small-Utopia&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220106-041251/</link>
      <pubDate>Thu, 06 Jan 2022 04:12:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220106-041251/</guid>
      <description>From a friend! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/ynSWyXTiBz&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/ynSWyXTiBz&amp;#34;&amp;gt;https://t.co/ynSWyXTiBz&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
mckaywrigley.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/mckaywrigley&amp;#34;&amp;gt;@mckaywrigley&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@pmarca Blockchain &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/xx7vE1ii1k&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/xx7vE1ii1k&amp;#34;&amp;gt;https://t.co/xx7vE1ii1k&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
From a friend! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/r64tOH2HNF&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/r64tOH2HNF&amp;#34;&amp;gt;https://t.co/r64tOH2HNF&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20220106-001935/</link>
      <pubDate>Thu, 06 Jan 2022 00:19:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20220106-001935/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104289739/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$1,200 Ken Griffey Jr. Rookie card&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291822/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$158 Jackson JS Series Rhoads&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291818/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$531 1979 Honda other&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291804/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$70,488 2018 Tesla Model S&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220106-001338/</link>
      <pubDate>Thu, 06 Jan 2022 00:13:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220106-001338/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/TWzE3q6217&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/TWzE3q6217&amp;#34;&amp;gt;https://t.co/TWzE3q6217&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220105-201814/</link>
      <pubDate>Wed, 05 Jan 2022 20:18:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220105-201814/</guid>
      <description>&amp;lt;p&amp;gt;Dec 17, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-revolt-against-institutions-is/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com&amp;#34;&amp;gt;New&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Nov 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict/comments&amp;#34;&amp;gt;Comment 2&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Most popular&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/where-tech-workers-are-moving-new&amp;#34;&amp;gt;Where Tech Workers Are Moving: New LinkedIn Data vs. the Narrative&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-brilliance-of-all-gas-no-brakes&amp;#34;&amp;gt;The Brilliance of All Gas No Brakes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/completely-running-blind-apples-power&amp;#34;&amp;gt;“Completely Running Blind.” Apple’s Power Move To Kneecap Facebook Ads Is Working.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-a-slack-backlash-is-inevitable&amp;#34;&amp;gt;Why a Slack Backlash Is Inevitable&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/im-disturbed-african-tech-workers&amp;#34;&amp;gt;“I’m Disturbed.” African Tech Workers Push Back On US Startup Built To Help Them&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-removed-the-news-feed-algorithm&amp;#34;&amp;gt;Facebook Removed The News Feed Algorithm In An Experiment. Then It Gave Up.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive?sort=top&amp;#34;&amp;gt;See all popular&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220105-081300/</link>
      <pubDate>Wed, 05 Jan 2022 08:13:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220105-081300/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/eVJ0Z443QZ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/eVJ0Z443QZ&amp;#34;&amp;gt;https://t.co/eVJ0Z443QZ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20220105-042052/</link>
      <pubDate>Wed, 05 Jan 2022 04:20:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20220105-042052/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2022/01/04/business/opensea-13-billion-valuation-venture-funding.html&amp;#34;&amp;gt;OpenSea valued at $13.3 billion in new round of venture funding. The blockchain start-up, one of the most talked about in Silicon Valley, said on Tuesday that had it raised $300 million in new venture capital. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220105-041340/</link>
      <pubDate>Wed, 05 Jan 2022 04:13:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220105-041340/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7zrrnKOAYa&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7zrrnKOAYa&amp;#34;&amp;gt;https://t.co/7zrrnKOAYa&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/VSGMrWND2g&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/VSGMrWND2g&amp;#34;&amp;gt;https://t.co/VSGMrWND2g&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Thank you, anonymous contributor! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/nyPfAUX6lP&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/nyPfAUX6lP&amp;#34;&amp;gt;https://t.co/nyPfAUX6lP&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/XioGVdDhmc&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/XioGVdDhmc&amp;#34;&amp;gt;https://t.co/XioGVdDhmc&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20220105-001616/</link>
      <pubDate>Wed, 05 Jan 2022 00:16:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20220105-001616/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#constexpr&amp;#34;&amp;gt;constexpr&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Via Mark de Wever on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppalliance.org/slack/&amp;#34;&amp;gt;cpplang Slack&amp;lt;/a&amp;gt; : Mark demonstrates
how to tell whether a snippet of code is constexpr-friendly or not.
( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/xfcGGed1n&amp;#34;&amp;gt;Godbolt.&amp;lt;/a&amp;gt; )&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#ranges&amp;#34;&amp;gt;ranges&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220105-001329/</link>
      <pubDate>Wed, 05 Jan 2022 00:13:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220105-001329/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/9rupbgf0GG&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/9rupbgf0GG&amp;#34;&amp;gt;https://t.co/9rupbgf0GG&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/bxlEsaQJfs&amp;#34;&amp;gt;https://t.co/bxlEsaQJfs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/3YQB6k0VHz&amp;#34;&amp;gt;https://t.co/3YQB6k0VHz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220104-161301/</link>
      <pubDate>Tue, 04 Jan 2022 16:13:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220104-161301/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MEJXhWQEDF&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MEJXhWQEDF&amp;#34;&amp;gt;https://t.co/MEJXhWQEDF&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20220104-160914/</link>
      <pubDate>Tue, 04 Jan 2022 16:09:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20220104-160914/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-customer-success-dashboard/&amp;#34;&amp;gt;See why moving from separate tools to a central workflow for customer information was critical to scaling our customer success operations.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220104-081224/</link>
      <pubDate>Tue, 04 Jan 2022 08:12:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220104-081224/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/a5RXCAjgxX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/a5RXCAjgxX&amp;#34;&amp;gt;https://t.co/a5RXCAjgxX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220104-041258/</link>
      <pubDate>Tue, 04 Jan 2022 04:12:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220104-041258/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/QfCXv4cUFg&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/QfCXv4cUFg&amp;#34;&amp;gt;https://t.co/QfCXv4cUFg&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/fpMaO3eo75&amp;#34;&amp;gt;https://t.co/fpMaO3eo75&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220103-201400/</link>
      <pubDate>Mon, 03 Jan 2022 20:14:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220103-201400/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/BfKqLoPuK1&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/BfKqLoPuK1&amp;#34;&amp;gt;https://t.co/BfKqLoPuK1&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/EWIFiwNhir&amp;#34;&amp;gt;https://t.co/EWIFiwNhir&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>jarednelsen.dev</title>
      <link>https://www.whatsupup.com/blog/baldish/wince/20220103-200946/</link>
      <pubDate>Mon, 03 Jan 2022 20:09:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/baldish/wince/20220103-200946/</guid>
      <description>&amp;lt;p&amp;gt;Jared Nelsen Software Engineering and Computer Science&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/clojure-post-1/&amp;#34;&amp;gt;A Clojure Post&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/author/jared-nelsen&amp;#34;&amp;gt;Jared Nelsen&amp;lt;/a&amp;gt; | Nov 22, 2021 | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/categories/clojure&amp;#34;&amp;gt;Clojure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Lots of Clojure posts coming soon!&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/clojure-post-1/&amp;#34;&amp;gt;read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/author/jared-nelsen&amp;#34;&amp;gt;Jared Nelsen&amp;lt;/a&amp;gt; | Nov 22, 2021 | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/categories/industry&amp;#34;&amp;gt;Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Utilitarianism - “The morally right action or choice is the one that produces the most good.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/serve-a-flutter-web-app-from-a-docker-container/&amp;#34;&amp;gt;How to Serve a Flutter Web App From a Docker Container&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/author/jared-nelsen&amp;#34;&amp;gt;Jared Nelsen&amp;lt;/a&amp;gt; | Oct 20, 2020 | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/categories/flutter&amp;#34;&amp;gt;Flutter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
What is Flutter? Flutter is a UI toolkit for building natively compiled applications for mobile, web, and desktop platforms with a single codebase.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20220103-200831/</link>
      <pubDate>Mon, 03 Jan 2022 20:08:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20220103-200831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/best_paper_awards/&amp;#34;&amp;gt;Best Paper Awards&amp;lt;/a&amp;gt; in Computer Science conferences&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220102-162259/</link>
      <pubDate>Sun, 02 Jan 2022 16:22:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220102-162259/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/12/21/datalistsplit/&amp;#34;&amp;gt;Data.List.Split&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220102-081306/</link>
      <pubDate>Sun, 02 Jan 2022 08:13:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220102-081306/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/wrrQgmaxLr&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/wrrQgmaxLr&amp;#34;&amp;gt;https://t.co/wrrQgmaxLr&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220102-001358/</link>
      <pubDate>Sun, 02 Jan 2022 00:13:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220102-001358/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/stLUvN0K0a&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/stLUvN0K0a&amp;#34;&amp;gt;https://t.co/stLUvN0K0a&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20220101-002248/</link>
      <pubDate>Sat, 01 Jan 2022 00:22:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20220101-002248/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2018/10/06/counting-inversions-with-monoidal-sparks/&amp;#34;&amp;gt;Counting inversions with monoidal sparks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20220101-001906/</link>
      <pubDate>Sat, 01 Jan 2022 00:19:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20220101-001906/</guid>
      <description>Dec 17, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-revolt-against-institutions-is/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Nov 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict/comments&amp;#34;&amp;gt;Comment 2&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20220101-001541/</link>
      <pubDate>Sat, 01 Jan 2022 00:15:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20220101-001541/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0-------------------------------&amp;#34;&amp;gt;Mar 16, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20220101-001343/</link>
      <pubDate>Sat, 01 Jan 2022 00:13:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20220101-001343/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/hYSE0SKR92&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/hYSE0SKR92&amp;#34;&amp;gt;https://t.co/hYSE0SKR92&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20220101-000938/</link>
      <pubDate>Sat, 01 Jan 2022 00:09:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20220101-000938/</guid>
      <description>Sep 15, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211231-161954/</link>
      <pubDate>Fri, 31 Dec 2021 16:19:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211231-161954/</guid>
      <description>Sara Soueidan is an independent Web UI and design engineer, author, speaker, and trainer from Lebanon. Currently, she’s working on a new course, &amp;amp;quot;Practical Accessibility,&amp;amp;quot; meant to teach devs and designers ways to make their products accessible. We chatted with Sara about front-end web development, the importance of design and her appreciation of birds.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211231-081259/</link>
      <pubDate>Fri, 31 Dec 2021 08:12:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211231-081259/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/DAP9XNxAT0&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/DAP9XNxAT0&amp;#34;&amp;gt;https://t.co/DAP9XNxAT0&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211231-001802/</link>
      <pubDate>Fri, 31 Dec 2021 00:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211231-001802/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-first-annual-big-technology-book&amp;#34;&amp;gt;The First Annual Big Technology Book Awards&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-first-annual-big-technology-book&amp;#34;&amp;gt;Happy new year. Here are Big Technology’s best books of 2021.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211230-162036/</link>
      <pubDate>Thu, 30 Dec 2021 16:20:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211230-162036/</guid>
      <description>December 30, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/30/Language-design-considerations.html&amp;#34;&amp;gt;Breaking down a small language design proposal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211230-162030/</link>
      <pubDate>Thu, 30 Dec 2021 16:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211230-162030/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/12/hacks-decoded-sara-soueidan-award-winning-ui-design-engineer-and-author/&amp;#34;&amp;gt;Hacks Decoded: Sara Soueidan, Award-Winning UI Design Engineer and Author →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/12/hacks-decoded-sara-soueidan-award-winning-ui-design-engineer-and-author/&amp;#34;&amp;gt;Hacks Decoded: Sara Soueidan, Award-Winning UI Design Engineer and Author&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Sara Soueidan is an independent Web UI and design engineer, author, speaker, and trainer from Lebanon. When Sara isn’t offering keynote speeches at conferences (she’s done so a dozen times) she’s writing books like “Codrops CSS Reference” and “Smashing Book 5.” Currently, she’s working on a new course, &amp;amp;#34;Practical Accessibility,&amp;amp;#34; meant to teach devs and designers ways to make their products accessible. In 2015, Sara was voted Developer of the Year in the net awards, and shortlisted for the Outstanding Contribution of the Year award. She also won an O’Reilly Web Platform Award for “exceptional leadership, creativity, and collaboration in the development of JavaScript, HTML, CSS, and the supporting Web ecosystem.”
&amp;lt;p&amp;gt;We chatted with Sara about front-end web development, the importance of design and her appreciation of birds.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211230-121254/</link>
      <pubDate>Thu, 30 Dec 2021 12:12:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211230-121254/</guid>
      <description>Call for startup pitches! &amp;amp;ndash;&amp;amp;gt; &amp;amp;quot;Block button, but for real life.&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211230-000713/</link>
      <pubDate>Thu, 30 Dec 2021 00:07:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211230-000713/</guid>
      <description>KrebsOnSecurity.com celebrates its 12th anniversary today! Maybe “celebrate” is too indelicate a word for a year wracked by the global pandemics of COVID-19 and ransomware. Especially since stories about both have helped to grow the audience here tremendously in 2021. But this site’s birthday also is a welcome opportunity to thank you all for your continued readership and support, which helps keep the content here free to everyone.&amp;lt;br&amp;gt;
More than seven million unique visitors came to KrebsOnSecurity.com in 2021, generating some 12 million&#43; pageviews and leaving almost 8,000 comments. We also now have nearly 50,000 subscribers to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/subscribe/&amp;#34;&amp;gt;our email newsletter&amp;lt;/a&amp;gt; , which is still just a text-based (non-HTML) email that goes out each time a new story is published here (~2-3 times a week).&amp;lt;br&amp;gt;
Back when this site first began 12 years ago, I never imagined it would attract such a level of engagement. Before launching KrebsOnSecurity, I was a tech reporter for washingtonpost.com. For many years, The Post’s website was physically, financially and editorially separate from what the dot-com employees affectionately called “The Dead Tree Edition.” When the two newsrooms finally merged in 2009, my position was eliminated.&amp;lt;br&amp;gt;
Happily, the blog I authored for four years at washingtonpost.com — Security Fix — had attracted a sizable readership, and it seemed clear that the worldwide appetite for in-depth news about computer security and cybercrime would become practically insatiable in the coming years.&amp;lt;br&amp;gt;
Happier still, The Post offered a severance package equal to six months of my salary. Had they not thrown that lifeline, I doubt I’d have had the guts to go it alone. But at the time, my wife basically said I had six months to make this “blog thing” work, or else find a “real job.”&amp;lt;br&amp;gt;
God bless her eternal patience with my adopted occupation, because KrebsOnSecurity has helped me avoid finding a real job for a dozen years now. And hopefully they let me keep doing this, because at this point I’m certainly unqualified to do much else.&amp;lt;br&amp;gt;
I’d be remiss if I didn’t take this opportunity to remind Dear Readers that advertisers do help keep the content free here to everyone. For security and privacy reasons, KrebsOnSecurity does not host any third-party content on this site — and this includes the ad creatives, which are simply images or GIFs vetted by Yours Truly and served directly from krebsonsecurity.com.&amp;lt;br&amp;gt;
That’s a long-winded way of asking: If you regularly visit KrebsOnSecurity.com with an ad blocker, please consider adding an exception for this site.&amp;lt;br&amp;gt;
Thanks again, Dear Readers. Please stay safe, healthy and alert in 2022. See you on the other side!&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/happy-12th-birthday-krebsonsecurity-com/&amp;#34;&amp;gt;Happy 12th Birthday, KrebsOnSecurity.com!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211229-041600/</link>
      <pubDate>Wed, 29 Dec 2021 04:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211229-041600/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/27/Small-Utopia&amp;#34;&amp;gt;Locally Optimal&amp;lt;/a&amp;gt; · It’s six months since my second Covid shot (team AZ/Moderna) and thus booster time. Which I found out this     morning via SMS from my local (BC, Canada) Centre for Disease Control.  The registration process was fast and painless.     This is exactly the sort of thing we thought we were building the Internet for, and has lessons to teach &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/27/Small-Utopia&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/12/Series-2021&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [3 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211229-002122/</link>
      <pubDate>Wed, 29 Dec 2021 00:21:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211229-002122/</guid>
      <description>December 28, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/12/28/Starship.gmi&amp;#34;&amp;gt;Thoughts on the SpaceX Starship program&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211228-122049/</link>
      <pubDate>Tue, 28 Dec 2021 12:20:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211228-122049/</guid>
      <description>December 28, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/28/Dont-use-Discord-for-FOSS.html&amp;#34;&amp;gt;Please don&amp;#39;t use Discord for FOSS projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211228-121337/</link>
      <pubDate>Tue, 28 Dec 2021 12:13:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211228-121337/</guid>
      <description>Big news! I just discovered you can get around a Twitter block by opening an Incognito browser window. Or just opening a different browser. Or creating a second Twitter account.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211228-041626/</link>
      <pubDate>Tue, 28 Dec 2021 04:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211228-041626/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#ranges&amp;#34;&amp;gt;ranges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Here’s a C&#43;&#43; riddle for you: When does&amp;lt;br&amp;gt;
std::invoke&amp;lt;br&amp;gt;
not invoke?&amp;lt;br&amp;gt;
struct Incomplete;
Incomplete&amp;amp;amp;&amp;amp;amp; give();
void take(Incomplete&amp;amp;amp;&amp;amp;amp;);&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;void okay() {
take(give());  // OK, valid C&#43;&#43;
}&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;void bad() {
std::invoke(take, give());  // UB
}&amp;lt;br&amp;gt;
Given this code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/4rsf98rqM&amp;#34;&amp;gt;Godbolt&amp;lt;/a&amp;gt; ),
libc&#43;&#43; and Microsoft accept the call to&amp;lt;br&amp;gt;
invoke&amp;lt;br&amp;gt;
, but libstdc&#43;&#43;
rejects with a spew of errors:&amp;lt;br&amp;gt;
type_traits:3027:7: error: static_assert failed due to requirement
&amp;#39;std::__is_complete_or_unbounded(std::__type_identity&amp;amp;lt;Incomplete&amp;amp;gt;{})&amp;#39;
&amp;amp;quot;each argument type must be a complete class or an unbounded array&amp;amp;quot;
static_assert((std::__is_complete_or_unbounded(
^              ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211227-121735/</link>
      <pubDate>Mon, 27 Dec 2021 12:17:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211227-121735/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cn.nytimes.com/science/20211227/james-webb-telescope-launch/&amp;#34;&amp;gt;阅读简体中文版&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cn.nytimes.com/science/20211227/james-webb-telescope-launch/zh-hant/&amp;#34;&amp;gt;閱讀繁體中文版&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20211227-121604/</link>
      <pubDate>Mon, 27 Dec 2021 12:16:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20211227-121604/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291618/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$41,498 2018 Tesla Model 3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291553/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$52,732 2018 Tesla Model 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291539/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$650 Official SUPER BOWL XLVlll Heavy weather jacket, NEVER WORN&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291207/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$600 Canon EOS R 30.3MP Mirrorless Digital Camera - Black (Body O&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20211226-201906/</link>
      <pubDate>Sun, 26 Dec 2021 20:19:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20211226-201906/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;How I accidentally built a Podcast API business yesterday · In this article, I’ll share with you the journey of building this API business, the technology behind it, and hopefully you can learn one thing or two and build your own API business in the future. Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211226-041816/</link>
      <pubDate>Sun, 26 Dec 2021 04:18:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211226-041816/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2016/09/02/deep-work-and-email-habits/&amp;#34;&amp;gt;Deep work and email habits&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211226-041048/</link>
      <pubDate>Sun, 26 Dec 2021 04:10:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211226-041048/</guid>
      <description>&amp;lt;p&amp;gt;How to use Twitter in four easy steps:&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;Follow based on a single tweet&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Block based on a single tweet&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Never read notifications&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Never tweet
QED
Merry Christmas&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211225-201426/</link>
      <pubDate>Sat, 25 Dec 2021 20:14:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211225-201426/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03655-4&amp;#34;&amp;gt;Webb telescope blasts off successfully — launching a new era in astronomy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hundreds of engineering steps must now take place as the observatory unfurls and travels to its new home.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211225-161824/</link>
      <pubDate>Sat, 25 Dec 2021 16:18:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211225-161824/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2017/06/07/the-typeclassopedia-is-now-up-to-date/&amp;#34;&amp;gt;The Typeclassopedia is now up-to-date&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211225-161715/</link>
      <pubDate>Sat, 25 Dec 2021 16:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211225-161715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/25/science/james-webb-telescope-launch.html&amp;#34;&amp;gt;James Webb Space Telescope Launches on Journey to See the Dawn of Starlight Astronomers were jubilant as the spacecraft made it off the launchpad following decades of delays and cost overruns. The Webb is set to offer a new keyhole into the earliest moments of our universe. By Dennis Overbye and Joey Roulette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/12/25/science/webb-telescope-launch-nasa/scientists-have-new-tools-to-search-for-conditions-of-life-on-exoplanets&amp;#34;&amp;gt;Scientists have new tools to search for conditions of life on exoplanets. This was featured in live coverage. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/12/25/science/webb-telescope-launch-nasa/what-the-webb-may-teach-us-about-black-holes&amp;#34;&amp;gt;What the Webb may teach us about black holes. This was featured in live coverage. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/25/science/hubble-telescope-vs-webb.html&amp;#34;&amp;gt;How the Webb telescope compares with the Hubble. The James Webb Space Telescope will advance astronomy far beyond the vaunted Hubble, which has been humanity’s most powerful space observatory for more than 30 years. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/12/25/science/webb-telescope-launch-nasa/a-christmas-gift-for-astronomers-the-webb-telescope-lifts-off&amp;#34;&amp;gt;A Christmas gift for astronomers: The Webb telescope lifts off. This was featured in live coverage. By Dennis Overbye and Joey Roulette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211225-121657/</link>
      <pubDate>Sat, 25 Dec 2021 12:16:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211225-121657/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/25/science/james-webb-homophobia.html&amp;#34;&amp;gt;The telescope stumbled over its own name. Choosing to name NASA’s biggest telescope over James Webb, a former administrator of the space agency, has provoked controversy. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/12/25/science/webb-telescope-launch-nasa/astronomers-have-a-lot-to-be-anxious-about&amp;#34;&amp;gt;Astronomers have a lot to be anxious about. This was featured in live coverage. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/12/25/science/webb-telescope-launch-nasa/the-webbs-big-bang-science&amp;#34;&amp;gt;The Webb’s Big Bang science. This was featured in live coverage. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211225-081851/</link>
      <pubDate>Sat, 25 Dec 2021 08:18:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211225-081851/</guid>
      <description>December 25, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/25/Use-me-as-a-resource.html&amp;#34;&amp;gt;Please use me as a resource&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Before reaching out to me, be aware that I get many emails, and my typical
response time can be days or weeks. Please keep that in mind before
sending me a question that could be answered with a web search, reading a
man page, asking an on-topic IRC channel, etc. I do want to read your
email, though, so if in doubt, send it!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20211225-081705/</link>
      <pubDate>Sat, 25 Dec 2021 08:17:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20211225-081705/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291553/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$52,732 2018 Tesla Model 3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291539/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$650 Official SUPER BOWL XLVlll Heavy weather jacket, NEVER WORN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291207/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$600 Canon EOS R 30.3MP Mirrorless Digital Camera - Black (Body O&amp;amp;hellip;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291502/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$225 New 6/6 Double Lap Steel Slide Electric Guitar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211224-121812/</link>
      <pubDate>Fri, 24 Dec 2021 12:18:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211224-121812/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/24/science/webb-telescope-launch-date-livestream.html&amp;#34;&amp;gt;How to Watch the James Webb Space Telescope Launch Astronomers have been waiting eagerly for the beginning of the powerful space observatory’s mission, and on Christmas morning they may finally get their wish. By Dennis Overbye and Joey Roulette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211224-082046/</link>
      <pubDate>Fri, 24 Dec 2021 08:20:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211224-082046/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://supporters.eff.org/donate/year-end-challenge--SBD&amp;#34;&amp;gt;Year-End Challenge Desktop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211224-082044/</link>
      <pubDate>Fri, 24 Dec 2021 08:20:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211224-082044/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://supporters.eff.org/donate/year-end-challenge--SBD&amp;#34;&amp;gt;Year-End Challenge Desktop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211224-081722/</link>
      <pubDate>Fri, 24 Dec 2021 08:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211224-081722/</guid>
      <description>December 23, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/23/Sustainable-creativity-post-copyright.html&amp;#34;&amp;gt;Sustainable creativity in a world without copyright&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211224-081323/</link>
      <pubDate>Fri, 24 Dec 2021 08:13:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211224-081323/</guid>
      <description>Editors Note:&amp;lt;br&amp;gt;
The below numbers were calculated based on both log4j-core and log4j-api, as both were listed on the CVE. Since then, the CVE has been updated with the clarification that only log4j-core is affected.&amp;lt;br&amp;gt;
The ecosystem impact numbers for just log4j-core, as of 19th December are over 17,000 packages affected, which is roughly 4% of the ecosystem. 25% of affected packages have fixed versions available. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://commondatastorage.googleapis.com/log4j_vulnerability/log4j_top_500_dependents.csv&amp;#34;&amp;gt;linked list&amp;lt;/a&amp;gt; , which continues to be updated, only includes packages which depend on log4j-core. ## More than 35,000 Java packages, amounting to over 8% of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.maven.org/&amp;#34;&amp;gt;Maven Central repository&amp;lt;/a&amp;gt; (the most significant Java package repository), have been impacted by the recently disclosed log4j vulnerabilities ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/advisory/GHSA/GHSA-jfh8-c2jp-5v3q&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/advisory/GHSA/GHSA-7rjr-3q55-vv33&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; ), with widespread fallout across the software industry. The vulnerabilities allow an attacker to perform remote code execution by exploiting the insecure JNDI lookups feature exposed by the logging library log4j. This exploitable feature was enabled by default in many versions of the library.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211224-081116/</link>
      <pubDate>Fri, 24 Dec 2021 08:11:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211224-081116/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/HchtZ4bRUx&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/HchtZ4bRUx&amp;#34;&amp;gt;https://t.co/HchtZ4bRUx&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211224-080823/</link>
      <pubDate>Fri, 24 Dec 2021 08:08:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211224-080823/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/series-c/&amp;#34;&amp;gt;Many startups today fundraise with the goal of getting the most money at the highest valuation possible. But at Retool, we decided to take the opposite strategy.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211224-080647/</link>
      <pubDate>Fri, 24 Dec 2021 08:06:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211224-080647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/stop-postponing-things-by-embracing-the-mess&amp;#34;&amp;gt;Stop postponing things by embracing the mess&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211224-080630/</link>
      <pubDate>Fri, 24 Dec 2021 08:06:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211224-080630/</guid>
      <description>“Basically the perfect ending to cybersecurity in 2021 is a 90s style Java vulnerability in an open source module, written by two volunteers with no funding, used by large cybersecurity vendors, undetected until Minecraft chat got pwned, where nobody knows how to respond properly.”&amp;lt;br&amp;gt;
The Cybersecurity and Infrastructure Security Agency (CISA) has joined with the FBI , National Security Agency (NSA) and partners abroad in publishing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/uscert/ncas/alerts/aa21-356a&amp;#34;&amp;gt;an advisory&amp;lt;/a&amp;gt; to help organizations mitigate Log4Shell and other Log4j-related vulnerabilities.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211221-042016/</link>
      <pubDate>Tue, 21 Dec 2021 04:20:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211221-042016/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/07/10/competitive-programming-in-haskell-2d-cross-product-part-1/&amp;#34;&amp;gt;Competitive programming in Haskell: 2D cross product, part 1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211220-202032/</link>
      <pubDate>Mon, 20 Dec 2021 20:20:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211220-202032/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/20/technology/silicon-valley-cryptocurrency-start-ups.html&amp;#34;&amp;gt;The New Get-Rich-Faster Job in Silicon Valley: Crypto Start-Ups Tech executives and engineers are quitting Google, Meta, Amazon and other large companies for what they say is a once-in-generation opportunity with crypto. By Daisuke Wakabayashi and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20211220-201909/</link>
      <pubDate>Mon, 20 Dec 2021 20:19:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20211220-201909/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/donate-stripe?utm_source=stripe&amp;#34;&amp;gt;Be part of The Markup’s future. Give now!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/people/julia-angwin#content&amp;#34;&amp;gt;Skip navigation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Before founding The Markup, she led investigative teams at ProPublica and The Wall Street Journal. She is the author of “Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance” (Times Books, 2014) and “Stealing MySpace: The Battle to Control the Most Popular Website in America” (Random House, March 2009). She has a B.A. in mathematics from The University of Chicago and an MBA from Columbia University.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211220-121928/</link>
      <pubDate>Mon, 20 Dec 2021 12:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211220-121928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/20/science/webb-telescope-astronomy.html&amp;#34;&amp;gt;Out There Webb Telescope Prepares to Ascend, With an Eye Toward Our Origins The biggest space telescope in history aims to answer astronomy’s oldest question: How did we get from the Big Bang to here? By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211218-162125/</link>
      <pubDate>Sat, 18 Dec 2021 16:21:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211218-162125/</guid>
      <description>December 18, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/18/Commercial-forks-of-FOSS-projects.html&amp;#34;&amp;gt;On commercial forks of FOSS projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211218-121943/</link>
      <pubDate>Sat, 18 Dec 2021 12:19:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211218-121943/</guid>
      <description>December 18, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/18/Commercial-forks-of-FOSS-projects.html&amp;#34;&amp;gt;On commercial forks FOSS projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211218-041425/</link>
      <pubDate>Sat, 18 Dec 2021 04:14:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211218-041425/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/apache-log4j-vulnerability.html&amp;#34;&amp;gt;Apache Log4j Vulnerability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Like many other companies, we’re closely following the multiple CVEs regarding Apache Log4j 2. Our security teams are investigating any potential impact on Google products and services and are focused on protecting our users and customers. We encourage anyone who manages environments containing Log4j 2 to update to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://logging.apache.org/log4j/2.x/download.html&amp;#34;&amp;gt;latest version&amp;lt;/a&amp;gt; . Based on findings in our ongoing investigations, here is our list of product and service updates as of December 17th ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&amp;#34;&amp;gt;CVE-2021-44228&amp;lt;/a&amp;gt; &amp;amp;amp; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/vuln/detail/CVE-2021-45046&amp;#34;&amp;gt;CVE-2021-45046&amp;lt;/a&amp;gt; ): Android is not aware of any impact to the Android Platform or Enterprise. At this time, no update is required for this specific vulnerability, but we encourage our customers to ensure that the latest security updates are applied to their devices. Chrome OS releases and infrastructure are not using versions of Log4j affected by the vulnerability. Chrome Browser releases, infrastructure and admin console are not using versions of Log4j affected by the vulnerability. Google Cloud has a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/log4j2-security-advisory&amp;#34;&amp;gt;specific advisory&amp;lt;/a&amp;gt; dedicated to updating customers on the status of GCP and Workspace products and services. Google Marketing Platform, including Google Ads is not using versions of Log4j affected by the vulnerability. This includes Display &amp;amp;amp; Video 360, Search Ads 360, Google Ads, Analytics (360 and free), Optimize 360, Surveys 360  &amp;amp;amp; Tag Manager 360. YouTube is not using versions of Log4j affected by the vulnerability. We will continue to update this advisory with the latest information.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20211217-201710/</link>
      <pubDate>Fri, 17 Dec 2021 20:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20211217-201710/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104281340/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$800 Thomas McKnight Signed Limited Edition Serigraph Print, Medi&amp;amp;hellip;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291343/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$83,180 2018 Porsche Panamera&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211217-201458/</link>
      <pubDate>Fri, 17 Dec 2021 20:14:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211217-201458/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/understanding-impact-of-apache-log4j.html&amp;#34;&amp;gt;Understanding the Impact of Apache Log4j Vulnerability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by James Wetter and Nicky Ringland, Open Source Insights Team&amp;lt;br&amp;gt;
More than 35,000 Java packages, amounting to over 8% of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.maven.org/&amp;#34;&amp;gt;Maven Central repository&amp;lt;/a&amp;gt; (the most significant Java package repository), have been impacted by the recently disclosed log4j vulnerabilities ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/advisory/GHSA/GHSA-jfh8-c2jp-5v3q&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/advisory/GHSA/GHSA-7rjr-3q55-vv33&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; ), with widespread fallout across the software industry. The vulnerabilities allow an attacker to perform remote code execution by exploiting the insecure JNDI lookups feature exposed by the logging library log4j. This exploitable feature was enabled by default in many versions of the library.&amp;lt;br&amp;gt;
This vulnerability has captivated the information security ecosystem since its disclosure on December 9th because of both its severity and widespread impact. As a popular logging tool, log4j is used by tens of thousands of software packages (known as artifacts in the Java ecosystem) and projects across the software industry. User’s lack of visibility into their dependencies and transitive dependencies has made patching difficult; it has also made it difficult to determine the full blast radius of this vulnerability. Using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/&amp;#34;&amp;gt;Open Source Insights&amp;lt;/a&amp;gt; , a project to help understand open source dependencies, we surveyed all versions of all artifacts in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.maven.org/&amp;#34;&amp;gt;Maven Central Repository&amp;lt;/a&amp;gt; to determine the scope of the issue in the open source ecosystem of JVM based languages, and to track the ongoing efforts to mitigate the affected packages.&amp;lt;br&amp;gt;
How widespread is the log4j vulnerability?&amp;lt;br&amp;gt;
As of December 16, 2021, we found that 35,863 of the available Java artifacts from Maven Central depend on the affected log4j code. This means that more than 8% of all packages on Maven Central have at least one version that is impacted by this vulnerability. (These numbers do not encompass all Java packages, such as directly distributed binaries, but Maven Central is a strong proxy for the state of the ecosystem.) As far as ecosystem impact goes, 8% is enormous. The average ecosystem impact of advisories affecting Maven Central is 2%, with the median less than 0.1%.&amp;lt;br&amp;gt;
Direct dependencies account for around 7,000 of the affected artifacts, meaning that any of its versions depend upon an affected version of log4j-core or log4j-api, as described in the CVEs. The majority of affected artifacts come from indirect dependencies (that is, the dependencies of one’s own dependencies), meaning log4j is not explicitly defined as a dependency of the artifact, but gets pulled in as a transitive dependency.&amp;lt;br&amp;gt;
What is the current progress in fixing the open source JVM ecosystem? We counted an artifact as fixed if the artifact had at least one version affected and has released a greater stable version (according to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://semver.org/&amp;#34;&amp;gt;semantic&amp;lt;/a&amp;gt; versioning) that is unaffected. An artifact affected by log4j is considered fixed if it has updated to 2.16.0 or removed its dependency on log4j altogether. At the time of writing, nearly five thousand of the affected artifacts have been fixed. This represents a rapid response and mammoth effort both by the log4j maintainers and the wider community of open source consumers. That leaves over 30,000 artifacts affected, many of which are dependent on another artifact to patch (the transitive dependency) and are likely blocked.&amp;lt;br&amp;gt;
Why is fixing the JVM ecosystem hard?&amp;lt;br&amp;gt;
Most artifacts that depend on log4j do so indirectly. The deeper the vulnerability is in a dependency chain, the more steps are required for it to be fixed. The following diagram shows a histogram of how deeply an affected log4j package (core or api) first appears in consumers dependency graphs. F or greater than 80% of the packages, the vulnerability is more than one level deep, with a majority affected five levels down (and some as many as nine levels down). These packages will require fixes throughout all parts of the tree, starting from the deepest dependencies first.&amp;lt;br&amp;gt;
Another difficulty is caused by ecosystem-level choices in the dependency resolution algorithm and requirement specification conventions. In the Java ecosystem, it’s common practice to specify “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://maven.apache.org/pom.html#Dependency_Version_Requirement_Specification&amp;#34;&amp;gt;soft&amp;lt;/a&amp;gt; ” version requirements — exact versions that are used by the resolution algorithm if no other version of the same package appears earlier in the dependency graph. Propagating a fix often requires explicit action by the maintainers to update the dependency requirements to a patched version. This practice is in contrast to other ecosystems, such as npm, where it’s common for developers to specify open ranges for dependency requirements. Open ranges allow the resolution algorithm to select the most recently released version that satisfies dependency requirements, thereby pulling in new fixes. Consumers can get a patched version on the next build after the patch is available, which propagates up the dependencies quickly. (This approach is not without its drawbacks; pulling in new fixes can also pull in new problems.)&amp;lt;br&amp;gt;
How long will it take for this vulnerability to be fixed across the entire ecosystem?&amp;lt;br&amp;gt;
It’s hard to say. We looked at all publicly disclosed critical advisories affecting Maven packages to get a sense of how quickly other vulnerabilities have been fully addressed. Less than half (48%) of the artifacts affected by a vulnerability have been fixed, so we might be in for a long wait, likely years. But things are looking promising on the log4j front. After less than a week, 4,620 affected artifacts (~13%) have been fixed. This, more than any other stat, speaks to the massive effort by open source maintainers, information security teams and consumers across the globe.&amp;lt;br&amp;gt;
Where to focus next?&amp;lt;br&amp;gt;
Thanks and congratulations are due to the open source maintainers and consumers who have already upgraded their versions of log4j. As part of our investigation, we pulled together &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://commondatastorage.googleapis.com/log4j_vulnerability/log4j_top_500_dependents.csv&amp;#34;&amp;gt;a list&amp;lt;/a&amp;gt; of 500 affected packages with some of the highest transitive usage. If you are a maintainer or user helping with the patching effort, prioritizing these packages could maximize your impact and unblock more of the community. We encourage the open source community to continue to strengthen security in these packages by enabling automated dependency updates and adding security mitigations. Improvements such as these could qualify for financial rewards from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sos.dev/&amp;#34;&amp;gt;Secure Open Source Rewards program&amp;lt;/a&amp;gt; . You can explore your package dependencies and their vulnerabilities by using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/&amp;#34;&amp;gt;Open Source Insights&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211217-120849/</link>
      <pubDate>Fri, 17 Dec 2021 12:08:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211217-120849/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/best-laravel-admin-panels/&amp;#34;&amp;gt;In this article, we&amp;#39;ll compare a few of the popular Laravel admin panel packages, so you can get a better idea of which one is right for your project.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211217-081831/</link>
      <pubDate>Fri, 17 Dec 2021 08:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211217-081831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-revolt-against-institutions-is&amp;#34;&amp;gt;The Revolt Against Institutions Is 2021’s Defining Story&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-revolt-against-institutions-is&amp;#34;&amp;gt;In 2020 we came to terms with the pandemic, in 2021 we responded.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211217-001458/</link>
      <pubDate>Fri, 17 Dec 2021 00:14:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211217-001458/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/improving-oss-fuzz-and-jazzer-to-catch.html&amp;#34;&amp;gt;Improving OSS-Fuzz and Jazzer to catch Log4Shell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The discovery of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228&amp;#34;&amp;gt;Log4Shell vulnerability&amp;lt;/a&amp;gt; has set the internet on fire. Similar to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Shellshock_(software_bug)&amp;#34;&amp;gt;shellshock&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://heartbleed.com/&amp;#34;&amp;gt;heartbleed&amp;lt;/a&amp;gt; , Log4Shell is just the latest catastrophic vulnerability in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/NCSC-NL/log4shell/tree/main/software&amp;#34;&amp;gt;software that runs the internet&amp;lt;/a&amp;gt; . Our mission as the Google Open Source Security Team is to secure the open source libraries the world depends on, such as Log4j. One of our capabilities in this space is OSS-Fuzz, a free fuzzing service that is used by over 500 critical open source projects and has found more than &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/oss-fuzz/issues/list?q=type%3Dbug-security%20-status%3Aduplicate%2Cwontfix&amp;amp;can=1&amp;#34;&amp;gt;7,000 vulnerabilities&amp;lt;/a&amp;gt; in its lifetime. We want to empower open source developers to secure their code on their own. Over the next year we will work on better automated detection of non-memory corruption vulnerabilities such as Log4Shell. We have started this work by partnering with the security company &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.code-intelligence.com/&amp;#34;&amp;gt;Code Intelligence&amp;lt;/a&amp;gt; to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz/pull/7016&amp;#34;&amp;gt;provide continuous fuzzing for Log4j&amp;lt;/a&amp;gt; , as part of OSS-Fuzz. Also as part of this partnership, Code-Intelligence improved their &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/CodeIntelligenceTesting/jazzer&amp;#34;&amp;gt;Jazzer fuzzing engine&amp;lt;/a&amp;gt; to make it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/CodeIntelligenceTesting/jazzer/blob/3fed476bed7c61370e12062b5b97a939e3c5e591/sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers/NamingContextLookup.kt#L90&amp;#34;&amp;gt;capable of detecting remote JNDI lookups&amp;lt;/a&amp;gt; . We have awarded Code Intelligence $25,000 for this effort and will continue to work with them on securing the open source ecosystem.&amp;lt;br&amp;gt;
Caption: OSS-Fuzz and Jazzer finding the Log4Shell Vulnerability&amp;lt;br&amp;gt;
Vulnerabilities like Log4Shell are an eye-opener for the industry in terms of new attack vectors. With OSS-Fuzz and Jazzer, we can now detect this class of vulnerability so that they can be fixed before they become a problem in production code. Over the past year we have made a number of investments to strengthen the security of critical open source projects, and recently announced our $ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/&amp;#34;&amp;gt;10 billion commitment to cybersecurity&amp;lt;/a&amp;gt; defense including $100 million to support third-party foundations that manage open source security priorities and help fix vulnerabilities. We appreciate the maintainers, security engineers and incident responders that are working to mitigate Log4j and make our internet ecosystem safer. Check out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/oss-fuzz/getting-started/new-project-guide/jvm-lang/&amp;#34;&amp;gt;our documentation&amp;lt;/a&amp;gt; to get started using OSS-Fuzz.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211216-201745/</link>
      <pubDate>Thu, 16 Dec 2021 20:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211216-201745/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-logging/major-tech-companies-struggle-to-plug-holes-in-logging-software-idUSKBN2IV25F&amp;#34;&amp;gt;Major tech companies struggle to plug holes in logging software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     Some of the world’s largest technology companies are still struggling to make their products safe from a gaping vulnerability in common logging software a week after hackers began trying to exploit it.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211216-200638/</link>
      <pubDate>Thu, 16 Dec 2021 20:06:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211216-200638/</guid>
      <description>A 24-year-old New York man who bragged about helping to steal more than $20 million worth of cryptocurrency from a technology executive has pleaded guilty to conspiracy to commit wire fraud. Nicholas Truglia was part of a group alleged to have stolen more than $100 million from cryptocurrency investors using fraudulent “SIM swaps,” scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identities.&amp;lt;br&amp;gt;
Truglia &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/12/trugliaadmission.png&amp;#34;&amp;gt;admitted&amp;lt;/a&amp;gt; to a New York federal court that he let a friend use his account at crypto-trading platform Binance in 2018 to launder more than $20 million worth of virtual currency stolen from Michael Terpin , a cryptocurrency investor who co-founded the first angel investor group for bitcoin enthusiasts.&amp;lt;br&amp;gt;
Following the theft, Terpin filed a civil lawsuit against Truglia with the Los Angeles Superior court. In May 2019, the jury awarded Terpin a $75.8 million judgment against Truglia. In January 2020, a New York grand jury &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/12/trugliaIndictment.pdf&amp;#34;&amp;gt;criminally indicted Truglia&amp;lt;/a&amp;gt; (PDF) for his part in the crypto theft from Terpin.&amp;lt;br&amp;gt;
A SIM card is the tiny, removable chip in a mobile device that allows it to connect to the provider’s network. Customers can legitimately request a SIM swap when their mobile device has been damaged or lost, or when they are switching to a different phone that requires a SIM card of another size.&amp;lt;br&amp;gt;
Nicholas Truglia, holding bottle. Image: twitter.com/erupts&amp;lt;br&amp;gt;
But fraudulent SIM swaps are frequently abused by scam artists who trick mobile providers into tying a target’s service to a new SIM card and mobile phone controlled by the scammers. Unauthorized SIM swaps often are perpetrated by fraudsters who have already stolen or phished a target’s password, as many financial institutions and online services rely on text messages to send users a one-time code for multi-factor authentication.&amp;lt;br&amp;gt;
Compounding the threat, many websites let customers reset their passwords merely by clicking a link sent via SMS to the mobile phone number tied to the account, meaning anyone who controls that phone number can reset the passwords for those accounts.&amp;lt;br&amp;gt;
Reached for comment, Terpin said his assailant got off easy.&amp;lt;br&amp;gt;
“I am outraged that after nearly four years and hundreds of pages of evidence that the best the prosecutors could recommend was a plea bargain for a single, relatively minor count of the unauthorized use of a Binance exchange account, when all the evidence points toward Truglia being one of two masterminds of a wide-ranging criminal conspiracy to steal crypto from me and others,” Terpin told KrebsOnSecurity.&amp;lt;br&amp;gt;
Terpin said public court records already show Truglia bragging about stealing his funds and using it to finance a lavish lifestyle.&amp;lt;br&amp;gt;
“He at the very least withdrew 100 bitcoin (worth $1.6 million at the time and nearly $5 million today) from my theft into his wallet at a separate, US-based exchange, and then moved or spent it,” Terpin said. “The fact is that the intentional theft of $24 million, whether taken at the point of a gun in a bank or through a SIM card swap, is a major felony. Truglia should be prosecuted to the fullest extent of the law.”&amp;lt;br&amp;gt;
Nicholas Truglia, showing off a diamond-studded Piaget watch while aboard a private jet. Image: twitter.com/erupts.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/ny-man-pleads-guilty-in-20-million-sim-swap-theft/&amp;#34;&amp;gt;NY Man Pleads Guilty in $20 Million SIM Swap Theft&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211216-081954/</link>
      <pubDate>Thu, 16 Dec 2021 08:19:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211216-081954/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/15/business/reddit-ipo.html&amp;#34;&amp;gt;Reddit takes its first official step toward going public. The company announced it had confidentially filed paperwork for an I.P.O., but without disclosing financial details. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211216-080607/</link>
      <pubDate>Thu, 16 Dec 2021 08:06:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211216-080607/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/12/15/eathena-rumour.html&amp;#34;&amp;gt;What it was like to play Ragnarok Online as a computer scientist&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211216-042109/</link>
      <pubDate>Thu, 16 Dec 2021 04:21:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211216-042109/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/15/business/reddit-ipo.html&amp;#34;&amp;gt;Reddit takes first official step toward going public. The company announced it had confidentially filed paperwork for an I.P.O., but without disclosing financial details. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211216-041626/</link>
      <pubDate>Thu, 16 Dec 2021 04:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211216-041626/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html&amp;#34;&amp;gt;A deep dive into an NSO zero-click iMessage exploi&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211215-201604/</link>
      <pubDate>Wed, 15 Dec 2021 20:16:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211215-201604/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03765-z&amp;#34;&amp;gt;Daily briefing: COVID ‘super-immunity’ might wane over time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Protection against SARS-CoV-2 might decline over time, even in people who have been infected and vaccinated. Plus, home zookeepers breed insects for rewilding, and Sci-Hub’s court battle in India.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211215-201512/</link>
      <pubDate>Wed, 15 Dec 2021 20:15:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211215-201512/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html&amp;#34;&amp;gt;A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ian Beer &amp;amp;amp; Samuel Groß of Google Project Zero&amp;lt;br&amp;gt;
We want to thank Citizen Lab for sharing a sample of the FORCEDENTRY exploit with us, and Apple’s Security Engineering and Architecture (SEAR) group for collaborating with us on the technical analysis. The editorial opinions reflected below are solely Project Zero’s and do not necessarily reflect those of the organizations we collaborated with during this research.&amp;lt;br&amp;gt;
Earlier this year, Citizen Lab managed to capture an NSO iMessage-based zero-click exploit being used to target a Saudi activist. In this two-part blog post series we will describe for the first time how an in-the-wild zero-click iMessage exploit works.&amp;lt;br&amp;gt;
Based on our research and findings, we assess this to be one of the most technically sophisticated exploits we&amp;amp;#39;ve ever seen, further demonstrating that the capabilities NSO provides rival those previously thought to be accessible to only a handful of nation states.&amp;lt;br&amp;gt;
The vulnerability discussed in this blog post was fixed on September 13, 2021 in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.apple.com/en-us/HT212807&amp;#34;&amp;gt;iOS 14.8&amp;lt;/a&amp;gt; as CVE-2021-30860.&amp;lt;br&amp;gt;
NSO&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/NSO_Group&amp;#34;&amp;gt;NSO&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/NSO_Group&amp;#34;&amp;gt;Group&amp;lt;/a&amp;gt; is one of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.atlanticcouncil.org/in-depth-research-reports/report/countering-cyber-proliferation-zeroing-in-on-access-as-a-service/&amp;#34;&amp;gt;highest-profile providers of &amp;amp;#34;access-as-a-service&amp;amp;#34;&amp;lt;/a&amp;gt; , selling packaged hacking solutions which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/&amp;#34;&amp;gt;enable nation state actors without a home-grown offensive cyber capability to &amp;amp;#34;pay-to-play&amp;amp;#34;&amp;lt;/a&amp;gt; , vastly expanding the number of nations with such cyber capabilities.&amp;lt;br&amp;gt;
For years, groups like Citizen Lab and Amnesty International have been tracking the use of NSO&amp;amp;#39;s mobile spyware package &amp;amp;#34;Pegasus&amp;amp;#34;. Despite NSO&amp;amp;#39;s claims that they &amp;amp;#34; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nsogroup.com/governance/human-rights-policy/&amp;#34;&amp;gt;[evaluate] the potential for adverse human rights impacts arising from the misuse of NSO products&amp;lt;/a&amp;gt; &amp;amp;#34; Pegasus has been linked to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://citizenlab.ca/2020/01/stopping-the-press-new-york-times-journalist-targeted-by-saudi-linked-pegasus-spyware-operator/&amp;#34;&amp;gt;the hacking of the New York Times journalist Ben Hubbard by the Saudi regime&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amnesty.org/en/latest/research/2019/10/morocco-human-rights-defenders-targeted-with-nso-groups-spyware/&amp;#34;&amp;gt;hacking of human rights defenders in Morocco&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://citizenlab.ca/2021/08/bahrain-hacks-activists-with-nso-group-zero-click-iphone-exploits/&amp;#34;&amp;gt;Bahrain&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amnesty.org/en/latest/research/2018/08/amnesty-international-among-targets-of-nso-powered-campaign/&amp;#34;&amp;gt;the targeting of Amnesty International staff&amp;lt;/a&amp;gt; and dozens of other cases.&amp;lt;br&amp;gt;
Last month the United States added NSO to the &amp;amp;#34;Entity List&amp;amp;#34;, severely restricting the ability of US companies to do business with NSO and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.commerce.gov/news/press-releases/2021/11/commerce-adds-nso-group-and-other-foreign-companies-entity-list&amp;#34;&amp;gt;stating in a press release&amp;lt;/a&amp;gt; that &amp;amp;#34;[NSO&amp;amp;#39;s tools] enabled foreign governments to conduct transnational repression, which is the practice of authoritarian governments targeting dissidents, journalists and activists outside of their sovereign borders to silence dissent.&amp;amp;#34;&amp;lt;br&amp;gt;
Citizen Lab was able to recover these Pegasus exploits from an iPhone and therefore this analysis covers NSO&amp;amp;#39;s capabilities against iPhone. We are aware that NSO sells similar zero-click capabilities which target Android devices; Project Zero does not have samples of these exploits but if you do, please reach out.&amp;lt;br&amp;gt;
From One to Zero&amp;lt;br&amp;gt;
In previous cases such as the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/&amp;#34;&amp;gt;Million Dollar Dissident from 2016&amp;lt;/a&amp;gt; , targets were sent links in SMS messages:&amp;lt;br&amp;gt;
Screenshots of Phishing SMSs reported to Citizen Lab in 2016&amp;lt;br&amp;gt;
source: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/&amp;#34;&amp;gt;https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The target was only hacked when they clicked the link, a technique known as a one-click exploit. Recently, however, it has been documented that NSO is offering their clients zero-click exploitation technology, where even very technically savvy targets who might not click a phishing link are completely unaware they are being targeted. In the zero-click scenario no user interaction is required. Meaning, t he attacker doesn&amp;amp;#39;t need to send phishing messages; the exploit just works silently in the background . Short of not using a device, t here is no way to prevent exploitation by a zero-click exploit; it&amp;amp;#39;s a weapon against which there is no defense .&amp;lt;br&amp;gt;
One weird trick&amp;lt;br&amp;gt;
The initial entry point for Pegasus on iPhone is iMessage. This means that a victim can be targeted just using their phone number or AppleID username.&amp;lt;br&amp;gt;
iMessage has native support for GIF images, the typically small and low quality animated images popular in meme culture. You can send and receive GIFs in iMessage chats and they show up in the chat window. Apple wanted to make those GIFs loop endlessly rather than only play once, so very early on in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html&amp;#34;&amp;gt;iMessage parsing and processing pipeline&amp;lt;/a&amp;gt; (after a message has been received but well before the message is shown), iMessage calls the following method in the IMTranscoderAgent process (outside the &amp;amp;#34;BlastDoor&amp;amp;#34; sandbox), passing any image file received with the extension .gif :&amp;lt;br&amp;gt;
[IMGIFUtils copyGifFromPath:toDestinationPath:error]&amp;lt;br&amp;gt;
Looking at the selector name, the intention here was probably to just copy the GIF file before editing the loop count field, but the semantics of this method are different. Under the hood it uses the CoreGraphics APIs to render the source image to a new GIF file at the destination path. And just because the source filename has to end in .gif , that doesn&amp;amp;#39;t mean it&amp;amp;#39;s really a GIF file.&amp;lt;br&amp;gt;
The ImageIO library, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/04/fuzzing-imageio.html&amp;#34;&amp;gt;as detailed in a previous Project Zero blogpost&amp;lt;/a&amp;gt; , is used to guess the correct format of the source file and parse it, completely ignoring the file extension. Using this &amp;amp;#34;fake gif&amp;amp;#34; trick, over 20 image codecs are suddenly part of the iMessage zero-click attack surface, including some very obscure and complex formats, remotely exposing probably hundreds of thousands of lines of code.&amp;lt;br&amp;gt;
Note: Apple inform us that they have restricted the available ImageIO formats reachable from IMTranscoderAgent starting in iOS 14.8.1 (26 October 2021), and completely removed the GIF code path from IMTranscoderAgent starting in iOS 15.0 (20 September 2021), with GIF decoding taking place entirely within BlastDoor.&amp;lt;br&amp;gt;
A PDF in your GIF&amp;lt;br&amp;gt;
NSO uses the &amp;amp;#34;fake gif&amp;amp;#34; trick to target a vulnerability in the CoreGraphics PDF parser.&amp;lt;br&amp;gt;
PDF was a popular target for exploitation around a decade ago, due to its ubiquity and complexity. Plus, the availability of javascript inside PDFs made development of reliable exploits far easier. The CoreGraphics PDF parser doesn&amp;amp;#39;t seem to interpret javascript, but NSO managed to find something equally powerful inside the CoreGraphics PDF parser...&amp;lt;br&amp;gt;
Extreme compression&amp;lt;br&amp;gt;
In the late 1990&amp;amp;#39;s, bandwidth and storage were much more scarce than they are now. It was in that environment that the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/JBIG2&amp;#34;&amp;gt;JBIG2&amp;lt;/a&amp;gt; standard emerged. JBIG2 is a domain specific image codec designed to compress images where pixels can only be black or white.&amp;lt;br&amp;gt;
It was developed to achieve extremely high compression ratios for scans of text documents and was implemented and used in high-end office scanner/printer devices like the XEROX WorkCenter device shown below. If you used the scan to pdf functionality of a device like this a decade ago, your PDF likely had a JBIG2 stream in it.&amp;lt;br&amp;gt;
A Xerox WorkCentre 7500 series multifunction printer, which used JBIG2&amp;lt;br&amp;gt;
for its scan-to-pdf functionality&amp;lt;br&amp;gt;
source: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.office.xerox.com/en-us/multifunction-printers/workcentre-7545-7556/specifications&amp;#34;&amp;gt;https://www.office.xerox.com/en-us/multifunction-printers/workcentre-7545-7556/specifications&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The PDFs files produced by those scanners were exceptionally small, perhaps only a few kilobytes. There are two novel techniques which JBIG2 uses to achieve these extreme compression ratios which are relevant to this exploit:&amp;lt;br&amp;gt;
Technique 1: Segmentation and substitution&amp;lt;br&amp;gt;
Effectively every text document, especially those written in languages with small alphabets like English or German, consists of many repeated letters (also known as glyphs ) on each page. JBIG2 tries to segment each page into glyphs then uses simple pattern matching to match up glyphs which look the same:&amp;lt;br&amp;gt;
Simple pattern matching can find all the shapes which look similar on a page,&amp;lt;br&amp;gt;
in this case all the &amp;amp;#39;e&amp;amp;#39;s&amp;lt;br&amp;gt;
JBIG2 doesn&amp;amp;#39;t actually know anything about glyphs and it isn&amp;amp;#39;t doing OCR (optical character recognition.) A JBIG encoder is just looking for connected regions of pixels and grouping similar looking regions together. The compression algorithm is to simply substitute all sufficiently-similar looking regions with a copy of just one of them:&amp;lt;br&amp;gt;
Replacing all occurrences of similar glyphs with a copy of just one often yields a document which is still quite legible and enables very high compression ratios&amp;lt;br&amp;gt;
In this case the output is perfectly readable but the amount of information to be stored is significantly reduced. Rather than needing to store all the original pixel information for the whole page you only need a compressed version of the &amp;amp;#34;reference glyph&amp;amp;#34; for each character and the relative coordinates of all the places where copies should be made. The decompression algorithm then treats the output page like a canvas and &amp;amp;#34;draws&amp;amp;#34; the exact same glyph at all the stored locations.&amp;lt;br&amp;gt;
There&amp;amp;#39;s a significant issue with such a scheme: it&amp;amp;#39;s far too easy for a poor encoder to accidentally swap similar looking characters, and this can happen with interesting consequences. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.dkriesel.com/en/blog/2013/0802_xerox-workcentres_are_switching_written_numbers_when_scanning&amp;#34;&amp;gt;D. Kriesel&amp;amp;#39;s blog has some motivating examples&amp;lt;/a&amp;gt; where PDFs of scanned invoices have different figures or PDFs of scanned construction drawings end up with incorrect measurements. These aren&amp;amp;#39;t the issues we&amp;amp;#39;re looking at, but they are one significant reason why JBIG2 is not a common compression format anymore.&amp;lt;br&amp;gt;
Technique 2: Refinement coding&amp;lt;br&amp;gt;
As mentioned above, the substitution based compression output is lossy. After a round of compression and decompression the rendered output doesn&amp;amp;#39;t look exactly like the input. But JBIG2 also supports lossless compression as well as an intermediate &amp;amp;#34;less lossy&amp;amp;#34; compression mode.&amp;lt;br&amp;gt;
It does this by also storing (and compressing) the difference between the substituted glyph and each original glyph. Here&amp;amp;#39;s an example showing a difference mask between a substituted character on the left and the original lossless character in the middle:&amp;lt;br&amp;gt;
Using the XOR operator on bitmaps to compute a difference image&amp;lt;br&amp;gt;
In this simple example the encoder can store the difference mask shown on the right, then during decompression the difference mask can be XORed with the substituted character to recover the exact pixels making up the original character. There are some more tricks …</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20211215-201118/</link>
      <pubDate>Wed, 15 Dec 2021 20:11:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20211215-201118/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/how-to-build-encrypted-group-calls/&amp;#34;&amp;gt;How to build large-scale end-to-end encrypted group video calls&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Signal released &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/group-calls/&amp;#34;&amp;gt;end-to-end encrypted group calls&amp;lt;/a&amp;gt; a year ago, and since then we’ve scaled from support for 5 participants all the way to 40. There is no off the shelf software that would allow us to support calls of that size while ensuring that all communication is end-to-end encrypted, so we built our own open source &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/signalapp/Signal-Calling-Service&amp;#34;&amp;gt;Signal Calling Service&amp;lt;/a&amp;gt; to do the job. This post will describe how it works in more detail.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-121754/</link>
      <pubDate>Wed, 15 Dec 2021 12:17:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-121754/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/legal-us-usa-cyber-surveillance/u-s-lawmakers-call-for-sanctions-against-israels-nso-other-spyware-firms-idUSKBN2IU0WM&amp;#34;&amp;gt;U.S. lawmakers call for sanctions against Israel&amp;#39;s NSO, other spyware firms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-081933/</link>
      <pubDate>Wed, 15 Dec 2021 08:19:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-081933/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-surveillance/exclusive-u-s-lawmakers-call-for-sanctions-against-israels-nso-other-spyware-firms-idUSKBN2IU0C8&amp;#34;&amp;gt;Exclusive-U.S. lawmakers call for sanctions against Israel&amp;#39;s NSO, other spyware firms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON     A group of U.S. lawmakers is asking the Treasury Department and State Department to sanction Israeli spyware firm NSO Group and three other foreign surveillance companies they say helped authoritarian governments commit human rights abuses.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-041911/</link>
      <pubDate>Wed, 15 Dec 2021 04:19:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211215-041911/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-logging/u-s-cybersecurity-officials-see-mainly-low-impact-attacks-from-logging-flaw-so-far-idUSKBN2IU02L&amp;#34;&amp;gt;U.S. cybersecurity officials see mainly low-impact attacks from logging flaw, so far&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     The U.S. agency charged with defending the country against hacking said on Tuesday the majority of attacks it has seen using a recently disclosed flaw in widely used open-source software were minor, with many of them seeking to hijack computing power to mine cryptocurrency.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211215-041806/</link>
      <pubDate>Wed, 15 Dec 2021 04:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211215-041806/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03751-5&amp;#34;&amp;gt;NASA spacecraft ‘touches’ the Sun for the first time ever&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Parker Solar Probe has passed through a boundary and into the Sun’s atmosphere, gathering data that will help scientists better understand stars.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211215-040729/</link>
      <pubDate>Wed, 15 Dec 2021 04:07:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211215-040729/</guid>
      <description>John Hultquist , vice president of intelligence analysis at Mandiant , said the company has seen Chinese and Iranian state actors leveraging the log4j vulnerability, and that the Iranian actors are particularly aggressive, having taken part in ransomware operations that may be primarily carried out for disruptive purposes rather than financial gain.&amp;lt;br&amp;gt;
“We anticipate other state actors are doing so as well, or preparing to,” Hultquist said. “We believe these actors will work quickly to create footholds in desirable networks for follow-on activity, which may last for some time. In some cases, they will work from a wish list of targets that existed long before this vulnerability was public knowledge. In other cases, desirable targets may be selected after broad targeting.”&amp;lt;br&amp;gt;
Researcher Kevin Beaumont had a more lighthearted take on Log4Shell &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/GossiTheDog/status/1470787395805192199&amp;#34;&amp;gt;via Twitter&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
“Basically the perfect ending to cybersecurity in 2021 is a 90s style Java vulnerability in an open source module, written by two volunteers with no funding, used by large cybersecurity vendors, undetected until Minecraft chat got pwned, where nobody knows how to respond properly.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/microsoft-patch-tuesday-december-2021-edition/#more-57908&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211215-002401/</link>
      <pubDate>Wed, 15 Dec 2021 00:24:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211215-002401/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/12/podcast-episode-better-future-starts-secret-codes&amp;#34;&amp;gt;A better future starts with secret codes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211215-002400/</link>
      <pubDate>Wed, 15 Dec 2021 00:23:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211215-002400/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/12/podcast-episode-better-future-starts-secret-codes&amp;#34;&amp;gt;A better future starts with secret codes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211215-001708/</link>
      <pubDate>Wed, 15 Dec 2021 00:17:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211215-001708/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03758-y&amp;#34;&amp;gt;Giant cracks push imperilled Antarctic glacier closer to collapse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The demise of part of the huge Thwaites Glacier would hasten sea-level rise.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211215-001243/</link>
      <pubDate>Wed, 15 Dec 2021 00:12:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211215-001243/</guid>
      <description>Are the transcriptions auto-generated by Microsoft?&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211215-000713/</link>
      <pubDate>Wed, 15 Dec 2021 00:07:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211215-000713/</guid>
      <description>Microsoft , Adobe , and Google all issued security updates to their products today. The Microsoft patches include six previously disclosed security flaws, and one that is already being actively exploited. But this month’s Patch Tuesday is overshadowed by the “ Log4Shell ” 0-day exploit in a popular Java library that web server administrators are now racing to find and patch amid widespread exploitation of the flaw.&amp;lt;br&amp;gt;
Log4Shell is the name picked for a critical flaw disclosed Dec. 9 in the popular logging library for Java called “ log4j ,” which is included in a huge number of Java applications. Publicly released exploit code allows an attacker to force a server running a vulnerable log4j library to execute commands, such as downloading malicious software or opening a backdoor connection to the server.&amp;lt;br&amp;gt;
According to researchers at Lunasec , many, many services are vulnerable to this exploit.&amp;lt;br&amp;gt;
“Cloud services like Steam, Apple iCloud, and apps like Minecraft have already been found to be vulnerable,” Lunasec &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.lunasec.io/docs/blog/log4j-zero-day/&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; . “Anybody using Apache Struts is likely vulnerable. We’ve seen similar vulnerabilities exploited before in breaches like the 2017 Equifax data breach. An extensive list of responses from impacted organizations has been compiled &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .”&amp;lt;br&amp;gt;
“If you run a server built on open-source software, there’s a good chance you are impacted by this vulnerability,” said Dustin Childs of Trend Micro’s Zero Day Initiative. “Check with all the vendors in your enterprise to see if they are impacted and what patches are available.”&amp;lt;br&amp;gt;
Part of the difficulty in patching against the Log4Shell attack is identifying all of the vulnerable web applications, said Johannes Ullrich , an incident handler and blogger for the SANS Internet Storm Center . “Log4Shell will continue to haunt us for years to come. Dealing with log4shell will be a marathon,” Ullrich said. “Treat it as such.” SANS has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://isc.sans.edu/forums/diary/RCE&#43;in&#43;log4j&#43;Log4Shell&#43;or&#43;how&#43;things&#43;can&#43;get&#43;bad&#43;quickly/28120/&amp;#34;&amp;gt;a good walk-through&amp;lt;/a&amp;gt; of how simple yet powerful the exploit can be.&amp;lt;br&amp;gt;
“Basically the perfect ending to cybersecurity in 2021 is a 90s style Java vulnerability in an open source module, written by two volunteers with no funding, used by large cybersecurity vendors, undetected until Minecraft chat got pwned, where nobody knows how to respond properly,” researcher Kevin Beaumont &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/GossiTheDog/status/1470787395805192199&amp;#34;&amp;gt;quipped&amp;lt;/a&amp;gt; on Twitter. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/microsoft-patch-tuesday-december-2021-edition/#more-57908&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The consulting firm PricewaterhouseCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland’s public health system. The unusually candid post-mortem found that nearly two months elapsed between the initial intrusion and the launching of the ransomware. It also found affected hospitals had tens of thousands of outdated Windows 7 systems, and that the health system’s IT administrators failed to respond to multiple warning signs that a massive attack was imminent.&amp;lt;br&amp;gt;
PWC’s timeline of the days leading up to the deployment of Conti ransomware on May 14.&amp;lt;br&amp;gt;
Ireland’s Health Service Executive (HSE), which operates the country’s public health system, got hit with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/uscert/ncas/alerts/aa21-265a&amp;#34;&amp;gt;Conti ransomware&amp;lt;/a&amp;gt; on May 14, 2021. A timeline in the report (above) says the initial infection of the “patient zero” workstation happened on Mar. 18, 2021, when an employee on a Windows computer opened a booby-trapped Microsoft Excel document in a phishing email that had been sent two days earlier.&amp;lt;br&amp;gt;
Less than a week later, the attacker had established a reliable backdoor connection to the employee’s infected workstation. After infecting the system, “the attacker continued to operate in the environment over an eight week period until the detonation of the Conti ransomware on May 14, 2021,” the report states.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.hse.ie/eng/services/publications/conti-cyber-attack-on-the-hse-full-report.pdf&amp;#34;&amp;gt;PWC’s report&amp;lt;/a&amp;gt; (PDF), there were multiple warnings about a serious network intrusion, but those red flags were either misidentified or not acted on quickly enough:&amp;lt;br&amp;gt;
On Mar. 31, 2021, the HSE’s antivirus software detected the execution of two software tools commonly used by ransomware groups — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.secureworks.com/blog/detecting-cobalt-strike-cybercrime-attacks&amp;#34;&amp;gt;Cobalt Strike&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.secureworks.com/blog/detecting-cobalt-strike-cybercrime-attacks&amp;#34;&amp;gt;Mimikatz&amp;lt;/a&amp;gt; — on the Patient Zero Workstation. But the antivirus software was set to monitor mode, so it did not block the malicious commands.”&amp;lt;br&amp;gt;
On May 7, the attacker compromised the HSE’s servers for the first time, and over the next five days the intruder would compromise six HSE hospitals. On May 10, one of the hospitals detected malicious activity on its Microsoft Windows Domain Controller, a critical “keys to the kingdom” component of any Windows enterprise network that manages user authentication and network access.&amp;lt;br&amp;gt;
On 10 May 2021, security auditors first identified evidence of the attacker compromising systems within Hospital C and Hospital L. Hospital C’s antivirus software detected Cobalt Strike on two systems but failed to quarantine the malicious files.&amp;lt;br&amp;gt;
On May 13, the HSE’s antivirus security provider emailed the HSE’s security operations team, highlighting unhandled threat events dating back to May 7 on at least 16 systems. The HSE Security Operations team requested that the Server team restart servers.&amp;lt;br&amp;gt;
By then it was too late. At just after midnight Ireland time on May 14, the attacker executed the Conti ransomware within the HSE. The attack &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cyberlaw.ccdcoe.org/wiki/Health_Service_Executive_ransomware_attack_(2021)&amp;#34;&amp;gt;disrupted services at several Irish hospitals&amp;lt;/a&amp;gt; and resulted in the near complete shutdown of the HSE’s national and local networks, forcing the cancellation of many outpatient clinics and healthcare services. The number of appointments in some areas dropped by up to 80 percent.”&amp;lt;br&amp;gt;
Conti initially demanded USD $20 million worth of virtual currency in exchange for a digital key to unlock HSE servers compromised by the group. But perhaps in response to the public outcry over the HSE disruption, Conti reversed course and gave the HSE the decryption keys without requiring payment.&amp;lt;br&amp;gt;
Still, the work to restore infected systems would take months. The HSE ultimately enlisted members of the Irish military to bring in laptops and PCs to help restore computer systems by hand. It wasn’t until September 21, 2021 that the HSE declared 100 percent of its servers were decrypted.&amp;lt;br&amp;gt;
As bad as the HSE ransomware attack was, the PWC report emphasizes that it could have been far worse. For example, it is unclear how much data would have been unrecoverable if a decryption key had not become available as the HSE’s backup infrastructure was only periodically backed up to offline tape.&amp;lt;br&amp;gt;
The attack also could have been worse, the report found:&amp;lt;br&amp;gt;
if there had been intent by the Attacker to target specific devices within the HSE environment (e.g. medical devices);&amp;lt;br&amp;gt;
if the ransomware took actions to destroy data at scale;&amp;lt;br&amp;gt;
if the ransomware had auto-propagation and persistence capabilities, for example by using an exploit to propagate across domains and trust-boundaries to medical devices (e.g. the EternalBlue exploit used by the WannaCry and NotPetya15 attacks);&amp;lt;br&amp;gt;
if cloud systems had also been encrypted such as the COVID-19 vaccination system&amp;lt;br&amp;gt;
The PWC report contains numerous recommendations, most of which center around hiring new personnel to lead the organization’s redoubled security efforts. But it is clear that the HSE has an enormous amount of work ahead &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/04/whats-your-security-maturity-level/&amp;#34;&amp;gt;to grow in security maturity&amp;lt;/a&amp;gt; . For example, the report notes the HSE’s hospital network had over 30,000 Windows 7 workstations that were deemed end of life by the vendor.&amp;lt;br&amp;gt;
“The HSE assessed its cybersecurity maturity rating as low,” PWC wrote. “For example, they do not have a CISO or a Security Operations Center established.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/inside-irelands-public-healthcare-ransomware-scare/#more-57854&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/inside-irelands-public-healthcare-ransomware-scare/&amp;#34;&amp;gt;Inside Ireland’s Public Healthcare Ransomware Scare&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211214-201504/</link>
      <pubDate>Tue, 14 Dec 2021 20:15:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211214-201504/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/empowering-next-generation-of-android.html&amp;#34;&amp;gt;Empowering the next generation of Android Application Security Researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Jon Bottarini, Security Program Manager &amp;amp;amp; Lena Katib, Strategic Partnerships Manager&amp;lt;br&amp;gt;
The external security researcher community plays an integral role in making the Google Play ecosystem safe and secure. Through this partnership with the community, Google has been able to collaborate with third-party developers to fix thousands of security issues in Android applications before they are exploited and reward security researchers for their hard work and dedication.&amp;lt;br&amp;gt;
In order to empower the next generation of Android security researchers, Google has collaborated with industry partners including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.hackerone.com/&amp;#34;&amp;gt;HackerOne&amp;lt;/a&amp;gt; and PayPal to host a number of Android App Hacking Workshops. These workshops are an effort designed to educate security researchers and cybersecurity students of all skill levels on how to find Android application vulnerabilities through a series of hands-on working sessions, both in-person and virtual.&amp;lt;br&amp;gt;
Through these workshops, we’ve seen attendees from groups such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://merrittsecurity.com/&amp;#34;&amp;gt;Merritt College&amp;amp;#39;s cybersecurity program&amp;lt;/a&amp;gt; and alumni of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.hackthehood.org/&amp;#34;&amp;gt;Hack the Hood&amp;lt;/a&amp;gt; go on to report real-world security vulnerabilities to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/5604090422493184&amp;#34;&amp;gt;Google Play Security Rewards program&amp;lt;/a&amp;gt; . This reward program is designed to identify and mitigate vulnerabilities in apps on Google Play, and keep Android users, developers and the Google Play ecosystem safe.&amp;lt;br&amp;gt;
Today, we are releasing our slide deck and workshop materials, including source code for a custom-built Android application that allows you to test your Android application security skills in a variety of capture the flag style challenges.&amp;lt;br&amp;gt;
These materials cover a wide range of techniques for finding vulnerabilities in Android applications. Whether you’re just getting started or have already found many bugs - chances are you’ll learn something new from these challenges! If you get stuck and need a hint on solving a challenge, the solutions for each are available in the Android App Hacking Workshop &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/learn/presentations/5783688075542528&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
As you work through the challenges and learn more about the techniques and tips described in our workshop materials, we’d love to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://forms.gle/DUA1tNpaLCLR21h87&amp;#34;&amp;gt;hear your feedback&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Additional Resources:&amp;lt;br&amp;gt;
If you want to learn more about how to prepare, launch, and run a Vulnerability Disclosure Program (VDP) or discover how to work with external security researchers, check out our VDP course &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
If you’re a developer looking to build more secure applications, check out Android app security best practices &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/topic/security/best-practices&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/android&amp;#34;&amp;gt;android&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/google%20play&amp;#34;&amp;gt;google play&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/hacking&amp;#34;&amp;gt;hacking&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/security%20rewards%20program&amp;#34;&amp;gt;security rewards program&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/VDP&amp;#34;&amp;gt;VDP&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/workshop&amp;#34;&amp;gt;workshop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211214-162002/</link>
      <pubDate>Tue, 14 Dec 2021 16:20:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211214-162002/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/14/science/james-webb-telescope-launch.html&amp;#34;&amp;gt;Out There Why the World’s Astronomers Are Very, Very Anxious Right Now The James Webb Space Telescope is endowed with the hopes and trepidations of a generation of astronomers. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211214-162001/</link>
      <pubDate>Tue, 14 Dec 2021 16:20:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211214-162001/</guid>
      <description>December 14, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/14/Linux-Mint-and-elementary-OS.html&amp;#34;&amp;gt;Impressions of Linux Mint &amp;amp;amp; elementary OS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211214-161709/</link>
      <pubDate>Tue, 14 Dec 2021 16:17:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211214-161709/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03705-x&amp;#34;&amp;gt;The loss of the world’s frozen places&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Two very different books explore the past, present and future of glaciers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211214-001917/</link>
      <pubDate>Tue, 14 Dec 2021 00:19:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211214-001917/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-vulnerability/widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-idUKKBN2IS1Y6&amp;#34;&amp;gt;Widely used software with key vulnerability sends cyber defenders scrambling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON     A newly discovered vulnerability in a widely used software library is causing mayhem on the internet, forcing cyber defenders to scramble as hackers rush to exploit the weakness.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-vulnerability/update-1-widely-used-software-with-key-vulnerability-sends-cyber-defenders-scrambling-idUSL1N2SY2PA&amp;#34;&amp;gt;UPDATE 1-Widely used software with key vulnerability sends cyber defenders scrambling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON, Dec 13 A newly discovered
vulnerability in a widely used software library is causing
mayhem on the internet, forcing cyber defenders to scramble as
hackers rush to exploit the weakness.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211213-001653/</link>
      <pubDate>Mon, 13 Dec 2021 00:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211213-001653/</guid>
      <description>&amp;lt;p&amp;gt;Broken Earth&amp;lt;br&amp;gt;
,&amp;lt;br&amp;gt;
The Expanse&amp;lt;br&amp;gt;
Merchant Princes/Empire Games&amp;lt;br&amp;gt;
Neapolitan Novels&amp;lt;br&amp;gt;
The Sandman&amp;lt;br&amp;gt;
Sandman Slim&amp;lt;br&amp;gt;
Trickster Trilogy&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/12/Series-2021&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/03/Filtering-Lessons&amp;#34;&amp;gt;Filtering Lessons&amp;lt;/a&amp;gt; · Last week, AWS &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://aws.amazon.com/about-aws/whats-new/2021/11/aws-lambda-event-filtering-amazon-sqs-dynamodb-kinesis-sources/&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventfiltering.html&amp;#34;&amp;gt;docs&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://aws.amazon.com/blogs/compute/filtering-event-sources-for-aws-lambda-functions/&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) event filtering for Lambdas     reading from SQS, DynamoDB, and Kinesis.     Lambda’s new filtering is consistent with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-event-patterns.html&amp;#34;&amp;gt;EventBridge’s&amp;lt;/a&amp;gt; .     Also announced was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://aws.amazon.com/blogs/aws/new-use-amazon-s3-event-notifications-with-amazon-eventbridge/&amp;#34;&amp;gt;faster, slicker, cheaper S3/EventBridge integration&amp;lt;/a&amp;gt; .     These features rely on software I helped write.     The problem turns out to be more interesting than you might expect, by a factor of 10¹² or so.  I think it’d be really great if     the code were open-sourced &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/12/03/Filtering-Lessons&amp;#34;&amp;gt;...&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20211212-040812/</link>
      <pubDate>Sun, 12 Dec 2021 04:08:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20211212-040812/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://zdoom.org/index&amp;#34;&amp;gt;GZDoom&amp;lt;/a&amp;gt; is the fanciest way to play Doom.  Unfortunately, it has also historically been difficult to recommend to newcomers, because its default settings are… questionable .&amp;lt;br&amp;gt;
Conspicuously, for over a decade, it defaulted to traditional Doom movement keys (no WASD ) and no mouselook.  I am overjoyed to discover that this is no longer the case, and it plays like a god damn FPS out of the box, but there are still a few twiddles that need twiddling.  Mostly the texture filtering.  Christ, the texture filtering.&amp;lt;br&amp;gt;
Anyway GZDoom has a lot of options, so here is a handy list of the important ones.  There are fewer than I expected, which is good.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2021/12/11/recommended-gzdoom-settings/&amp;#34;&amp;gt;Recommended GZDoom settings&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211212-001623/</link>
      <pubDate>Sun, 12 Dec 2021 00:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211212-001623/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#sre&amp;#34;&amp;gt;sre&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Over the past two weeks, Anton Korobeynikov migrated all of the
LLVM project’s issues (both open and closed) from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.llvm.org/&amp;#34;&amp;gt;the old LLVM Bugzilla&amp;lt;/a&amp;gt; to the new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/llvm/llvm-project/issues/&amp;#34;&amp;gt;llvm/llvm-project GitHub repo&amp;lt;/a&amp;gt; .
The migration is now &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/document/d/11_3rgYuv-QO0g1oO6T0MmkFhacqJg6o24eWFFVNSX_o/edit&amp;#34;&amp;gt;complete&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211211-121751/</link>
      <pubDate>Sat, 11 Dec 2021 12:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211211-121751/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/11/business/congress-tech-regulation.html&amp;#34;&amp;gt;News Analysis Congress, Far From ‘a Series of Tubes,’ Is Still Nowhere Near Reining In Tech Holding a hearing that humbles the most powerful business executives in the world is much easier than legislating. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211211-041419/</link>
      <pubDate>Sat, 11 Dec 2021 04:14:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211211-041419/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/30/AWS-Reinvent-opening&amp;#34;&amp;gt;Listening to re:Invent&amp;lt;/a&amp;gt; · This is the week that AWS owns the tech news cycle because anyone who cares about it is watching the stories coming out of the     re:Invent conference.  I watched Adam Selipsky’s keynote this morning and it looks     like AWS is moving in a very traditional direction for tech companies: Away from tech-first, towards business-first.     Which is inevitable but also dangerous &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/30/AWS-Reinvent-opening&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [5 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211210-200727/</link>
      <pubDate>Fri, 10 Dec 2021 20:07:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211210-200727/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/critical-effort-why-we-reach-a-goal-or-not&amp;#34;&amp;gt;Critical effort: why we reach a goal (or not)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20211210-162118/</link>
      <pubDate>Fri, 10 Dec 2021 16:21:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20211210-162118/</guid>
      <description>Yesterday, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://adventofcode.com/2021&amp;#34;&amp;gt;Advent of Code&amp;lt;/a&amp;gt; had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://adventofcode.com/2021/day/9&amp;#34;&amp;gt;an interesting problem&amp;lt;/a&amp;gt; :
given the heightmap of a lava cave, compute the lowest points
and the size of their basins (connected regions).&amp;lt;br&amp;gt;
Let’s do this in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mlochbaum.github.io/BQN/&amp;#34;&amp;gt;BQN&amp;lt;/a&amp;gt; again,
as this problem teaches some good ways to think in array languages.&amp;lt;br&amp;gt;
First, let’s load the input data into a matrix:&amp;lt;br&amp;gt;
d ← &amp;amp;gt; &amp;#39;0&amp;#39; -˜ •FLines&amp;amp;quot;day09&amp;amp;quot;&amp;lt;br&amp;gt;
We subtract the ASCII lines from the character&amp;lt;br&amp;gt;
0&amp;lt;br&amp;gt;
to get numerical
rows.  The merge function (&amp;lt;br&amp;gt;
) then converts this list-of-lists into
a 2-dimensional array.  For the sample data, we get:&amp;lt;br&amp;gt;
┌─
╵ 2 1 9 9 9 4 3 2 1 0
3 9 8 7 8 9 4 9 2 1
9 8 5 6 7 8 9 8 9 2
8 7 6 7 8 9 6 7 8 9
9 8 9 9 9 6 5 6 7 8
┘&amp;lt;br&amp;gt;
A low point is a point that is lower than every orthogonally adjacent
point.  Thanks to array progamming, we can solve this for the whole
matrix at once without any loops!&amp;lt;br&amp;gt;
The core idea is to shift the array into each cardinal direction, and
then compute the minimum of these arrays.  If the original array is
smaller then the array of the minimums, it’s a low point.&amp;lt;br&amp;gt;
By default, shifting (&amp;lt;br&amp;gt;
«&amp;lt;br&amp;gt;
»&amp;lt;br&amp;gt;
) in BQN inserts zeroes for numerical
arrays.  But since we are looking for the minimum, we need to shift in
a value that is higher than any.  We can simply use&amp;lt;br&amp;gt;
∞&amp;lt;br&amp;gt;
So, to shift in&amp;lt;br&amp;gt;
from the left, we use:&amp;lt;br&amp;gt;
∞»˘d
┌─
╵ ∞ 2 1 9 9 9 4 3 2 1
∞ 3 9 8 7 8 9 4 9 2
∞ 9 8 5 6 7 8 9 8 9
∞ 8 7 6 7 8 9 6 7 8
∞ 9 8 9 9 9 6 5 6 7
┘&amp;lt;br&amp;gt;
Unfortunately, shifting from the top is not so easy:&amp;lt;br&amp;gt;
∞»d
Error: shift: =𝕨 must be =𝕩 or ¯1&#43;=𝕩 (0≡=𝕨, 2≡=𝕩)
at ∞»d&amp;lt;br&amp;gt;
We need would need to make a list of&amp;lt;br&amp;gt;
long enough to agree with the
array width:&amp;lt;br&amp;gt;
(∞¨⊏d)»d
┌─
╵ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞
2 1 9 9 9 4 3 2 1 0
3 9 8 7 8 9 4 9 2 1
9 8 5 6 7 8 9 8 9 2
8 7 6 7 8 9 6 7 8 9
┘&amp;lt;br&amp;gt;
However, since we need to do this on every side, we can also look at
the problem differently: we shift in from the left under rotation by
0, 90, 180, 270 degrees.&amp;lt;br&amp;gt;
How do we “rotate” a matrix?  We reverse the rows (&amp;lt;br&amp;gt;
) and then
transpose (&amp;lt;br&amp;gt;
⍉&amp;lt;br&amp;gt;
) it.&amp;lt;br&amp;gt;
⍉⌽d
┌─
╵ 9 8 9 3 2
8 7 8 9 1
9 6 5 8 9
9 7 6 7 9
9 8 7 8 9
6 9 8 9 4
5 6 9 4 3
6 7 8 9 2
7 8 9 2 1
8 9 2 1 0
┘&amp;lt;br&amp;gt;
By using the repeat modifier (&amp;lt;br&amp;gt;
) we can easily rotate several times.&amp;lt;br&amp;gt;
(⍉∘⌽⍟(↕4)) d
┌─
· ┌─                      ┌─            ┌─                      ┌─
╵ 2 1 9 9 9 4 3 2 1 0   ╵ 9 8 9 3 2   ╵ 8 7 6 5 6 9 9 9 8 9   ╵ 0 1 2 9 8
3 9 8 7 8 9 4 9 2 1     8 7 8 9 1     9 8 7 6 9 8 7 6 7 8     1 2 9 8 7
9 8 5 6 7 8 9 8 9 2     9 6 5 8 9     2 9 8 9 8 7 6 5 8 9     2 9 8 7 6
8 7 6 7 8 9 6 7 8 9     9 7 6 7 9     1 2 9 4 9 8 7 8 9 3     3 4 9 6 5
9 8 9 9 9 6 5 6 7 8     9 8 7 8 9     0 1 2 3 4 9 9 9 1 2     4 9 8 9 6
┘   6 9 8 9 4                         ┘   9 8 7 8 9
5 6 9 4 3                             9 7 6 7 9
6 7 8 9 2                             9 8 5 6 9
7 8 9 2 1                             1 9 8 7 8
8 9 2 1 0                             2 3 9 8 9
┘                                     ┘
┘&amp;lt;br&amp;gt;
Finally, we perform the shift operation under (&amp;lt;br&amp;gt;
⌾&amp;lt;br&amp;gt;
) the rotation, that is,
BQN rotates the array, does the shift, and knows how to undo the rotation!&amp;lt;br&amp;gt;
┌─
· ┌─                      ┌─                      ┌─                      ┌─
╵ ∞ 2 1 9 9 9 4 3 2 1   ╵ 3 9 8 7 8 9 4 9 2 1   ╵ 1 9 9 9 4 3 2 1 0 ∞   ╵ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞
∞ 3 9 8 7 8 9 4 9 2     9 8 5 6 7 8 9 8 9 2     9 8 7 8 9 4 9 2 1 ∞     2 1 9 9 9 4 3 2 1 0
∞ 9 8 5 6 7 8 9 8 9     8 7 6 7 8 9 6 7 8 9     8 5 6 7 8 9 8 9 2 ∞     3 9 8 7 8 9 4 9 2 1
∞ 8 7 6 7 8 9 6 7 8     9 8 9 9 9 6 5 6 7 8     7 6 7 8 9 6 7 8 9 ∞     9 8 5 6 7 8 9 8 9 2
∞ 9 8 9 9 9 6 5 6 7     ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞ ∞     8 9 9 9 6 5 6 7 8 ∞     8 7 6 7 8 9 6 7 8 9
┘                       ┘                       ┘                       ┘
┘&amp;lt;br&amp;gt;
Now we insert (&amp;lt;br&amp;gt;
´&amp;lt;br&amp;gt;
) the minimum function (&amp;lt;br&amp;gt;
⌊&amp;lt;br&amp;gt;
) between these arrays
and compute the minimum at each position:&amp;lt;br&amp;gt;
⌊´{∞⊸»˘⌾(⍉∘⌽⍟𝕩)d}¨↕4
┌─
╵ 1 2 1 7 4 3 2 1 0 1
2 1 5 6 7 4 3 2 1 0
3 5 6 5 6 7 4 7 2 1
7 6 5 6 7 6 5 6 7 2
8 7 6 7 6 5 6 5 6 7
┘&amp;lt;br&amp;gt;
The positions where the original array&amp;lt;br&amp;gt;
is still smaller are the
low points, and we store them for part 2.&amp;lt;br&amp;gt;
l ← d &amp;amp;lt; ⌊´{∞⊸»˘⌾(⍉∘⌽⍟𝕩)d}¨↕4
┌─
╵ 0 1 0 0 0 0 0 0 0 1
0 0 0 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 1 0 0 0
┘&amp;lt;br&amp;gt;
To finish part 1, we need to compute the risk level for each low point,
which is 1 plus the height.  So compute that:&amp;lt;br&amp;gt;
(1&#43;d)×l
┌─
╵ 0 2 0 0 0 0 0 0 0 1
0 0 0 0 0 0 0 0 0 0
0 0 6 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 6 0 0 0
┘&amp;lt;br&amp;gt;
Finally, we compute the end result by deshaping (&amp;lt;br&amp;gt;
⥊&amp;lt;br&amp;gt;
) the array into
a single long list and summing it up:&amp;lt;br&amp;gt;
&#43;´⥊(1&#43;d)×l
15&amp;lt;br&amp;gt;
This concludes part 1.&amp;lt;br&amp;gt;
Part 2 is less straight forward.  We need to compute the basins around every low point, which is the area limited by the points of
height 9.&amp;lt;br&amp;gt;
Since we need to compute the size for each basin in the end, we need
to know which point belongs to which basin.  To get started, we first
give each low point a unique number.  One way to do this is to assign
an index to each position and just use those that are used in the low
point array.&amp;lt;br&amp;gt;
In BQN, the shape (&amp;lt;br&amp;gt;
≢&amp;lt;br&amp;gt;
) of an array is the list of sizes for each axis:&amp;lt;br&amp;gt;
≢d
⟨ 5 10 ⟩&amp;lt;br&amp;gt;
We count up to the product of these values and add one (to avoid
numbering a basin with 0, which will be used for the basin limits).
Then, we multiply this with the array of low points so all ones
in it get turned into a unique basin index.
We perform the multiplication under deshape, so we keep the shape
of the input data:&amp;lt;br&amp;gt;
s ← (1&#43;↕×´≢d) ×⌾⥊ l
┌─
╵ 0 2  0 0 0 0  0 0 0 10
0 0  0 0 0 0  0 0 0  0
0 0 23 0 0 0  0 0 0  0
0 0  0 0 0 0  0 0 0  0
0 0  0 0 0 0 47 0 0  0
┘&amp;lt;br&amp;gt;
Here’s the main idea how to solve part 2: we incrementally grow these
areas by adding their neighbors until the whole array is filled.
For one step, we do this with a function&amp;lt;br&amp;gt;
Rise&amp;lt;br&amp;gt;
Rise ← (d≠9)⊸×(»⌈«⌈«˘⌈»˘⌈⊣)&amp;lt;br&amp;gt;
Here, shifting in zeroes is good enough, so we can use the monadic
shift functions.  The train at the end computes the maximum (&amp;lt;br&amp;gt;
⌈&amp;lt;br&amp;gt;
)
of the four shifted versions and the array itself (&amp;lt;br&amp;gt;
⊣&amp;lt;br&amp;gt;
).
We multiply it with a matrix that is 0 where the depth is 9, so
the basin limits will be constantly zero.&amp;lt;br&amp;gt;
Let’s run it once and twice to see how it works:&amp;lt;br&amp;gt;
Rise s
┌─
╵ 2  2  0  0 0  0  0  0 10 10
0  0 23  0 0  0  0  0  0 10
0 23 23 23 0  0  0  0  0  0
0  0 23  0 0  0 47  0  0  0
0  0  0  0 0 47 47 47  0  0
┘
Rise⍟2 s
┌─
╵ 2  2  0  0  0  0  0 10 10 10
2  0 23 23  0  0  0  0 10 10
0 23 23 23 23  0  0  0  0 10
0 23 23 23  0  0 47 47  0  0
0  0  0  0  0 47 47 47 47  0
┘&amp;lt;br&amp;gt;
As you can see, row 1 colum 3 does not get filled by basin #2 since it
has height 9.&amp;lt;br&amp;gt;
Now we could just iterate this step a often enough, or actually only
until we reach a fixpoint; that is, applying&amp;lt;br&amp;gt;
again doesn’t change
the value anymore.&amp;lt;br&amp;gt;
A simple way to implement a fixpoint operator is&amp;lt;br&amp;gt;
_fix ← { 𝕩 ≡ 𝔽 𝕩 ? 𝕩 ; 𝕊 𝔽 𝕩 }&amp;lt;br&amp;gt;
Let’s compute the filled map:&amp;lt;br&amp;gt;
Rise _fix s
┌─
╵  2  2  0  0  0 10 10 10 10 10
2  0 23 23 23  0 10  0 10 10
0 23 23 23 23 23  0 47  0 10
23 23 23 23 23  0 47 47 47  0
0 23  0  0  0 47 47 47 47 47
┘&amp;lt;br&amp;gt;
Now, we just need to compute the sizes of the basins,
which means computing a histogram of the basin numbers.
We deshape the array again, and only keep all values bigger than zero:&amp;lt;br&amp;gt;
m ← ⥊ Rise _fix s
(m&amp;amp;gt;0)/m
⟨ 2 2 10 10 10 10 10 2 23 23 23 10 10 10 23 23 23 23 23 47 10 23 23 23 23 23 47 47 47 23 47 47 47 47 47 ⟩&amp;lt;br&amp;gt;
With the nice group indices function (&amp;lt;br&amp;gt;
⊔&amp;lt;br&amp;gt;
), we can count how often
each value appears:&amp;lt;br&amp;gt;
≠¨⊔(m&amp;amp;gt;0)/m
⟨ 0 0 3 0 0 0 0 0 0 0 9 0 0 0 0 0 0 0 0 0 0 0 0 14 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 9 ⟩&amp;lt;br&amp;gt;
Finally, let’s compute the three largest values by sorting in descending order
(&amp;lt;br&amp;gt;
∨&amp;lt;br&amp;gt;
) and taking the first three entries (&amp;lt;br&amp;gt;
↑&amp;lt;br&amp;gt;
3↑∨≠¨⊔(m&amp;amp;gt;0)/m
⟨ 14 9 9 ⟩&amp;lt;br&amp;gt;
We then multiply this together and get the result for part 2:&amp;lt;br&amp;gt;
×´3↑∨≠¨⊔(m&amp;amp;gt;0)/m
1134&amp;lt;br&amp;gt;
NP: The New Basement Tapes—Quick Like a Flash&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20211210-121754/</link>
      <pubDate>Fri, 10 Dec 2021 12:17:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20211210-121754/</guid>
      <description>&amp;lt;p&amp;gt;Interested in items for sale?&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/?p=boingboing&amp;amp;utm_source=boingboing&amp;amp;utm_content=widget-header&amp;#34;&amp;gt;POST FOR FREE, GET FEATURED HERE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104289182/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$21,000 Patek Philippe Calatrava Gray Clous de Paris White Gold Box/...&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290229/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$22,500 1936 Ford Truck&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104290242/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$15,000 18K PANTHER&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/itemDetail/104291098/?p=boingboing&amp;amp;utm_source=boingboing&amp;#34;&amp;gt;$1,000 BMW RIMS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sellwild.com/post?p=boingboing&amp;amp;utm_source=boingboing&amp;amp;utm_content=watermark-popover&amp;#34;&amp;gt;These for sale listings &#43; lightweight ads are from the Sellwild Marketplace.  Click to sell your own items for FREE (featured here &amp;amp;amp; on other top sites with millions of daily users).&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211210-082007/</link>
      <pubDate>Fri, 10 Dec 2021 08:20:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211210-082007/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/12/10/espanol/no-miren-arriba-pelicula.html&amp;#34;&amp;gt;Allá afuera Los riesgos de informarle al mundo sobre la posibilidad de un apocalipsis Una nueva película sobre un cometa asesino revive los recuerdos de un debate en la sala de redacción de The New York Times hace dos décadas. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211210-041830/</link>
      <pubDate>Fri, 10 Dec 2021 04:18:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211210-041830/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/standing-up-for-us-plebs-amazon-leaders&amp;#34;&amp;gt;“Standing Up For Us Plebs.” Amazon Leaders Reject Policy To Push Employees Out.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/standing-up-for-us-plebs-amazon-leaders&amp;#34;&amp;gt;Leaked memo shows Amazon Music’s senior leadership didn’t want to go along with Amazon’s plan to manage out the bottom 6% of their workforce.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211210-040943/</link>
      <pubDate>Fri, 10 Dec 2021 04:09:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211210-040943/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/prototyping-a-sql-server-front-end-gui/&amp;#34;&amp;gt;Learn how to build a prototype application using Retool with SQL Server for your data store, and how to perform CRUD operations against it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211210-002030/</link>
      <pubDate>Fri, 10 Dec 2021 00:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211210-002030/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/09/science/dont-look-up-movie.html&amp;#34;&amp;gt;Out There How Do You Tell the World That Doomsday Has Arrived? A new film about a killer comet revives memories of a nail-biting night in The Times newsroom two decades ago. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211210-001903/</link>
      <pubDate>Fri, 10 Dec 2021 00:19:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211210-001903/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/australia-cyber/ransomware-attack-on-australian-utility-claimed-by-russian-speaking-criminals-idUSKBN2IO00J&amp;#34;&amp;gt;Ransomware attack on Australian utility claimed by Russian-speaking criminals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     One of the most prolific Russian-speaking ransomware gangs has claimed credit for a weekend attack on an Australian electric utility serving millions of people.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211210-001307/</link>
      <pubDate>Fri, 10 Dec 2021 00:13:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211210-001307/</guid>
      <description>benahorowitz.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/bhorowitz&amp;#34;&amp;gt;@bhorowitz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I am happy to hear that Bloomberg Business week thinks running a 300 person firm, sitting on 11 boards and working 80 hours/week is light work. Those people must work really hard! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/nHDMJmSAnY&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/nHDMJmSAnY&amp;#34;&amp;gt;https://t.co/nHDMJmSAnY&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
My work calendar and todo list are startled to hear this. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CdlOUmrk7S&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CdlOUmrk7S&amp;#34;&amp;gt;https://t.co/CdlOUmrk7S&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211209-202357/</link>
      <pubDate>Thu, 09 Dec 2021 20:23:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211209-202357/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/12/pay-hacker-save-life&amp;#34;&amp;gt;How to Fix the Internet Podcast: Pay a Hacker, Save a Life&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211209-202355/</link>
      <pubDate>Thu, 09 Dec 2021 20:23:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211209-202355/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/12/pay-hacker-save-life&amp;#34;&amp;gt;How to Fix the Internet Podcast: Pay a Hacker, Save a Life&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20211209-202123/</link>
      <pubDate>Thu, 09 Dec 2021 20:21:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20211209-202123/</guid>
      <description>Yesterday, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://adventofcode.com/2021&amp;#34;&amp;gt;Advent of Code&amp;lt;/a&amp;gt; had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://adventofcode.com/2021/day/6&amp;#34;&amp;gt;an interesting problem&amp;lt;/a&amp;gt; : modeling
the growth rate of lanternfish.  Read the link for the full details,
but the core algorithm is this:&amp;lt;br&amp;gt;
Each day, a 0 becomes a 6 and adds a new 8 to the end of the list,
while each other number decreases by 1 if it was present at the
start of the day.&amp;lt;br&amp;gt;
For part 1, you need to compute the total number of lanternfish after
80 days, and for part 2 after 256 days.  While the first part is
possible with a native list based version (around 300k), the second
part yields over 1.6 trillion for my input, so storing every
lanternfish on its own is infeasible.&amp;lt;br&amp;gt;
Luckily, with a bit of thinking we quickly realize that the position
and order of the lanternfish is irrelevant and we can thus just count
how many at each age we have and sum them up at the end for the answer.&amp;lt;br&amp;gt;
I decided to tackle this problem using the array language &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mlochbaum.github.io/BQN/&amp;#34;&amp;gt;BQN&amp;lt;/a&amp;gt; and will try to explain how it
works.&amp;lt;br&amp;gt;
First, let’s convert the sample input data into a histogram:
For reasons that will be obvious in a minute, we compare each input
element with the list of numbers from 0 to 8 (&amp;lt;br&amp;gt;
↕9&amp;lt;br&amp;gt;
input ← ⟨3,4,3,1,2⟩
input =⌜ ↕9
┌─
╵ 0 0 0 1 0 0 0 0 0
0 0 0 0 1 0 0 0 0
0 0 0 1 0 0 0 0 0
0 1 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0
┘&amp;lt;br&amp;gt;
If we sum this table by column now, we have a count which age appears
how often (note that ages over 8 never happen):&amp;lt;br&amp;gt;
d ← &#43;˝ input =⌜ ↕9
⟨ 0 1 1 2 1 0 0 0 0 ⟩&amp;lt;br&amp;gt;
Next, we need to figure out what happens in a step.
We can model one part (number decreases by 1, or becomes 8 when it was 0)
by rotating (&amp;lt;br&amp;gt;
⌽&amp;lt;br&amp;gt;
) the array to the left:&amp;lt;br&amp;gt;
1 ⌽ d
⟨ 1 1 2 1 0 0 0 0 0 ⟩
2 ⌽ d
⟨ 1 2 1 0 0 0 0 0 1 ⟩&amp;lt;br&amp;gt;
But we also need to add the first element to column 6, e.g. by adding
an appropriately scaled vector.  First, the vector, which we get by
taking the numbers of 0 to 8 and comparing them to 6:&amp;lt;br&amp;gt;
6=↕9
⟨ 0 0 0 0 0 0 1 0 0 ⟩&amp;lt;br&amp;gt;
Now we can scale this vector by the first element (&amp;lt;br&amp;gt;
⊑&amp;lt;br&amp;gt;
(6=↕9) × ⊑ ⟨9,8,7,6,5,4,3,2,1⟩
⟨ 0 0 0 0 0 0 9 0 0 ⟩&amp;lt;br&amp;gt;
Finally, we put both things together.  We can use a hook if we bind (&amp;lt;br&amp;gt;
⊸&amp;lt;br&amp;gt;
) the
argument of the rotation to the operator:&amp;lt;br&amp;gt;
Step ← 1⊸⌽ &#43; (6=↕9)×⊑&amp;lt;br&amp;gt;
Now, we simply need to repeat (&amp;lt;br&amp;gt;
⍟&amp;lt;br&amp;gt;
) this step 80 (resp. 256) times and count
up the results to solve the puzzle!&amp;lt;br&amp;gt;
&#43;´ Step⍟80 d
5934
&#43;´ Step⍟256 d
26984457539&amp;lt;br&amp;gt;
This agrees with the provided example.&amp;lt;br&amp;gt;
Of course, computing 256 steps is very fast, but we can wonder if
there is not a more efficient solution.  Let’s say we wanted to
compute many lanternfish populations quickly.&amp;lt;br&amp;gt;
The key realization is that&amp;lt;br&amp;gt;
Step&amp;lt;br&amp;gt;
is a linear function,
which means:&amp;lt;br&amp;gt;
(n × Step v) ≡ (Step n × v)
(Step v) &#43; (Step w) ≡ (Step v &#43; w)&amp;lt;br&amp;gt;
We can thus compute&amp;lt;br&amp;gt;
for every basis vector of our 9-dimensional
histogram space; let’s take the unit vectors here:&amp;lt;br&amp;gt;
step256 ← {&#43;´Step⍟256 𝕩}˘ =⌜˜↕9
⟨ 6703087164 6206821033 5617089148 5217223242 4726100874
4368232009 3989468462 3649885552 3369186778 ⟩&amp;lt;br&amp;gt;
And now we can solve part 2 for any input by using a dot-product
(pairwise multiplication followed by addition):&amp;lt;br&amp;gt;
step256 &#43;´∘× d
26984457539&amp;lt;br&amp;gt;
This yields the same result as above, but only does 9 multiplications
and 9 additions.&amp;lt;br&amp;gt;
We can also compute&amp;lt;br&amp;gt;
step256&amp;lt;br&amp;gt;
faster by using a bit of matrix theory.
Since we know the operation of&amp;lt;br&amp;gt;
step&amp;lt;br&amp;gt;
on the basis vectors, we can
compute the matrix&amp;lt;br&amp;gt;
m&amp;lt;br&amp;gt;
corresponding to this linear operator:&amp;lt;br&amp;gt;
m ← Step˘ =⌜˜↕9
┌─
╵ 0 0 0 0 0 0 1 0 1
1 0 0 0 0 0 0 0 0
0 1 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0
0 0 0 0 1 0 0 0 0
0 0 0 0 0 1 0 0 0
0 0 0 0 0 0 1 0 0
0 0 0 0 0 0 0 1 0
┘&amp;lt;br&amp;gt;
Note how we just applied&amp;lt;br&amp;gt;
for every column of the identity matrix.&amp;lt;br&amp;gt;
We can solve the problem the same way now by computing the 256th power
of the matrix and multiplying it to the histogram vector and summing up again.&amp;lt;br&amp;gt;
First, we need the matrix product:&amp;lt;br&amp;gt;
MP ← &#43;˝∘×⎉1‿∞&amp;lt;br&amp;gt;
Naively, we can compute the power like this
(we already have&amp;lt;br&amp;gt;
to the power of 1!):&amp;lt;br&amp;gt;
m256 ← m MP⍟255 m&amp;lt;br&amp;gt;
Now multiply&amp;lt;br&amp;gt;
d&amp;lt;br&amp;gt;
to it, and sum up:&amp;lt;br&amp;gt;
&#43;´ m256 &#43;˝∘× d
26984457539&amp;lt;br&amp;gt;
Note that&amp;lt;br&amp;gt;
is just the sum of rows, so we can precompute that:&amp;lt;br&amp;gt;
step256 ≡ &#43;˝˘ m256
1&amp;lt;br&amp;gt;
If you paid attention, you may now wonder why we replaced 256 row
operations with 255 matrix multiplications and claim it’s faster to
compute.  We need an additional trick: fast matrix exponentiation.
Instead of 255 matrix multiplications we just need 8 matrix squarings
with itself to compute the 256th power:&amp;lt;br&amp;gt;
m256 ≡ MP˜⍟8 m
1&amp;lt;br&amp;gt;
This yields an asymptotically faster algorithm to compute the&amp;lt;br&amp;gt;
vector for higher powers.  For non-powers of two you need to implement
a square-and-multiply algorithm, or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://wwwhomes.uni-bielefeld.de/achim/addition_chain.html&amp;#34;&amp;gt;look up the optimal
result&amp;lt;/a&amp;gt; .
This is left as an exercise to the reader.&amp;lt;br&amp;gt;
For day 80 we can use only 7 matrix multiplications:&amp;lt;br&amp;gt;
(MP˜⍟4 (m MP MP˜⍟2 m)) ≡ (m MP⍟79 m)
1&amp;lt;br&amp;gt;
In theory, you could optimize this even further and compute a closed
form from the eigenvectors of&amp;lt;br&amp;gt;
, but you’ll end up with nonic roots
and I have not found a way to compute them precise enough to be
useful.  So let’s leave it at that for now.&amp;lt;br&amp;gt;
NP: Slade—My Oh My&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211209-201757/</link>
      <pubDate>Thu, 09 Dec 2021 20:17:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211209-201757/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/08/technology/adam-mosseri-instagram-senate.html&amp;#34;&amp;gt;Lawmakers urge the head of Instagram to better protect children. Adam Mosseri, the company’s leader, was asked to appear before a Senate panel after internal research leaked that said the app had a toxic effect on some teenagers. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211209-201731/</link>
      <pubDate>Thu, 09 Dec 2021 20:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211209-201731/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03620-1&amp;#34;&amp;gt;The $11-billion Webb telescope aims to probe the early Universe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Three decades after it was conceived, Hubble’s successor is set for launch. Here’s why astronomers around the world can’t wait.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211209-201534/</link>
      <pubDate>Thu, 09 Dec 2021 20:15:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211209-201534/</guid>
      <description>namespace __cpo&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#hidden-friend-idiom&amp;#34;&amp;gt;hidden-friend-idiom&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#ranges&amp;#34;&amp;gt;ranges&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#war-stories&amp;#34;&amp;gt;war-stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eventually I’ll write up a full “libc&#43;&#43; beginner’s guide to writing niebloids.”
For now, this is just a quick note to explain one particular quirk.
The shape of a libc&#43;&#43; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2019/08/02/the-tough-guide-to-cpp-acronyms/#cpo&amp;#34;&amp;gt;niebloid and/or CPO&amp;lt;/a&amp;gt; is:&amp;lt;br&amp;gt;
namespace std::ranges {
namespace __iter_swap {
struct __fn {
auto operator()(~~~) const { ~~~ }
};
}
inline namespace __cpo {
inline constexpr auto iter_swap = __iter_swap::__fn{};
}
}&amp;lt;br&amp;gt;
Why do we have that extra&amp;lt;br&amp;gt;
inline namespace __cpo&amp;lt;br&amp;gt;
?&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#hidden-friend-idiom&amp;#34;&amp;gt;hidden-friend-idiom&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#operator-spaceship&amp;#34;&amp;gt;operator-spaceship&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#stl-classic&amp;#34;&amp;gt;stl-classic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20211209-200833/</link>
      <pubDate>Thu, 09 Dec 2021 20:08:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20211209-200833/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/theyll-have-to-do/&amp;#34;&amp;gt;I wouldn&amp;#39;t call my friends strong male role models but they&amp;#39;ll have to do&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211209-200652/</link>
      <pubDate>Thu, 09 Dec 2021 20:06:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211209-200652/</guid>
      <description>A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as “the most prolific cybercriminal we’ve identified in Canada,” but so far they’ve released few other details about the investigation or the defendant. Helpfully, an email address and nickname apparently connected to the accused offer some additional clues.&amp;lt;br&amp;gt;
Matthew Philbert, in 2016.&amp;lt;br&amp;gt;
Matthew Philbert of Ottawa, Ontario was charged with fraud and conspiracy in a joint law enforcement action by Canadian and U.S. authorities dubbed “Project CODA.” The Ontario Provincial Police (OPP) on Tuesday &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/OPP_News/status/1468294251867824129&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; the investigation began in January 2020 when the U.S. Federal Bureau of Investigation (FBI) contacted them regarding ransomware attacks that were based in Canada.&amp;lt;br&amp;gt;
“During the course of this investigation, OPP investigators determined an individual was responsible for numerous ransomware attacks affecting businesses, government agencies and private individuals throughout Canada as well as cyber-related offenses in the United States,” reads an OPP statement.&amp;lt;br&amp;gt;
“A quantity of evidentiary materials was seized and held for investigation, including desktop and laptop computers, a tablet, several hard drives, cellphones, a Bitcoin seed phrase and a quantity of blank cards with magnetic stripes,” the statement continues.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/12/PhilbertIndictment.pdf&amp;#34;&amp;gt;U.S. indictment of Philbert&amp;lt;/a&amp;gt; (PDF) is unusually sparse, but it does charge him with conspiracy, suggesting the defendant was part of a group. In an interview with KrebsOnSecurity, OPP Detective Inspector Matt Watson declined to say whether other defendants were being sought in connection with the investigation, but said the inquiry is ongoing.&amp;lt;br&amp;gt;
“I will say this, Philbert is the most prolific cybercriminal we’ve identified to date in Canada,” Watson said. “We’ve identified in excess of a thousand of his victims. And a lot of these were small businesses that were just holding on by their fingernails during COVID.”&amp;lt;br&amp;gt;
A DARK CLOUD&amp;lt;br&amp;gt;
There is a now-dormant Myspace account for a Matthew Philbert from Orleans, a suburb of Ottawa, Ontario. The information tied to the Myspace account matches the age and town of the defendant. The Myspace account was registered under the nickname “ Darkcloudowner ,” and to the email address &amp;lt;a href=&amp;#34;mailto:dark_cl0ud6@hotmail.com&amp;#34;&amp;gt;dark_cl0ud6@hotmail.com&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
A search in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.domaintools.com&amp;#34;&amp;gt;DomainTools&amp;lt;/a&amp;gt; on that email address reveals multiple domains registered to a Matthew Philbert and to the Ottawa phone number 6138999251 [DomainTools is a frequent advertiser on this site]. That same phone number is tied to a Facebook account for a 31-year-old Matthew Philbert from Orleans, who describes himself as a self-employed “broke bitcoin baron.”&amp;lt;br&amp;gt;
Mr. Philbert did not respond to multiple requests for comment.&amp;lt;br&amp;gt;
According to cyber intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel471.com&amp;#34;&amp;gt;Intel 471&amp;lt;/a&amp;gt; , that &amp;lt;a href=&amp;#34;mailto:dark_cl0ud6@hotmail.com&amp;#34;&amp;gt;dark_cl0ud6@hotmail.com&amp;lt;/a&amp;gt; address has been used in conjunction with the handle “ DCReavers2 ” to register user accounts on a half-dozen English-language cybercrime forums since 2008, including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=hackforums&amp;#34;&amp;gt;Hackforums&amp;lt;/a&amp;gt; , Blackhatworld, and Ghostmarket.&amp;lt;br&amp;gt;
Perhaps the earliest and most important cybercrime forum DCReavers2 frequented was Darkode , where he was among the first two-dozen members. Darkode was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/07/the-darkode-cybercrime-forum-up-close/&amp;#34;&amp;gt;taken down in 2015 as part of an FBI investigation sting operation&amp;lt;/a&amp;gt; , but screenshots of the community saved by this author show that DCReavers2 was already well known to the Darkode founders when his membership to the forum was accepted in May 2009.&amp;lt;br&amp;gt;
DCReavers2 was just the 22nd account to register on the Darkode cybercrime forum.&amp;lt;br&amp;gt;
Most of DCReavers’s posts on Darkode appear to have been removed by forum administrators early on (likely at DCReavers’ request), but the handful of posts that survived the purge show that more than a decade ago DCReavers2 was involved in running botnets, or large collections of hacked computers.&amp;lt;br&amp;gt;
“My exploit pack is hosted there with 0 problems,” DCReaver2 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/12/dcreavers2-dk.png&amp;#34;&amp;gt;says&amp;lt;/a&amp;gt; of a shady online provider that another member asked about in May 2010. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/canada-charges-its-most-prolific-cybercriminal/#more-57819&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/canada-charges-its-most-prolific-cybercriminal/&amp;#34;&amp;gt;Canada Charges Its “Most Prolific Cybercriminal”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211207-121710/</link>
      <pubDate>Tue, 07 Dec 2021 12:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211207-121710/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/07/technology/instagram-parental-controls.html&amp;#34;&amp;gt;Instagram says parental controls will arrive in March. Adam Mosseri, the head of the company, is expected to face questions from lawmakers this week about whether social media harms children. By David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211207-081852/</link>
      <pubDate>Tue, 07 Dec 2021 08:18:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211207-081852/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/07/technology/instagram-parental-controls.html&amp;#34;&amp;gt;Instagram Says Parental Controls Will Arrive in March Adam Mosseri, the head of the company, is expected to face questions from lawmakers this week about whether social media harms children. By David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211207-002146/</link>
      <pubDate>Tue, 07 Dec 2021 00:21:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211207-002146/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/11/27/espanol/telescopio-hubble.html&amp;#34;&amp;gt;Out There ¿Quieres saber cómo está el clima en otros planetas? El telescopio Hubble lo informa El ojo previsor de la nave espacial vuelve a posar su mirada en Júpiter, Saturno, Urano y Neptuno. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211206-201418/</link>
      <pubDate>Mon, 06 Dec 2021 20:14:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211206-201418/</guid>
      <description>types are boolean-testable&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#ranges&amp;#34;&amp;gt;ranges&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#today-i-learned&amp;#34;&amp;gt;today-i-learned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today I learned: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eel.is/c&#43;&#43;draft/view.interface.general&amp;#34;&amp;gt;std::ranges::view_interface&amp;lt;/a&amp;gt; provides an&amp;lt;br&amp;gt;
explicit operator bool&amp;lt;br&amp;gt;
. When you have a view type from the Ranges STL
(such as&amp;lt;br&amp;gt;
std::ranges::subrange&amp;lt;br&amp;gt;
), you can branch on its boolean value: empty
ranges are falsey and everything else is truthy.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Technical blog</title>
      <link>https://www.whatsupup.com/blog/emphysema/mesalliance/20211206-162342/</link>
      <pubDate>Mon, 06 Dec 2021 16:23:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/emphysema/mesalliance/20211206-162342/</guid>
      <description>2020-05-21 :: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/kalyn&amp;#34;&amp;gt;Kalyn: a self-hosting compiler for x86-64&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2021-07-13 :: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/replit/&amp;#34;&amp;gt;How Replit used legal threats to kill my open-source
project&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2021-12-06 :: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/messenger&amp;#34;&amp;gt;Reverse engineering the Facebook Messenger
API&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211206-162036/</link>
      <pubDate>Mon, 06 Dec 2021 16:20:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211206-162036/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/12/webassembly-and-back-again-fine-grained-sandboxing-in-firefox-95/&amp;#34;&amp;gt;WebAssembly and Back Again: Fine-Grained Sandboxing in Firefox 95 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/12/webassembly-and-back-again-fine-grained-sandboxing-in-firefox-95/&amp;#34;&amp;gt;WebAssembly and Back Again: Fine-Grained Sandboxing in Firefox 95&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
In Firefox 95, we&amp;amp;#39;re shipping a novel sandboxing technology called RLBox — developed in collaboration with researchers at the University of California San Diego and the University of Texas — that makes it easy and efficient to isolate subcomponents to make the browser more secure. This technology opens up new opportunities beyond what&amp;amp;#39;s been possible with traditional process-based sandboxing, and we look forward to expanding its usage and (hopefully) seeing it adopted in other browsers and software projects.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211205-161804/</link>
      <pubDate>Sun, 05 Dec 2021 16:18:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211205-161804/</guid>
      <description>December 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/05/How-new-Linux-users-succeed.html&amp;#34;&amp;gt;How new Linux users can increase their odds of success&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/12/05/What-desktop-Linux-needs.html&amp;#34;&amp;gt;What desktop Linux needs to succeed in the mainstream&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211204-041753/</link>
      <pubDate>Sat, 04 Dec 2021 04:17:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211204-041753/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/cyber-apple-usa-nsogroup-exclusive/u-s-state-department-phones-hacked-with-israeli-company-spyware-sources-idUSKBN2II1OW&amp;#34;&amp;gt;U.S. State Department phones hacked with Israeli company spyware - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211204-000701/</link>
      <pubDate>Sat, 04 Dec 2021 00:07:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211204-000701/</guid>
      <description>Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in acquiring remote access credentials — such as usernames and passwords needed to remotely connect to the target’s network. In this post we’ll look at the clues left behind by “ Babam ,” the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions over the past few years.&amp;lt;br&amp;gt;
Since the beginning of 2020, Babam has set up numerous auctions on the Russian-language cybercrime forum Exploit , mainly selling virtual private networking (VPN) credentials stolen from various companies. Babam has authored more than 270 posts since joining Exploit in 2015, including dozens of sales threads. However, none of Babam’s posts on Exploit include any personal information or clues about his identity.&amp;lt;br&amp;gt;
But in February 2016, Babam joined Verified , another Russian-language crime forum. Verified was hacked at least twice in the past five years, and its user database posted online. That information shows that Babam joined Verified using the email address “ &amp;lt;a href=&amp;#34;mailto:operns@gmail.com&amp;#34;&amp;gt;operns@gmail.com&amp;lt;/a&amp;gt; .” The latest Verified leak also exposed private messages exchanged by forum members, including more than 800 private messages that Babam sent or received on the forum over the years.&amp;lt;br&amp;gt;
In early 2017, Babam confided to another Verified user via private message that he is from Lithuania. In virtually all of his forum posts and private messages, Babam can be seen communicating in transliterated Russian rather than by using the Cyrillic alphabet. This is common among cybercriminal actors for whom Russian is not their native tongue.&amp;lt;br&amp;gt;
Cyber intelligence platform &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.constellaintelligence.com&amp;#34;&amp;gt;Constella Intelligence&amp;lt;/a&amp;gt; told KrebsOnSecurity that the &amp;lt;a href=&amp;#34;mailto:operns@gmail.com&amp;#34;&amp;gt;operns@gmail.com&amp;lt;/a&amp;gt; address was used in 2016 to register an account at filmai.in , which is a movie streaming service catering to Lithuanian speakers. The username associated with that account was “ bo3dom .”&amp;lt;br&amp;gt;
A reverse WHOIS search via &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.domaintools.com&amp;#34;&amp;gt;DomainTools.com&amp;lt;/a&amp;gt; says &amp;lt;a href=&amp;#34;mailto:operns@gmail.com&amp;#34;&amp;gt;operns@gmail.com&amp;lt;/a&amp;gt; was used to register two domain names: bonnjoeder[.]com back in 2011, and sanjulianhotels[.]com (2017). It’s unclear whether these domains ever were online, but the street address on both records was “ 24 Brondeg St. ” in the United Kingdom. [Full disclosure: DomainTools is a frequent advertiser on this website.]&amp;lt;br&amp;gt;
A reverse search at DomainTools on “24 Brondeg St.” reveals one other domain: wwwecardone[.]com . The use of domains that begin with “www” is fairly common among phishers, and by passive “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/04/dot-cm-typosquatting-sites-visited-12m-times-so-far-in-2018/&amp;#34;&amp;gt;typosquatting&amp;lt;/a&amp;gt; ” sites that seek to siphon credentials from legitimate websites when people mistype a domain, such as accidentally omitting the “.” after typing “www”.&amp;lt;br&amp;gt;
A banner from the homepage of the Russian language cybercrime forum Verified.&amp;lt;br&amp;gt;
Searching DomainTools for the phone number in the WHOIS records for wwwecardone[.]com  — &#43;44.0774829141 — leads to a handful of similar typosquatting domains, including wwwebuygold[.]com and wwwpexpay[.]com . A different UK phone number in a more recent record for the wwwebuygold[.]com domain — 44.0472882112 — is tied to two more domains – howtounlockiphonefree[.]com , and portalsagepay[.]com . All of these domains date back to between 2012 and 2013.&amp;lt;br&amp;gt;
The original registration records for the iPhone, Sagepay and Gold domains share an email address: &amp;lt;a href=&amp;#34;mailto:devrian26@gmail.com&amp;#34;&amp;gt;devrian26@gmail.com&amp;lt;/a&amp;gt; . A search on the username “bo3dom” using Constella’s service reveals an account at ipmart-forum.com , a now-defunct forum concerned with IT products, such as mobile devices, computers and online gaming. That search shows the user bo3dom registered at ipmart-forum.com with the email address &amp;lt;a href=&amp;#34;mailto:devrian27@gmail.com&amp;#34;&amp;gt;devrian27@gmail.com&amp;lt;/a&amp;gt; , and from an Internet address in Vilnius, Lithuania.&amp;lt;br&amp;gt;
&amp;lt;a href=&amp;#34;mailto:Devrian27@gmail.com&amp;#34;&amp;gt;Devrian27@gmail.com&amp;lt;/a&amp;gt; was used to register multiple domains, including wwwsuperchange.ru back in 2008 (notice again the suspect “www” as part of the domain name). Gmail’s password recovery function says the backup email address for &amp;lt;a href=&amp;#34;mailto:devrian27@gmail.com&amp;#34;&amp;gt;devrian27@gmail.com&amp;lt;/a&amp;gt; is &amp;lt;a href=&amp;#34;mailto:bo3*******@gmail.com&amp;#34;&amp;gt;bo3*******@gmail.com&amp;lt;/a&amp;gt; . Gmail accepts the address &amp;lt;a href=&amp;#34;mailto:bo3domster@gmail.com&amp;#34;&amp;gt;bo3domster@gmail.com&amp;lt;/a&amp;gt; as the recovery email for that devrian27 account.&amp;lt;br&amp;gt;
According to Constella, the &amp;lt;a href=&amp;#34;mailto:bo3domster@gmail.com&amp;#34;&amp;gt;bo3domster@gmail.com&amp;lt;/a&amp;gt; address was exposed in multiple data breaches over the years, and in each case it used one of two passwords: “ lebeda1 ” and “ a123456 “.&amp;lt;br&amp;gt;
Searching in Constella for accounts using those passwords reveals a slew of additional “bo3dom” email addresses, including &amp;lt;a href=&amp;#34;mailto:bo3dom@gmail.com&amp;#34;&amp;gt;bo3dom@gmail.com&amp;lt;/a&amp;gt; .  Pivoting on that address in Constella reveals that someone with the name Vytautas Mockus used it to register an account at mindjolt.com, a site featuring dozens of simple puzzle games that visitors can play online.&amp;lt;br&amp;gt;
At some point, mindjolt.com apparently also was hacked, because a copy of its database at Constella says the &amp;lt;a href=&amp;#34;mailto:bo3dom@gmail.com&amp;#34;&amp;gt;bo3dom@gmail.com&amp;lt;/a&amp;gt; used two passwords at that site: lebeda1 and a123456.&amp;lt;br&amp;gt;
A reverse WHOIS search on “Vytautas Mockus” at DomainTools shows the email address &amp;lt;a href=&amp;#34;mailto:devrian25@gmail.com&amp;#34;&amp;gt;devrian25@gmail.com&amp;lt;/a&amp;gt; was used in 2010 to register the domain name perfectmoney[.]co . This is one character off of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.bitcoin.it/wiki/Perfect_Money&amp;#34;&amp;gt;perfectmoney[.]com&amp;lt;/a&amp;gt; , which is an early virtual currency that was quite popular with cybercriminals at the time. The phone number tied to that domain registration was “ 86.7273687 “.&amp;lt;br&amp;gt;
A Google search for “Vytautas Mockus” says there’s a person by that name who runs a mobile food service company in Lithuania called “ Palvisa .” A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/12/302610044-2559-e71f3.pdf&amp;#34;&amp;gt;report on Palvisa&amp;lt;/a&amp;gt; (PDF) purchased from Rekvizitai.vz — an official online directory of Lithuanian companies — says Palvisa was established in 2011 by a Vytautaus Mockus, using the phone number 86.7273687 , and the email address &amp;lt;a href=&amp;#34;mailto:bo3dom@gmail.com&amp;#34;&amp;gt;bo3dom@gmail.com&amp;lt;/a&amp;gt;. The report states that Palvisa is active, but has had no employees other than its founder.&amp;lt;br&amp;gt;
Reached via the &amp;lt;a href=&amp;#34;mailto:bo3dom@gmail.com&amp;#34;&amp;gt;bo3dom@gmail.com&amp;lt;/a&amp;gt; address, the 36-year-old Mr. Mockus expressed mystification as to how his personal information wound up in so many records. “I am not involved in any crime,” Mockus wrote in reply.&amp;lt;br&amp;gt;
A rough mind map of the connections mentioned in this story.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/who-is-the-network-access-broker-babam/&amp;#34;&amp;gt;Who Is the Network Access Broker ‘Babam’?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211203-201812/</link>
      <pubDate>Fri, 03 Dec 2021 20:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211203-201812/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/cyber-apple-usa-nsogroup-exclusive/exclusive-u-s-state-department-phones-hacked-with-israeli-company-spyware-sources-idUSKBN2II1OW&amp;#34;&amp;gt;Exclusive-U.S. State Department phones hacked with Israeli company spyware - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
11:45am EST&amp;lt;br&amp;gt;
WASHINGTON/SAN FRANCISCO     Apple Inc iPhones of at least nine U.S. State Department employees were hacked by an unknown assailant using sophisticated spyware developed by the Israel-based NSO Group, according to four people familiar with the matter.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211203-201723/</link>
      <pubDate>Fri, 03 Dec 2021 20:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211203-201723/</guid>
      <description>By Alex Kantrowitz  ·  Launched 2 years ago&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20211203-082209/</link>
      <pubDate>Fri, 03 Dec 2021 08:22:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20211203-082209/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-evaluate-a-3rd-party-restful-api-47/&amp;#34;&amp;gt;How to evaluate a 3rd party RESTful API? Nov. 26, 2021 · 1, To build or to buy? 2, Can this API provide features you need? 3, Is this API both stable and scalable? 4, How easily can you talk to a real human employee of the API vendor? Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211203-080927/</link>
      <pubDate>Fri, 03 Dec 2021 08:09:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211203-080927/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/typescript-control-flow-analysis-best-of/&amp;#34;&amp;gt;Getting strong types and better type inference in TypeScript doesn’t necessarily require advanced types and &amp;lt;code&amp;gt;as&amp;lt;/code&amp;gt; usages everywhere. Here are some simple type construction patterns, code writing habits, and compiler options to improve your application’s type inference without increasing complexity.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211203-041736/</link>
      <pubDate>Fri, 03 Dec 2021 04:17:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211203-041736/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-internet-was-once-flat-no-longer&amp;#34;&amp;gt;The Internet Was Once Flat. No Longer.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-internet-was-once-flat-no-longer&amp;#34;&amp;gt;Instead of one big community, the web is a community of communities that often don’t overlap.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Five Ways China Is Trying To Unaddict Kids From Social Media&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Blackout hours, educational content, time limits, and interspersed pauses. This is how China is attempting to mitigate social media addiction, especial…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211203-001755/</link>
      <pubDate>Fri, 03 Dec 2021 00:17:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211203-001755/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/12/02/technology/ftc-nvidia-arm-deal.html&amp;#34;&amp;gt;F.T.C. Sues to Stop Blockbuster Chip Deal Between Nvidia and Arm The proposed deal would give Nvidia control over computing technology and designs that rival firms rely on. By Cecilia Kang and Don Clark&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211203-001710/</link>
      <pubDate>Fri, 03 Dec 2021 00:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211203-001710/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03587-z&amp;#34;&amp;gt;This tiny iron-rich world is extraordinarily metal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The discovery of GJ 367b, which orbits its star in about 8 hours, demonstrates astronomers’ prowess at finding extreme planets.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211203-000712/</link>
      <pubDate>Fri, 03 Dec 2021 00:07:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211203-000712/</guid>
      <description>In January 2021, technology vendor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ui.com/&amp;#34;&amp;gt;Ubiquiti Inc.&amp;lt;/a&amp;gt; [NYSE:UI] disclosed that a breach at a third party cloud provider had exposed customer account credentials. In March, a Ubiquiti employee &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/&amp;#34;&amp;gt;warned&amp;lt;/a&amp;gt; that the company had drastically understated the scope of the incident, and that the third-party cloud provider claim was a fabrication. On Wednesday, a former Ubiquiti developer was arrested and charged with stealing data and trying to extort his employer while pretending to be a whistleblower.&amp;lt;br&amp;gt;
Federal prosecutors say Nickolas Sharp , a senior developer at Ubiquiti, actually caused the “breach” that forced Ubiquiti to disclose a cybersecurity incident in January. They allege that in late December 2020, Sharp applied for a job at another technology company, and then abused his privileged access to Ubiquiti’s systems at Amazon’s AWS cloud service and the company’s GitHub accounts to download large amounts of proprietary data.&amp;lt;br&amp;gt;
Sharp’s indictment doesn’t specify how much data he allegedly downloaded, but it says some of the downloads took hours, and that he cloned approximately 155 Ubiquiti data repositories via multiple downloads over nearly two weeks.&amp;lt;br&amp;gt;
On Dec. 28, other Ubiquiti employees spotted the unusual downloads, which had leveraged internal company credentials and a Surfshark VPN connection to hide the downloader’s true Internet address. Assuming an external attacker had breached its security, Ubiquiti quickly launched an investigation.&amp;lt;br&amp;gt;
But Sharp was a member of the team doing the forensic investigation, the indictment alleges.&amp;lt;br&amp;gt;
“At the time the defendant was part of a team working to assess the scope and damage caused by the incident and remediate its effects, all while concealing his role in committing the incident,” wrote prosecutors with the Southern District of New York.&amp;lt;br&amp;gt;
According to the indictment, on January 7 a senior Ubiquiti employee received a ransom email. The message was sent through an IP address associated with the same Surfshark VPN. The ransom message warned that internal Ubiquiti data had been stolen, and that the information would not be used or published online as long as Ubiquiti agreed to pay 25 Bitcoin.&amp;lt;br&amp;gt;
The ransom email also offered to identify a purportedly still unblocked “backdoor” used by the attacker for the sum of another 25 Bitcoin (the total amount requested was equivalent to approximately $1.9 million at the time). Ubiquiti did not pay the ransom demands.&amp;lt;br&amp;gt;
Investigators say they were able to tie the downloads to Sharp and his work-issued laptop because his Internet connection briefly failed on several occasions while he was downloading the Ubiquiti data. Those outages were enough to prevent Sharp’s Surfshark VPN connection from functioning properly — thus exposing his Internet address as the source of the downloads. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/ubiquiti-developer-charged-with-extortion-causing-2020-breach/#more-57755&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/12/ubiquiti-developer-charged-with-extortion-causing-2020-breach/&amp;#34;&amp;gt;Ubiquiti Developer Charged With Extortion, Causing 2020 “Breach”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211202-201606/</link>
      <pubDate>Thu, 02 Dec 2021 20:16:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211202-201606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/12/exploring-container-security-storage.html&amp;#34;&amp;gt;Exploring Container Security: A Storage Vulnerability Deep Dive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Fabricio Voznika and Mauricio Poppe, Google Cloud Kubernetes Security is constantly evolving - keeping pace with enhanced functionality, usability and flexibility while also balancing the security needs of a wide and diverse set of use-cases. Recently, the GKE Security team discovered a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-018&amp;#34;&amp;gt;high severity vulnerability&amp;lt;/a&amp;gt; that allowed workloads to have access to parts of the host filesystem outside the mounted volumes boundaries. Although the vulnerability was patched back in September we thought it would be beneficial to write up a more in-depth analysis of the issue to share with the community. We assessed the impact of the vulnerability as described in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-vulnerability-management-in-open-source-kubernetes&amp;#34;&amp;gt;vulnerability management in open-source Kubernetes&amp;lt;/a&amp;gt; and worked closely with the GKE Storage team and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/kubernetes/committee-security-response&amp;#34;&amp;gt;the Kubernetes Security Response Committee&amp;lt;/a&amp;gt; to find a fix. In this post we’ll give some background on how the subpath storage system works, an overview of the vulnerability, the steps to find the root cause and the fix, and finally some recommendations for GKE and Anthos users. Kubernetes Filesystems: Intro to Volume Subpath The vulnerability, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25741&amp;#34;&amp;gt;CVE-2021-25741,&amp;lt;/a&amp;gt; was caused by a race condition during the creation of a subpath bind mount &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/docs/concepts/storage/volumes/#using-subpath&amp;#34;&amp;gt;inside a container, and&amp;lt;/a&amp;gt; allowed an attacker to gain unauthorized access to the underlying node filesystem and its sensitive files. We’ll describe how that system is supposed to work, and then talk about the vulnerability. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/docs/concepts/storage/volumes/#using-subpath&amp;#34;&amp;gt;volume subpath&amp;lt;/a&amp;gt; feature in Kubernetes enables sharing a volume in multiple containers inside a pod. For example, we could create a Pod with an InitContainer that creates directories with pre-populated data in a mounted filesystem volume. These directories can then be used by containers in the same Pod by mounting the same volume and optionally specifying a subpath field to limit what&amp;amp;#39;s visible inside the container. While there are some great use cases for this feature, it’s an area that has had vulnerabilities discovered in the past. The kubelet must be extra cautious when handling user-owned subpaths because it operates with privileges in the host. One vulnerability that has been previously discovered involved the creation of a malicious workload where an InitContainer would create a symlink pointing to any location in the host. For example, the InitContainer could mount a volume in /mnt and create a symlink /mnt/attack inside the container pointing to /etc. Later in the Pod lifecycle, another container would attempt to mount the same volume with subpath attack. While preparing the volumes for the container, the kubelet would end up following the symlink to the host’s /etc instead of the container’s /etc, unknowingly exposing the host filesystem to the container. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/blog/2018/04/04/fixing-subpath-volume-vulnerability/&amp;#34;&amp;gt;A previous fix&amp;lt;/a&amp;gt; made sure that the subpath mount location is resolved and validated to point to a location inside the base volume and that it&amp;amp;#39;s not changeable by the user in between the time the path was validated and when the container runtime bind mounts it.  This race condition is known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Time-of-check_to_time-of-use&amp;#34;&amp;gt;time of check to time of use (TOCTOU)&amp;lt;/a&amp;gt; where the subject being validated changes after it has been validated. These validations and others are summarized in the following container lifecycle sequence diagram. Volume subpath validations before the container startup A New TOCTOU Vulnerability: CVE-2021-25741 The latest vulnerability was discovered by performing a symlink attack similar to the one explained above, with the difference being that it constantly swapped the symlink with a directory in a tight loop, using the RENAME_EXCHANGE option with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man2/rename.2.html&amp;#34;&amp;gt;renameat(2)&amp;lt;/a&amp;gt; . If the timing is just right, the kubelet will see the path as a directory and pass the validation check. Then the mount utility may find that the path is a symlink pointing to the host and follow it, exposing the host filesystem to the container. This is visualized in the following diagram:&amp;lt;br&amp;gt;
The expectation and the attack outcome&amp;lt;br&amp;gt;
The GKE Security and Storage teams worked closely to revise the fix done previously to find a solution. The previous fix takes several steps to ensure that the directory being mounted is safely opened and validated. After the file is opened and validated, the kubelet uses the magic-link path under /proc/[pid]/fd directory for all subsequent operations to ensure the file remains unchanged. However, we found out that all of the efforts were undone by the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man8/mount.8.html&amp;#34;&amp;gt;mount(8)&amp;lt;/a&amp;gt; linux utility which was dereferencing the procfs magic-link by default. Once the problem was understood, the fix involved making sure that the mount utility doesn&amp;amp;#39;t dereference the magic-links by using the --no-canonicalize flag in the mount command. The fix is in&amp;lt;br&amp;gt;
Once the problem was well understood, we fixed it inside Kubernetes and quickly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-018&amp;#34;&amp;gt;released the fix to GKE and Anthos&amp;lt;/a&amp;gt; .  If GKE auto-upgrade is enabled in your clusters there&amp;amp;#39;s no action on your part for this vulnerability, your nodes have already been patched. We strongly recommend that customers utilize &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/cluster-upgrades&amp;#34;&amp;gt;auto-upgrades&amp;lt;/a&amp;gt; . Auto-upgrade gives peace of mind that your clusters are running with the latest patches. GKE released a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins#gcp-2021-018&amp;#34;&amp;gt;Google Kubernetes Engine security bulletin&amp;lt;/a&amp;gt; on this vulnerability, which detailed what customers can do to immediately remediate this issue across GKE and Anthos. We also provided guidance to customers who manually manage their node versions, ensuring that fixed releases were available in every region for our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/kubernetes-engine/docs/concepts/release-channels&amp;#34;&amp;gt;Static and Release Channels&amp;lt;/a&amp;gt; . Moving forward Google continues to invest heavily in the security of GKE and Kubernetes. We encourage users interested in finding vulnerabilities to participate in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/01/securing-open-source-how-google.html&amp;#34;&amp;gt;Kubernetes bug bounty program&amp;lt;/a&amp;gt; and in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/05/expanding-our-work-with-open-source.html&amp;#34;&amp;gt;Google Vulnerability Rewards Program (VRP)&amp;lt;/a&amp;gt; which was recently expanded to cover GKE vulnerabilities. For the latest guidance on security issues, please follow our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/anthos/clusters/docs/security-bulletins&amp;#34;&amp;gt;GKE Security Bulletins&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211202-161759/</link>
      <pubDate>Thu, 02 Dec 2021 16:17:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211202-161759/</guid>
      <description>We use cookies to make sure that our website works properly, as well as some ‘optional’ cookies to personalise content and advertising, provide social media features and analyse how people use our site. By accepting some or all optional cookies you give consent to the processing of your personal data, including transfer to third parties, some in countries outside of the European Economic Area that do not offer the same data protection standards as the country where you live. You can decide which optional cookies to accept by clicking on ‘Manage Settings’, where you can also find more information about how your personal data is processed.
Further information can be found in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/info/privacy&amp;#34;&amp;gt;privacy policy&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Manage Preferences&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211202-081705/</link>
      <pubDate>Thu, 02 Dec 2021 08:17:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211202-081705/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html&amp;#34;&amp;gt;This shouldn&amp;amp;amp;#39;t have happened: A vulnerability post&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211202-041304/</link>
      <pubDate>Thu, 02 Dec 2021 04:13:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211202-041304/</guid>
      <description>I&amp;#39;m discussing “Unfettered Conversation with Ken Griffin, CEO of Citadel” with @bhorowitz, @arampell, Ken Griffin, and a16z. Today, Dec 1 at 5:00 PM PST in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Dd3yI7BKA8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Dd3yI7BKA8&amp;#34;&amp;gt;https://t.co/Dd3yI7BKA8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20211202-001158/</link>
      <pubDate>Thu, 02 Dec 2021 00:11:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20211202-001158/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/become-a-signal-sustainer/&amp;#34;&amp;gt;Become a Signal Sustainer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Signal has no data to sell, no advertisers to sell it to, and no shareholders to benefit from such a sale. We’re building a different kind of tech – where your data stays in your hands – but we’re also building a different kind of tech organization . One without investors, quarterly earnings calls, or share price considerations. While the model for conventional tech companies incentivizes them to build products for your data rather than for you , Signal’s nonprofit structure is designed so that the only way value can accrue is in the experience of using the app; the only place it can accrue is in the hands of the people who use it.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211201-201559/</link>
      <pubDate>Wed, 01 Dec 2021 20:15:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211201-201559/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html&amp;#34;&amp;gt;This shouldn&amp;#39;t have happened: A vulnerability postmortem&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Tavis Ormandy, Project Zero&amp;lt;br&amp;gt;
This is an unusual blog post. I normally write posts to highlight some hidden attack surface or interesting complex vulnerability class. This time, I want to talk about a vulnerability that is neither of those things. The striking thing about this vulnerability is just how simple it is. This should have been caught earlier, and I want to explore why that didn’t happen.&amp;lt;br&amp;gt;
In 2021, all good bugs need a catchy name, so I’m calling this one “BigSig”.&amp;lt;br&amp;gt;
First, let’s take a look at the bug, I’ll explain how I found it and then try to understand why we missed it for so long.&amp;lt;br&amp;gt;
Analysis&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Overview&amp;#34;&amp;gt;Network Security Services&amp;lt;/a&amp;gt; (NSS) is Mozilla&amp;amp;#39;s widely used, cross-platform cryptography library. When you verify an ASN.1 encoded digital signature , NSS will create a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/mozilla-central/rev/f8576fec48d866c5f988baaf1fa8d2f8cce2a82f/security/nss/lib/cryptohi/secvfy.c#120&amp;#34;&amp;gt;VFYContext&amp;lt;/a&amp;gt; structure to store the necessary data. This includes things like the public key, the hash algorithm, and the signature itself.&amp;lt;br&amp;gt;
struct VFYContextStr {&amp;lt;br&amp;gt;
SECOidTag hashAlg; /* the hash algorithm */&amp;lt;br&amp;gt;
SECKEYPublicKey *key;&amp;lt;br&amp;gt;
union {&amp;lt;br&amp;gt;
unsigned char buffer[1];&amp;lt;br&amp;gt;
unsigned char dsasig[DSA_MAX_SIGNATURE_LEN];&amp;lt;br&amp;gt;
unsigned char ecdsasig[2 * MAX_ECKEY_LEN];&amp;lt;br&amp;gt;
unsigned char rsasig[(RSA_MAX_MODULUS_BITS &#43; 7) / 8];&amp;lt;br&amp;gt;
} u;&amp;lt;br&amp;gt;
unsigned int pkcs1RSADigestInfoLen;&amp;lt;br&amp;gt;
unsigned char *pkcs1RSADigestInfo;&amp;lt;br&amp;gt;
void *wincx;&amp;lt;br&amp;gt;
void *hashcx;&amp;lt;br&amp;gt;
const SECHashObject * hashobj ;&amp;lt;br&amp;gt;
SECOidTag encAlg; /* enc alg */&amp;lt;br&amp;gt;
PRBool hasSignature;&amp;lt;br&amp;gt;
SECItem *params;&amp;lt;br&amp;gt;
Fig 1 . The VFYContext structure from NSS.&amp;lt;br&amp;gt;
The maximum size signature that this structure can handle is whatever the largest union member is, in this case that’s RSA at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/mozilla-central/rev/f8576fec48d866c5f988baaf1fa8d2f8cce2a82f/security/nss/lib/freebl/blapit.h#139&amp;#34;&amp;gt;2048 bytes&amp;lt;/a&amp;gt; . That’s 16384 bits, large enough to accommodate signatures from even the most ridiculously oversized keys.&amp;lt;br&amp;gt;
Okay, but what happens if you just....make a signature that’s bigger than that?&amp;lt;br&amp;gt;
Well, it turns out the answer is memory corruption. Yes, really.&amp;lt;br&amp;gt;
The untrusted signature is simply copied into this fixed-sized buffer, overwriting adjacent members with arbitrary attacker-controlled data.&amp;lt;br&amp;gt;
The bug is simple to reproduce and affects multiple algorithms. The easiest to demonstrate is RSA-PSS. In fact, just these three commands work:&amp;lt;br&amp;gt;
# We need 16384 bits to fill the buffer, then 32 &#43; 64 &#43; 64 &#43; 64 bits to overflow to hashobj ,&amp;lt;br&amp;gt;
# which contains function pointers (bigger would work too, but takes longer to generate).&amp;lt;br&amp;gt;
$ openssl genpkey -algorithm rsa-pss -pkeyopt rsa_keygen_bits:$((16384 &#43; 32 &#43; 64 &#43; 64 &#43; 64)) -pkeyopt rsa_keygen_primes:5 -out bigsig.key&amp;lt;br&amp;gt;
# Generate a self-signed certificate from that key&amp;lt;br&amp;gt;
$ openssl req -x509 -new -key bigsig.key -subj &amp;amp;#34;/CN=BigSig&amp;amp;#34; -sha256 -out bigsig.cer&amp;lt;br&amp;gt;
# Verify it with NSS...&amp;lt;br&amp;gt;
$ vfychain -a bigsig.cer&amp;lt;br&amp;gt;
Segmentation fault&amp;lt;br&amp;gt;
Fig 2 . Reproducing the BigSig vulnerability in three easy commands.&amp;lt;br&amp;gt;
The actual code that does the corruption varies based on the algorithm; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/mozilla-central/rev/f8576fec48d866c5f988baaf1fa8d2f8cce2a82f/security/nss/lib/cryptohi/secvfy.c#477&amp;#34;&amp;gt;here is the code&amp;lt;/a&amp;gt; for RSA-PSS. The bug is that there is simply no bounds checking at all; sig and key are  arbitrary-length, attacker-controlled blobs, and cx-&amp;amp;gt;u is a fixed-size buffer.&amp;lt;br&amp;gt;
case rsaPssKey :&amp;lt;br&amp;gt;
sigLen = SECKEY_SignatureLen(key);&amp;lt;br&amp;gt;
if (sigLen == 0) {&amp;lt;br&amp;gt;
/* error set by SECKEY_SignatureLen */&amp;lt;br&amp;gt;
rv = SECFailure;&amp;lt;br&amp;gt;
if (sig-&amp;amp;gt;len != sigLen) {&amp;lt;br&amp;gt;
PORT_SetError(SEC_ERROR_BAD_SIGNATURE);&amp;lt;br&amp;gt;
PORT_Memcpy(cx-&amp;amp;gt;u.buffer, sig-&amp;amp;gt;data, sigLen);&amp;lt;br&amp;gt;
Fig 3 . The signature size must match the size of the key, but there are no other limitations. cx-&amp;amp;gt;u is a fixed-size buffer, and sig is an arbitrary-length, attacker-controlled blob.&amp;lt;br&amp;gt;
I think this vulnerability raises a few immediate questions:&amp;lt;br&amp;gt;
Was this a recent code change or regression that hadn’t been around long enough to be discovered? No , the original code was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hg.mozilla.org/projects/nss/annotate/41f5eb9e5df23951883ba3243f3ae51550663d77/security/nss/lib/cryptohi/secvfy.c#l158&amp;#34;&amp;gt;checked in&amp;lt;/a&amp;gt; with ECC support on the 17th October 2003, but wasn&amp;amp;#39;t exploitable until some &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hg.mozilla.org/projects/nss/diff/10393/security/nss/lib/cryptohi/seckey.c#l1.63&amp;#34;&amp;gt;refactoring&amp;lt;/a&amp;gt; in June 2012. In 2017, RSA-PSS support was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hg.mozilla.org/projects/nss/rev/84e886ea090e36c69df58a71665a97bd25c62d02&amp;#34;&amp;gt;added&amp;lt;/a&amp;gt; and made the same error.&amp;lt;br&amp;gt;
Does this bug require a long time to generate a key that triggers the bug? No , the example above generates a real key and signature, but it can just be garbage as the overflow happens before the signature check. A few kilobytes of A ’s works just fine.&amp;lt;br&amp;gt;
Does reaching the vulnerable code require some complicated state that fuzzers and static analyzers would have difficulty synthesizing, like hashes or checksums? No , it has to be well-formed DER, that’s about it.&amp;lt;br&amp;gt;
Is this an uncommon code path? No , Firefox does not use this code path for RSA-PSS signatures, but the default entrypoint for certificate verification in NSS, CERT_VerifyCertificate(), is vulnerable.&amp;lt;br&amp;gt;
Is it specific to the RSA-PSS algorithm? No , it also affects DSA signatures.&amp;lt;br&amp;gt;
Is it unexploitable, or otherwise limited impact? No , the hashobj member can be clobbered. That object contains &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/mozilla-central/rev/41a8c58186206985c0d70d3d460c04ac844d11d0/security/nss/lib/util/hasht.h#45&amp;#34;&amp;gt;function pointers&amp;lt;/a&amp;gt; , which are used immediately.&amp;lt;br&amp;gt;
This wasn’t a process failure, the vendor did everything right . Mozilla has a mature, world-class security team. They pioneered &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.mozilla.org/en-US/security/bug-bounty/&amp;#34;&amp;gt;bug bounties&amp;lt;/a&amp;gt; , invest in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://research.mozilla.org/rust/&amp;#34;&amp;gt;memory safety&amp;lt;/a&amp;gt; , fuzzing and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://coverage.moz.tools/&amp;#34;&amp;gt;test coverage&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
NSS was one of the very first projects included with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/oss-fuzz/&amp;#34;&amp;gt;oss-fuzz&amp;lt;/a&amp;gt; , it was officially supported since at least &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz/commit/3d325bf20f0b09961b6c7de34aa4da0d16cfa67d&amp;#34;&amp;gt;October 2014&amp;lt;/a&amp;gt; . Mozilla also fuzz NSS themselves with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://llvm.org/docs/LibFuzzer.html&amp;#34;&amp;gt;libFuzzer&amp;lt;/a&amp;gt; , and have contributed their own &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/mozilla-central/source/security/nss/fuzz/asn1_mutators.cc&amp;#34;&amp;gt;mutator&amp;lt;/a&amp;gt; collection and distilled &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/mozilla/nss-fuzzing-corpus&amp;#34;&amp;gt;coverage corpus&amp;lt;/a&amp;gt; . There is an extensive testsuite, and nightly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://firefox-source-docs.mozilla.org/tools/sanitizer/asan.html&amp;#34;&amp;gt;ASAN&amp;lt;/a&amp;gt; builds.&amp;lt;br&amp;gt;
I&amp;amp;#39;m generally skeptical of static analysis, but this seems like a simple missing bounds check that should be easy to find. Coverity has been monitoring NSS since at least &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://scan.coverity.com/projects/nss&amp;#34;&amp;gt;December 2008&amp;lt;/a&amp;gt; , and also appears to have failed to discover this.&amp;lt;br&amp;gt;
Until 2015, Google Chrome &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromium.googlesource.com/chromium/third_party/nss/&#43;/refs/heads/master/README.chromium&amp;#34;&amp;gt;used&amp;lt;/a&amp;gt; NSS, and maintained their own testsuite and fuzzing infrastructure independent of Mozilla. Today, Chrome platforms use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boringssl.googlesource.com/boringssl/&amp;#34;&amp;gt;BoringSSL&amp;lt;/a&amp;gt; , but the NSS port is still maintained.&amp;lt;br&amp;gt;
Did Mozilla have good test coverage for the vulnerable areas? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://coverage.moz.tools/#revision=latest&amp;amp;path=security%2Fnss%2Flib%2Fcryptohi%2Fsecvfy.c&amp;amp;suite=gtest&amp;amp;view=file&amp;amp;line=201&amp;#34;&amp;gt;YES&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Did Mozilla/chrome/oss-fuzz have relevant inputs in their fuzz corpus? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://storage.googleapis.com/oss-fuzz-coverage/nss/reports/20211027/linux/src/nss/lib/cryptohi/secvfy.c.html#L201&amp;#34;&amp;gt;YES&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Is there a mutator capable of extending ASN1_ITEM s? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codereview.chromium.org/1677803002/patch/180001/190008&amp;#34;&amp;gt;YES&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Is this an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/sanitizers/wiki/AddressSanitizerIntraObjectOverflow&amp;#34;&amp;gt;intra-object overflow&amp;lt;/a&amp;gt; , or other form of corruption that ASAN would have difficulty detecting? NO, it&amp;amp;#39;s a textbook buffer overflow that ASAN can easily detect.&amp;lt;br&amp;gt;
How did I find the bug?&amp;lt;br&amp;gt;
I&amp;amp;#39;ve been experimenting with alternative methods for measuring code coverage, to see if any have any practical use in fuzzing. The fuzzer that discovered this vulnerability used a combination of two approaches, stack coverage and object isolation.&amp;lt;br&amp;gt;
Stack Coverage&amp;lt;br&amp;gt;
The most common method of measuring code coverage is block coverage, or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://clang.llvm.org/docs/SanitizerCoverage.html#edge-coverage&amp;#34;&amp;gt;edge coverage&amp;lt;/a&amp;gt; when source code is available. I’ve been curious if that is always sufficient. For example, consider a simple dispatch table with a combination of trusted and untrusted parameters, as in Fig 4 .&amp;lt;br&amp;gt;
#include &amp;amp;lt;stdio.h&amp;amp;gt;&amp;lt;br&amp;gt;
#include &amp;amp;lt;limits.h&amp;amp;gt;&amp;lt;br&amp;gt;
static char buf [ 128 ] ;&amp;lt;br&amp;gt;
void cmd_handler_foo ( int a , size_t b ) { memset ( buf , a , b ) ; }&amp;lt;br&amp;gt;
void cmd_handler_bar ( int a , size_t b ) { cmd_handler_foo ( &amp;amp;#39;A&amp;amp;#39; , sizeof buf ) ; }&amp;lt;br&amp;gt;
void cmd_handler_baz ( int a , size_t b ) { cmd_handler_bar ( a , sizeof buf ) ; }&amp;lt;br&amp;gt;
typedef void ( * dispatch_t )( int , size_t ) ;&amp;lt;br&amp;gt;
dispatch_t handlers [ UCHAR_MAX ] = {&amp;lt;br&amp;gt;
cmd_handler_foo ,&amp;lt;br&amp;gt;
cmd_handler_bar ,&amp;lt;br&amp;gt;
cmd_handler_baz ,&amp;lt;br&amp;gt;
} ;&amp;lt;br&amp;gt;
int main ( int argc , char ** argv )&amp;lt;br&amp;gt;
int cmd ;&amp;lt;br&amp;gt;
while (( cmd = getchar ()) != EOF ) {&amp;lt;br&amp;gt;
if ( handlers [ cmd ]) {&amp;lt;br&amp;gt;
handlers [ cmd ]( getchar () , getchar ()) ;&amp;lt;br&amp;gt;
Fig 4. The coverage of command bar is a superset of command foo , so an input containing the latter would be discarded during corpus minimization. There is a vulnerability unreachable via command bar that might never be discovered. Stack coverage would correctly keep both inputs. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com#ftnt1&amp;#34;&amp;gt;[1]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
To solve this problem, I’ve been experimenting with monitoring the call stack during execution.&amp;lt;br&amp;gt;
The naive implementation is too slow to be practical, but after a lot of optimization I had come up with a library that was fast enough to be integrated into coverage-guided fuzzing, and was testing how it performed with NSS and other libraries.&amp;lt;br&amp;gt;
Object Isolation&amp;lt;br&amp;gt;
Many data types are constructed from smaller records. PNG files are made of chunks, PDF files are made of streams, ELF files are made of sections, and X.509 certificates are made of ASN.1 TLV items. If a fuzzer has some understanding of the underlying format, it can isolate these records and extract the one(s) causing some new stack trace to be found.&amp;lt;br&amp;gt;
The fuzzer I was using is able to isolate and extract interesting new ASN.1 OIDs, SEQUENCEs, INTEGERs, and so on. Once extracted, it can then randomly combine or insert them into template data. This isn’t really a new idea, but is a new implementation. I&amp;amp;#39;m planning to open source this code in the future.&amp;lt;br&amp;gt;
Do these approaches work?&amp;lt;br&amp;gt;
I wish that I could say that discovering this bug validates my ideas, but I’m not sure it does. I was doing some moderately novel fuzzing, but I see no reason this bug couldn’t have been found earlier with even rudimentary fuzzing techniques.&amp;lt;br&amp;gt;
Lessons Learned&amp;lt;br&amp;gt;
How did extensive, customized fuzzing with impressive coverage metrics fail to discover this bug?&amp;lt;br&amp;gt;
What went wrong&amp;lt;br&amp;gt;
Issue #1 Missing end-to-end testing .&amp;lt;br&amp;gt;
NSS is a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_API_Guidelines&amp;#34;&amp;gt;modular&amp;lt;/a&amp;gt; library. This layered design is reflected in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/nss/source/fuzz/&amp;#34;&amp;gt;fuzzing&amp;lt;/a&amp;gt; approach, as each component is fuzzed independently. For example, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_Tech_Notes/nss_tech_note1#how_to_use_the_nss_asn.1_and_quickder_decoders&amp;#34;&amp;gt;QuickDER&amp;lt;/a&amp;gt; decoder is tested &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/nss/source/fuzz/quickder_target.cc&amp;#34;&amp;gt;extensively&amp;lt;/a&amp;gt; , but the fuzzer simply &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://searchfox.org/nss/rev/5f2fa238b58c9158a52c0681ca2a67958a353082/fuzz/quickder_target.cc#72&amp;#34;&amp;gt;creates and discards&amp;lt;/a&amp;gt; objects and never uses them.&amp;lt;br&amp;gt;
extern &amp;amp;#34;C&amp;amp;#34; int LLVMFuzzerTestOneInput( const uint8_t *Data, size_t Size) {&amp;lt;br&amp;gt;
char *dest[2048];&amp;lt;br&amp;gt;
for ( auto tpl : templates) {&amp;lt;br&amp;gt;
PORTCheapArenaPool pool;&amp;lt;br&amp;gt;
SECItem buf = {siBuffer, const_cast &amp;amp;lt; unsigned char *&amp;amp;gt;(Data),&amp;lt;br&amp;gt;
static_cast &amp;amp;lt; unsigned int &amp;amp;gt;(Size)};&amp;lt;br&amp;gt;
PORT_InitCheapArena(&amp;amp;amp;pool, DER_DEFAULT_CHUNKSIZE);&amp;lt;br&amp;gt;
( void )SEC_QuickDERDecodeItem(&amp;amp;amp;pool.arena, dest, tpl, &amp;amp;amp;buf);&amp;lt;br&amp;gt;
PORT_DestroyCheapArena(&amp;amp;amp;pool);&amp;lt;br&amp;gt;
Fig 5. The QuickDER fuzzer simply creates and discards objects. This verifies the ASN.1 parsing, but not whether other components handle the resulting objects correctly.&amp;lt;br&amp;gt;
This fuzzer might have produced a SECKEYPublicKey that could have reached the vulnerable code, but as the result was never used to verify …</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211201-041518/</link>
      <pubDate>Wed, 01 Dec 2021 04:15:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211201-041518/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/29/Hug-A-Tree&amp;#34;&amp;gt;CL XLII: Picture Hugs&amp;lt;/a&amp;gt; · Out on a walk with Lauren, we stopped in a park and I noticed she was holding an evergreen branch with one hand, stroking it     with the other. “Sometimes, you just got to hug a tree” she said. No lie. Especially when times are shitty. I can’t put you next     to a tree but at least I can take you out in the woods photographically. It’s dark now and we can use all the help     we can get &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/29/Hug-A-Tree&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211130-202001/</link>
      <pubDate>Tue, 30 Nov 2021 20:20:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211130-202001/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/30/technology/david-marcus-facebook-libra-diem-novi.html&amp;#34;&amp;gt;The head of Meta’s cryptocurrency efforts is leaving the company. David Marcus had most recently spearheaded Meta’s push into a global digital currency. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211130-162102/</link>
      <pubDate>Tue, 30 Nov 2021 16:21:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211130-162102/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/11/hacks-decoded-seyi-akiwowo-founder-of-glitch/&amp;#34;&amp;gt;Hacks Decoded: Seyi Akiwowo, Founder of Glitch →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/11/hacks-decoded-seyi-akiwowo-founder-of-glitch/&amp;#34;&amp;gt;Hacks Decoded: Seyi Akiwowo, Founder of Glitch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Seyi Akiwowo’s reputation precedes her. Akiwowo is the founder of Glitch, an organization that seeks to end online abuse. We spoke with Seyi over video chat to learn about what drives her, why she does what she does and what she’d be doing if not battling trolls online for a living.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20211130-160902/</link>
      <pubDate>Tue, 30 Nov 2021 16:09:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20211130-160902/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/better-sentences/&amp;#34;&amp;gt;How to write better sentences: 6 examples&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211130-082537/</link>
      <pubDate>Tue, 30 Nov 2021 08:25:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211130-082537/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eff.org/r.wj15&amp;#34;&amp;gt;Power Up Your Donation Week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211130-082535/</link>
      <pubDate>Tue, 30 Nov 2021 08:25:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211130-082535/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eff.org/r.wj15&amp;#34;&amp;gt;Power Up Your Donation Week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20211130-041219/</link>
      <pubDate>Tue, 30 Nov 2021 04:12:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20211130-041219/</guid>
      <description>Slides for my YOW! talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2021-computing-performance&amp;#34;&amp;gt;Computing Performance 2021: What&amp;#39;s on the Horizon&amp;lt;/a&amp;gt; , covering processors, memory, disks, networking, hypervisors, and more ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2021-computing-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/YOW2021_ComputingPerformance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211130-002220/</link>
      <pubDate>Tue, 30 Nov 2021 00:22:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211130-002220/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/29/technology/parag-agrawal-twitter.html&amp;#34;&amp;gt;Who Is Parag Agrawal, Twitter’s New C.E.O.? A longtime Twitter insider and a confidant of co-founder Jack Dorsey, Mr. Agrawal takes over as the social media company confronts various challenges. By Mike Isaac, Kate Conger and Cade Metz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211130-001603/</link>
      <pubDate>Tue, 30 Nov 2021 00:16:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211130-001603/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/27/Overtorqued&amp;#34;&amp;gt;Overtorqued&amp;lt;/a&amp;gt; · I don’t write much about really personal stuff, but in recent years there have been mild-to-serious mental-health issues affecting     my immediate and extended family.  As a consequence I have uneducated ideas about evolution and mental health to offer.  And     with them, for comfort, photographs of a beautiful garden &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/27/Overtorqued&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211130-001341/</link>
      <pubDate>Tue, 30 Nov 2021 00:13:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211130-001341/</guid>
      <description>I&amp;#39;m discussing “Unfettered Conversation with Ken Griffin, CEO of Citadel” with @bhorowitz, @arampell, and a16z. Wednesday, Dec 1 at 5:00 PM PST in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Dd3yI7BKA8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Dd3yI7BKA8&amp;#34;&amp;gt;https://t.co/Dd3yI7BKA8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211130-000831/</link>
      <pubDate>Tue, 30 Nov 2021 00:08:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211130-000831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/zone-of-action-do-the-possible-to-do-the-impossible&amp;#34;&amp;gt;Zone of Action: Do the possible to do the impossible&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211129-202032/</link>
      <pubDate>Mon, 29 Nov 2021 20:20:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211129-202032/</guid>
      <description>The DART mission has launched. Next up, it will try out a manoeuvre that could one day deflect killer asteroids from Earth.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211129-201030/</link>
      <pubDate>Mon, 29 Nov 2021 20:10:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211129-201030/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/aed-locator-customer-story/&amp;#34;&amp;gt;William Fahy, a full-time paramedic, noticed that a lot of people struggled to remember and find nearby defibrillators when they needed one most. So he built a Retool app to fix the problem across Ireland.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211128-041813/</link>
      <pubDate>Sun, 28 Nov 2021 04:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211128-041813/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/09/Climate-Crisis-Resistance&amp;#34;&amp;gt;Blah, Blah, Blah, Boom&amp;lt;/a&amp;gt; · COP26 is winding down, and I think nobody can seriously disagree with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ndtv.com/world-news/greta-thunberg-on-un-climate-summit-cop26-blah-blah-blah-2610076&amp;#34;&amp;gt;Greta Thunberg’s     take&amp;lt;/a&amp;gt; : “Blah, blah, blah.” And then she continued “The real work continues outside these halls. And we will never give up,     ever.” I wonder:      What form does that “real work” take?  Well, I just finished reading &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.versobooks.com/books/3665-how-to-blow-up-a-pipeline&amp;#34;&amp;gt;How to Blow Up a Pipeline&amp;lt;/a&amp;gt; by Andreas Malm, which doesn’t include instructions for blowing up pipelines but argues that that Real Work should include     infrastructure destruction.  It’s a good book, and if you (like me) are horrified at the onrushing     climate catastrophe and enraged at our leaders’ incapacity and unwillingness to take actions that might seriously mitigate the     devastation, you might want to read it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/11/09/Climate-Crisis-Resistance&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [7 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211127-122323/</link>
      <pubDate>Sat, 27 Nov 2021 12:23:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211127-122323/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/11/27/espanol/telescopio-hubble.html&amp;#34;&amp;gt;Out There ¿Quieres saber cómo está el clima en otros planetas? El telescopio Hubble te lo informa El ojo previsor de la nave espacial vuelve a posar su mirada en Júpiter, Saturno, Urano y Neptuno. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211127-080801/</link>
      <pubDate>Sat, 27 Nov 2021 08:08:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211127-080801/</guid>
      <description>“If such an attack were successful, it would result in customer IP address blocks being filtered and dropped, making them unreachable from some or all of the global Internet,” Korab said&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211127-042339/</link>
      <pubDate>Sat, 27 Nov 2021 04:23:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211127-042339/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/02/23/what-would-dijkstra-do-proving-the-associativity-of-min/&amp;#34;&amp;gt;What would Dijkstra do? Proving the associativity of min&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211127-041718/</link>
      <pubDate>Sat, 27 Nov 2021 04:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211127-041718/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#image-processing&amp;#34;&amp;gt;image-processing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pretty-pictures&amp;#34;&amp;gt;pretty-pictures&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Via that same &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news.ycombinator.com/item?id=29185167&amp;#34;&amp;gt;Hacker News&amp;lt;/a&amp;gt; piece
that generated &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/11/13/pixel-rotation/&amp;#34;&amp;gt;“Image rotation by shifting pixels”&amp;lt;/a&amp;gt; (2021-11-13):
Any angular rotation can be expressed as the sum of three shear transformations.
Shear right, then down, then right again; the result is an angular rotation!&amp;lt;br&amp;gt;
At CppCon this year, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cpp.chat/guests/ben_deane/&amp;#34;&amp;gt;Ben Deane&amp;lt;/a&amp;gt; ’s
nametag featured a cryptic crossword clue: Bird chewing a pencil (7). That got us talking about crosswords, which reminded me that a few
months earlier I’d learned of Vermont poet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.hollypainter.com/&amp;#34;&amp;gt;Holly Painter&amp;lt;/a&amp;gt; ,
who has a book coming out next year titled At last, we listen closely:
cryptic crossword poems . The publisher’s blurb &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.hollypainter.com/at-last-we-listen-closely-cryptic-crossword-poems/&amp;#34;&amp;gt;explains:&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211127-000811/</link>
      <pubDate>Sat, 27 Nov 2021 00:08:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211127-000811/</guid>
      <description>All except &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Level_3_Communications&amp;#34;&amp;gt;Level 3 Communications&amp;lt;/a&amp;gt; , a major Internet backbone provider acquired by Lumen/CenturyLink.&amp;lt;br&amp;gt;
“LEVEL 3 is the last IRR operator which allows the use of this method, although they have discouraged its use since at least 2012,” Korab told KrebsOnSecurity. “Other IRR operators have fully deprecated MAIL-FROM.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211126-200806/</link>
      <pubDate>Fri, 26 Nov 2021 20:08:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211126-200806/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/black-friday&amp;#34;&amp;gt;Black Friday! A limited offer for you&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211126-200746/</link>
      <pubDate>Fri, 26 Nov 2021 20:07:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211126-200746/</guid>
      <description>A visualization of the Internet made using network routing data. Image: Barrett Lyon, opte.org.&amp;lt;br&amp;gt;
Imagine being able to disconnect or redirect Internet traffic destined for some of the world’s biggest companies — just by spoofing an email. This is the nature of a threat vector recently removed by a Fortune 500 firm that operates one of the largest Internet backbones.&amp;lt;br&amp;gt;
Based in Monroe, La., Lumen Technologies Inc. [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/finance/quote/LUMN:NYSE&amp;#34;&amp;gt;NYSE: LUMN&amp;lt;/a&amp;gt; ] (formerly CenturyLink ) is one of more than two dozen entities that operate what’s known as an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.irr.net/docs/list.html&amp;#34;&amp;gt;Internet Routing Registry&amp;lt;/a&amp;gt; (IRR). These IRRs maintain routing databases used by network operators to register their assigned network resources — i.e., the Internet addresses that have been allocated to their organization.&amp;lt;br&amp;gt;
The data maintained by the IRRs help keep track of which organizations have the right to access what Internet address space in the global routing system. Collectively, the information voluntarily submitted to the IRRs forms a distributed database of Internet routing instructions that helps connect a vast array of individual networks.&amp;lt;br&amp;gt;
There are about 70,000 distinct networks on the Internet today, ranging from huge broadband providers like AT&amp;amp;amp;T , Comcast and Verizon to many thousands of enterprises that connect to the edge of the Internet for access. Each of these so-called “Autonomous Systems” (ASes) make their own decisions about how and with whom they will connect to the larger Internet.&amp;lt;br&amp;gt;
Regardless of how they get online, each AS uses the same language to specify which Internet IP address ranges they control: It’s called the Border Gateway Protocol , or BGP. Using BGP, an AS tells its directly connected neighbor AS(es) the addresses that it can reach. That neighbor in turn passes the information on to its neighbors, and so on, until the information has propagated everywhere [1].&amp;lt;br&amp;gt;
A key function of the BGP data maintained by IRRs is preventing rogue network operators from claiming another network’s addresses and hijacking their traffic. In essence, an organization can use IRRs to declare to the rest of the Internet, “These specific Internet address ranges are ours, should only originate from our network, and you should ignore any other networks trying to lay claim to these address ranges.”&amp;lt;br&amp;gt;
In the early days of the Internet, when organizations wanted to update their records with an IRR, the changes usually involved some amount of human interaction — often someone manually editing the new coordinates into an Internet backbone router. But over the years the various IRRs made it easier to automate this process via email.&amp;lt;br&amp;gt;
For a long time, any changes to an organization’s routing information with an IRR could be processed via email as long as one of the following authentication methods was successfully used:&amp;lt;br&amp;gt;
-CRYPT-PW: A password is added to the text of an email to the IRR containing the record they wish to add, change or delete (the IRR then compares that password to a hash of the password);&amp;lt;br&amp;gt;
-PGPKEY: The requestor signs the email containing the update with an encryption key the IRR recognizes;&amp;lt;br&amp;gt;
-MAIL-FROM: The requestor sends the record changes in an email to the IRR, and the authentication is based solely on the “From:” header of the email.&amp;lt;br&amp;gt;
Of these, MAIL-FROM has long been considered insecure, for the simple reason that it’s not difficult to spoof the return address of an email. And virtually all IRRs have disallowed its use since at least 2012, said Adam Korab , a network engineer and security researcher based in Houston.&amp;lt;br&amp;gt;
All except Level3 , a major Internet backbone provider acquired by Lumen/CenturyLink.&amp;lt;br&amp;gt;
“LEVEL3 is the last IRR operator which allows the use of this method, although they have discouraged its use since at least 2012,” Korab told KrebsOnSecurity. “Other IRR operators have fully deprecated MAIL-FROM.”&amp;lt;br&amp;gt;
Importantly, the name and email address of each Autonomous System’s official contact for making updates with the IRRs is public information.&amp;lt;br&amp;gt;
Korab filed a vulnerability report with Lumen demonstrating how a simple spoofed email could be used to disrupt Internet service for banks, telecommunications firms and even government entities.&amp;lt;br&amp;gt;
“If such an attack were successful, it would result in customer IP address blocks being filtered and dropped, making them unreachable from some or all of the global Internet,” Korab said , noting that he found more than 2,000 Lumen customers were potentially affected. “This would effectively cut off Internet access for the impacted IP address blocks.”&amp;lt;br&amp;gt;
The recent outage that took Facebook , Instagram and WhatsApp offline for the better part of a day was caused by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/what-happened-to-facebook-instagram-whatsapp/&amp;#34;&amp;gt;an erroneous BGP update submitted by Facebook&amp;lt;/a&amp;gt; . That update took away the map telling the world’s computers how to find its various online properties.&amp;lt;br&amp;gt;
Now consider the mayhem that would ensue if someone spoofed IRR updates to remove or alter routing entries for multiple e-commerce providers, banks and telecommunications companies at the same time.&amp;lt;br&amp;gt;
“Depending on the scope of an attack, this could impact individual customers, geographic market areas, or potentially the [Lumen] backbone,” Korab continued. “This attack is trivial to exploit, and has a difficult recovery. Our conjecture is that any impacted Lumen or customer IP address blocks would be offline for 24-48 hours. In the worst-case scenario, this could extend much longer.”&amp;lt;br&amp;gt;
Lumen told KrebsOnSecurity that it continued offering MAIL-FROM: authentication because many of its customers still relied on it due to legacy systems. Nevertheless, after receiving Korab’s report the company decided the wisest course of action was to disable MAIL-FROM: authentication altogether.&amp;lt;br&amp;gt;
“We recently received notice of a known insecure configuration with our Route Registry,” reads a statement Lumen shared with KrebsOnSecurity. “We already had mitigating controls in place and to date we have not identified any additional issues. As part of our normal cybersecurity protocol, we carefully considered this notice and took steps to further mitigate any potential risks the vulnerability may have created for our customers or systems.”&amp;lt;br&amp;gt;
Level3, now part of Lumen, has long urged customers to avoid using “Mail From” for authentication, but until very recently they still allowed it.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/the-internet-is-held-together-with-spit-baling-wire/&amp;#34;&amp;gt;The Internet is Held Together With Spit &amp;amp;amp; Baling Wire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211126-162227/</link>
      <pubDate>Fri, 26 Nov 2021 16:22:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211126-162227/</guid>
      <description>November 26, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/11/26/postmarketos.html&amp;#34;&amp;gt;postmarketOS revolutionizes smartphone hacking&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211126-160827/</link>
      <pubDate>Fri, 26 Nov 2021 16:08:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211126-160827/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/black-friday&amp;#34;&amp;gt;Black Friday is here! A limited offer for you&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211125-120820/</link>
      <pubDate>Thu, 25 Nov 2021 12:08:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211125-120820/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211125-001950/</link>
      <pubDate>Thu, 25 Nov 2021 00:19:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211125-001950/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Five Ways China Is Trying To Unaddict Kids From Social Media&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/five-ways-china-is-trying-to-unaddict&amp;#34;&amp;gt;Blackout hours, educational content, time limits, and interspersed pauses. This is how China is attempting to mitigate social media addiction, especially among kids.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;A Xiaomi Phone Might’ve Shipped With A Censorship List In Europe. Now What?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;European researchers say they found hundreds of terms the phone could block, including “Tiananmen” and “Hong Kong Independence.” There’s no playbook fo…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211125-001905/</link>
      <pubDate>Thu, 25 Nov 2021 00:19:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211125-001905/</guid>
      <description>DART mission aims to try out a strategy for shielding Earth from killer asteroids.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211125-001033/</link>
      <pubDate>Thu, 25 Nov 2021 00:10:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211125-001033/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-makes-a-great-admin-portal/&amp;#34;&amp;gt;In this article, you’ll learn what admin portals are, why you need them, and, most importantly, what aspects make a good admin portal.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211124-201921/</link>
      <pubDate>Wed, 24 Nov 2021 20:19:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211124-201921/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/24/technology/adam-mosseri-instagram-congress.html&amp;#34;&amp;gt;The head of Instagram agrees to testify as Congress probes the app’s effects on young people. This will be the first time Adam Mosseri, a trusted lieutenant to Mark Zuckerberg, will appear before lawmakers under oath. By Ryan Mac and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211124-122226/</link>
      <pubDate>Wed, 24 Nov 2021 12:22:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211124-122226/</guid>
      <description>November 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/11/24/A-philosophy-for-instant-messaging.html&amp;#34;&amp;gt;My philosophy for productive instant messaging&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211123-202418/</link>
      <pubDate>Tue, 23 Nov 2021 20:24:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211123-202418/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/11/podcast-episode-revolution-will-be-open-source&amp;#34;&amp;gt;Revolution will be open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211123-202415/</link>
      <pubDate>Tue, 23 Nov 2021 20:24:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211123-202415/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/11/podcast-episode-revolution-will-be-open-source&amp;#34;&amp;gt;Revolution will be open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211123-202134/</link>
      <pubDate>Tue, 23 Nov 2021 20:21:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211123-202134/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2015/07/10/the-species-of-bracelets/&amp;#34;&amp;gt;The Species of Bracelets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211123-161644/</link>
      <pubDate>Tue, 23 Nov 2021 16:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211123-161644/</guid>
      <description>mt19937&amp;lt;br&amp;gt;
; introducing&amp;lt;br&amp;gt;
xoshiro256ss&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pearls&amp;#34;&amp;gt;pearls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#random-numbers&amp;#34;&amp;gt;random-numbers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
TLDR:&amp;lt;br&amp;gt;
std::mt19937&amp;lt;br&amp;gt;
is half the speed of a good PRNG (and 500 times slower to seed,
for what that’s worth).
These days I copy-and-paste &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/Quuxplusone/Xoshiro256ss&amp;#34;&amp;gt;xoshiro256ss.h&amp;lt;/a&amp;gt; when I need random numbers for a project.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211123-122104/</link>
      <pubDate>Tue, 23 Nov 2021 12:21:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211123-122104/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/23/science/hubble-telescope-jupiter-saturn-uranus-neptune.html&amp;#34;&amp;gt;Out There The Hubble Telescope Checks In With the Most Distant Planets The spacecraft’s farseeing eye once again sets its gaze on Jupiter, Saturn, Uranus and Neptune. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211123-041731/</link>
      <pubDate>Tue, 23 Nov 2021 04:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211123-041731/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-020-03485-w&amp;#34;&amp;gt;Meet Joe Biden&amp;#39;s 2021 science team: a guide&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
As the US president announced his advisers and agency heads after taking office, Nature tracked the appointees who matter most to science.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211123-040655/</link>
      <pubDate>Tue, 23 Nov 2021 04:06:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211123-040655/</guid>
      <description>On Friday, Nigerian police arrested Medayedupin. The investigator says formal charges will be levied against the defendant sometime this week.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211123-001011/</link>
      <pubDate>Tue, 23 Nov 2021 00:10:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211123-001011/</guid>
      <description>&amp;lt;p&amp;gt;function loadScript(url) {
return new Promise(function (resolve) {
var script = document.createElement(&amp;amp;quot;script&amp;amp;quot;);
script.type = &amp;amp;quot;text/javascript&amp;amp;quot;;
script.onload = function () {
resolve();
};
script.src = url;
document.getElementsByTagName(&amp;amp;quot;head&amp;amp;quot;)[0].appendChild(script);
});
}&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;async function loadNotifier() {
ko.$(&amp;amp;quot;head&amp;amp;quot;).append(`&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;`);&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;await loadScript(
&amp;amp;quot;https://cdnjs.cloudflare.com/ajax/libs/awesome-notifications/3.1.0/modern.var.js&amp;amp;quot;
);&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;return new AWN({
position: &amp;amp;quot;top-right&amp;amp;quot;,
});
}&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;ko.ready(async function () {
let notificationShown = false;
const notifier = await loadNotifier();&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;ko.$(&amp;amp;quot;nav&amp;amp;quot;).on(&amp;amp;quot;click&amp;amp;quot;, (e) =&amp;amp;gt; {
const onPricing = ko.page.viewing(&amp;amp;quot;/pricing/&amp;amp;quot;);
const lookedAtSelfHosted = ko.e.performed(&amp;amp;quot;SSOP Toggle Flipped On&amp;amp;quot;);&amp;lt;/p&amp;gt;
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;if (notificationShown) {
  return;
}

if (onPricing &amp;amp;amp;amp;&amp;amp;amp;amp; lookedAtSelfHosted) {
  e.preventDefault();
  notificationShown = true;

  notifier.modal(`&amp;amp;lt;br&amp;amp;gt;
&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;👋  Before you go&amp;lt;br&amp;gt;
Curious how self-hosting Retool works? Book a demo and we&amp;#39;ll show you how to get started.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog&amp;#34;&amp;gt;Book a demo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
`);
    }
  });
});&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211123-000734/</link>
      <pubDate>Tue, 23 Nov 2021 00:07:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211123-000734/</guid>
      <description>In August, KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/wanted-disgruntled-employees-to-deploy-ransomware/&amp;#34;&amp;gt;warned&amp;lt;/a&amp;gt; that scammers were contacting people and asking them to unleash ransomware inside their employer’s network, in exchange for a percentage of any ransom amount paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme — a young man who said he was trying to save up money to help fund a new social network.&amp;lt;br&amp;gt;
The brazen approach targeting disgruntled employees was first spotted by threat intelligence firm Abnormal Security , which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://abnormalsecurity.com/blog/nigerian-ransomware-soliciting-employees-demonware/&amp;#34;&amp;gt;described&amp;lt;/a&amp;gt; what happened after they adopted a fake persona and responded to the proposal in the screenshot above.&amp;lt;br&amp;gt;
“According to this actor, he had originally intended to send his targets—all senior-level executives—phishing emails to compromise their accounts, but after that was unsuccessful, he pivoted to this ransomware pretext,” Abnormal’s Crane Hassold wrote.&amp;lt;br&amp;gt;
Abnormal Security documented how it tied the email back to a Nigerian man who acknowledged he was trying to save up money to help fund a new social network he is building called Sociogram . In June 2021, the Nigerian government officially &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/world/2021/06/04/nigeria-suspends-twitter-buhari/&amp;#34;&amp;gt;placed an indefinite ban on Twitter&amp;lt;/a&amp;gt; , restricting it from operating in Nigeria after the social media platform deleted tweets by the Nigerian president.&amp;lt;br&amp;gt;
After he deleted his LinkedIn profile, I received the following message through the “contact this domain holder” link at KrebsOnSecurity’s domain registrar [curiously, the date of that missive reads “Dec. 31, 1969.”]. Apparently, Mr. Krebson is a clout-chasing monger.&amp;lt;br&amp;gt;
A love letter from the founder of the ill-fated Sociogram.&amp;lt;br&amp;gt;
Mr. Krebson also heard from an investigator representing the Nigeria Finance CERT on behalf of the Central Bank Of Nigeria. While the Sociogram founder’s approach might seem amateurish to some, the financial community in Nigeria did not consider it a laughing matter.&amp;lt;br&amp;gt;
On Friday, police in Lagos arrested Medayedupin. The investigator says formal charges will be levied against the defendant sometime this week.&amp;lt;br&amp;gt;
The petition for arrest.&amp;lt;br&amp;gt;
Medayedupin being booked.&amp;lt;br&amp;gt;
Seized laptop.&amp;lt;br&amp;gt;
KrebsOnSecurity spoke with a fraud investigator who is performing the forensic analysis of the devices seized from Medayedupin’s home. The investigator spoke on condition of anonymity out of concern for his physical safety.&amp;lt;br&amp;gt;
The investigator — we’ll call him “George” — said the 23-year-old Medayedupin lives with his extended family in an extremely impoverished home, and that the young man told investigators he’d just graduated from college but turned to cybercrime at first with ambitions of merely scamming the scammers.&amp;lt;br&amp;gt;
George’s team confirmed that Medayedupin had around USD $2,000 to his name, which he’d recently stolen from a group of Nigerian fraudsters who were scamming people for gift cards. Apparently, he admitted to creating a phishing website that tricked a member of this group into providing access to the money they’d made from their scams.&amp;lt;br&amp;gt;
Medayedupin reportedly told investigators that for almost a week after he started emailing his ransom-your-employer scheme, nobody took him up on the offer. But after his name appeared in the news media, he received thousands of inquiries from people interested in his idea . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/arrest-in-ransom-your-employer-email-scheme/#more-57657&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/arrest-in-ransom-your-employer-email-scheme/&amp;#34;&amp;gt;Arrest in ‘Ransom Your Employer’ Email Scheme&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211122-120955/</link>
      <pubDate>Mon, 22 Nov 2021 12:09:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211122-120955/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/pepper-content-customer-story/&amp;#34;&amp;gt;Rohit, Pepper Content&amp;#39;s Head of Product, replaced a homegrown operations portal with Retool to support the growth of creators.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211122-001654/</link>
      <pubDate>Mon, 22 Nov 2021 00:16:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211122-001654/</guid>
      <description>path&amp;lt;br&amp;gt;
convertible to&amp;lt;br&amp;gt;
string_view&amp;lt;br&amp;gt;
?: a war story&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#overload-resolution&amp;#34;&amp;gt;overload-resolution&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#template-metaprogramming&amp;#34;&amp;gt;template-metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#war-stories&amp;#34;&amp;gt;war-stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
This story comes from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://reviews.llvm.org/D113161&amp;#34;&amp;gt;the libc&#43;&#43; review&amp;lt;/a&amp;gt; implementing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2021/p1989r2.pdf&amp;#34;&amp;gt;P1989 “Range constructor for std::string_view 2: Constrain Harder”&amp;lt;/a&amp;gt; (Corentin Jabot, March 2021). That paper made&amp;lt;br&amp;gt;
implicitly convertible-from basically any contiguous range of characters.
Which, to be clear, is probably a good thing. But it turned up a really
interesting interaction in libc&#43;&#43;’s&amp;lt;br&amp;gt;
filesystem::path&amp;lt;br&amp;gt;
. Somehow,
enabling this constructor template in the&amp;lt;br&amp;gt;
&amp;amp;lt;string_view&amp;amp;gt;&amp;lt;br&amp;gt;
header
caused libc&#43;&#43;’s&amp;lt;br&amp;gt;
to stop being a&amp;lt;br&amp;gt;
range&amp;lt;br&amp;gt;
!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211121-201759/</link>
      <pubDate>Sun, 21 Nov 2021 20:17:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211121-201759/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about?utm_source=menu-dropdown&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive?utm_source=menu-dropdown&amp;#34;&amp;gt;Archive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.substack.com/hc/en-us?s=support%2Bbigtechnology%40substack.com&amp;#34;&amp;gt;Help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211121-161754/</link>
      <pubDate>Sun, 21 Nov 2021 16:17:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211121-161754/</guid>
      <description>A newsletter about big tech and society by independent journalist Alex Kantrowitz.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211120-121942/</link>
      <pubDate>Sat, 20 Nov 2021 12:19:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211120-121942/</guid>
      <description>November 20, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/11/20/Dark-forest.gmi&amp;#34;&amp;gt;An alternative to the Dark Forest hypothesis&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211120-040705/</link>
      <pubDate>Sat, 20 Nov 2021 04:07:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211120-040705/</guid>
      <description>To “verify the identity” of the customer, the fraudster asks for their online banking username, and then tells the customer to read back a passcode sent via text or email. In reality, the fraudster initiates a transaction — such as the “forgot password” feature on the financial institution’s site — which is what generates the authentication passcode delivered to the member.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211120-001726/</link>
      <pubDate>Sat, 20 Nov 2021 00:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211120-001726/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03471-w&amp;#34;&amp;gt;NASA spacecraft will slam into asteroid in first planetary-defence test&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DART mission to try out a strategy for shielding Earth from killer asteroids.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211120-001555/</link>
      <pubDate>Sat, 20 Nov 2021 00:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211120-001555/</guid>
      <description>by value”&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#parameter-only-types&amp;#34;&amp;gt;parameter-only-types&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Several readers have responded to my recent post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/11/09/pass-string-view-by-value/&amp;#34;&amp;gt;“Three reasons to pass std::string_view by value”&amp;lt;/a&amp;gt; (2021-11-09),
pointing out that (while everything I said is true of the Itanium x86-64 ABI used on Linux and Mac) unfortunately &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/cpp/build/x64-calling-convention#parameter-passing&amp;#34;&amp;gt;Microsoft’s x86-64 ABI&amp;lt;/a&amp;gt; does not pass&amp;lt;br&amp;gt;
in registers, but instead passes it
by “hidden pointer,” so that at the machine level, you get basically the
same codegen as if you had been passing by reference all along. Except that
actually you’re passing a copy by reference, so you get one extra
16-byte copy in addition to all the other stack traffic MSVC is doing.&amp;lt;br&amp;gt;
This is a big problem baked into Microsoft’s x86-64 ABI, and
nerfs a lot of the performance benefits mentioned in my post.
However, my advice remains the same:
Even if your primary platform today is Windows, you should habitually
pass&amp;lt;br&amp;gt;
by value!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211120-000730/</link>
      <pubDate>Sat, 20 Nov 2021 00:07:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211120-000730/</guid>
      <description>One of the more common ways cybercriminals cash out access to bank accounts involves draining the victim’s funds via Zelle , a “peer-to-peer” (P2P) payment service used by many financial institutions that allows customers to quickly send cash to friends and family. Naturally, a great deal of phishing schemes that precede these bank account takeovers begin with a spoofed text message from the target’s bank warning about a suspicious Zelle transfer. What follows is a deep dive into how this increasingly clever Zelle fraud scam typically works, and what victims can do about it.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/sms-about-bank-fraud-as-a-pretext-for-voice-phishing/&amp;#34;&amp;gt;Last week’s story&amp;lt;/a&amp;gt; warned that scammers are blasting out text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text. Here’s what one of those scam messages looks like:&amp;lt;br&amp;gt;
Anyone who responds “yes,” “no” or at all will very soon after receive a phone call from a scammer pretending to be from the financial institution’s fraud department. The caller’s number will be spoofed so that it appears to be coming from the victim’s bank.&amp;lt;br&amp;gt;
To “verify the identity” of the customer, the fraudster asks for their online banking username, and then tells the customer to read back a passcode sent via text or email. In reality, the fraudster initiates a transaction — such as the “forgot password” feature on the financial institution’s site — which is what generates the 2-step authentication passcode delivered to the member.&amp;lt;br&amp;gt;
Ken Otsuka is a senior risk consultant at CUNA Mutual Group , an insurance company that provides financial services to credit unions. Otsuka said a phone fraudster typically will say something like, “Before I get into the details, I need to verify that I’m speaking to the right person. What’s your username?”&amp;lt;br&amp;gt;
“In the background, they’re using the username with the forgot password feature, and that’s going to generate one of these two-factor authentication passcodes,” Otsuka said. “Then the fraudster will say, ‘I’m going to send you the password and you’re going to read it back to me over the phone.&amp;#39;”&amp;lt;br&amp;gt;
The fraudster then uses the code to complete the password reset process, and then changes the victim’s online banking password. The fraudster then uses Zelle to transfer the victim’s funds to others.&amp;lt;br&amp;gt;
An important aspect of this scam is that the fraudsters never even need to know or phish the victim’s password . By sharing their username and reading back the one-time code sent to them via email, the victim is allowing the fraudster to reset their online banking password.&amp;lt;br&amp;gt;
Otsuka said in far too many account takeover cases, the victim has never even heard of Zelle, nor did they realize they could move money that way.&amp;lt;br&amp;gt;
“The thing is, many credit unions offer it by default as part of online banking,” Otsuka said. “Members don’t have to request to use Zelle. It’s just there, and with a lot of members targeted in these scams, although they’d legitimately enrolled in online banking, they’d never used Zelle before.” [Curious if your financial institution uses Zelle? Check out their partner list &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.zellepay.com/get-started&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; ].&amp;lt;br&amp;gt;
Otsuka said credit unions offering other peer-to-peer banking products have also been targeted, but that fraudsters prefer to target Zelle due to the speed of the payments.&amp;lt;br&amp;gt;
“The fraud losses can escalate quickly due to the sheer number of members that can be targeted on a single day over the course of consecutive days,” Otsuka said.&amp;lt;br&amp;gt;
To combat this scam Zelle introduced out-of-band authentication with transaction details. This involves sending the member a text containing the details of a Zelle transfer – payee and dollar amount – that is initiated by the member. The member must authorize the transfer by replying to the text.&amp;lt;br&amp;gt;
Unfortunately, Otsuka said, the scammers are defeating this layered security control as well. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/the-zelle-fraud-scam-how-it-works-how-to-fight-back/#more-57594&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/the-zelle-fraud-scam-how-it-works-how-to-fight-back/&amp;#34;&amp;gt;The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211119-200846/</link>
      <pubDate>Fri, 19 Nov 2021 20:08:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211119-200846/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/app-to-email-your-hackathon-participants/&amp;#34;&amp;gt;In this post, we&amp;#39;ll walk you through building an email manager that accomplishes sending a bunch of easily customizable emails—fast.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211119-120725/</link>
      <pubDate>Fri, 19 Nov 2021 12:07:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211119-120725/</guid>
      <description>In a 2020 interview, Golestan told KrebsOnSecurity that Micfo was at one point responsible for brokering roughly 40 percent of the IP addresses used by the world’s largest VPN providers. Throughout that conversation, Golestan maintained his innocence, even as he explained that the creation of the phony companies was necessary to prevent entities like Spamhaus from interfering with his business going forward.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211119-041845/</link>
      <pubDate>Fri, 19 Nov 2021 04:18:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211119-041845/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;A Xiaomi Phone Might’ve Shipped With A Censorship List In Europe. Now What?&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/a-xiaomi-phone-mightve-shipped-with&amp;#34;&amp;gt;European researchers say they found hundreds of terms the phone could block, including “Tiananmen” and “Hong Kong Independence.” There’s no playbook for what comes next.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211119-041608/</link>
      <pubDate>Fri, 19 Nov 2021 04:16:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211119-041608/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#blog-roundup&amp;#34;&amp;gt;blog-roundup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cppcon&amp;#34;&amp;gt;cppcon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#morality&amp;#34;&amp;gt;morality&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#puzzles&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#us-politics&amp;#34;&amp;gt;us-politics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
At CppCon this year, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cpp.chat/guests/ben_deane/&amp;#34;&amp;gt;Ben Deane&amp;lt;/a&amp;gt; ’s
nametag featured a cryptic crossword clue. (I don’t quite remember the
wording. “Bird damaged a pencil,” perhaps? I’m sure Twitter will tell me.)
That got us talking about crosswords, which reminded me that a few
months earlier I’d learned of Vermont poet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.hollypainter.com/&amp;#34;&amp;gt;Holly Painter&amp;lt;/a&amp;gt; ,
who has a book coming out next year titled At last, we listen closely:
cryptic crossword poems . The publisher’s blurb &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.hollypainter.com/at-last-we-listen-closely-cryptic-crossword-poems/&amp;#34;&amp;gt;explains:&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211119-002038/</link>
      <pubDate>Fri, 19 Nov 2021 00:20:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211119-002038/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/18/technology/meta-instagram-investigation-teens.html&amp;#34;&amp;gt;State attorneys general open an inquiry into Instagram’s impact on teens. The states were examining whether the actions of Facebook, now called Meta, violated state consumer protection laws and put the public at risk. By Cecilia Kang and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211119-001742/</link>
      <pubDate>Fri, 19 Nov 2021 00:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211119-001742/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/18/technology/meta-instagram-investigation-teens.html&amp;#34;&amp;gt;State attorneys general open an inquiry into Instagram’s impact on teens. The states were examining whether the actions of Facebook, now called Meta, violated state consumer protection laws and put the public at risk. By Cecilia Kang and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211118-202055/</link>
      <pubDate>Thu, 18 Nov 2021 20:20:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211118-202055/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/mutable/&amp;#34;&amp;gt;mutable&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/stuarray/&amp;#34;&amp;gt;STUArray&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/17/competitive-programming-in-haskell-bfs-part-4-implementation-via-stuarray/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211118-200730/</link>
      <pubDate>Thu, 18 Nov 2021 20:07:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211118-200730/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/1-simple-technique-to-train-your-focus&amp;#34;&amp;gt;1 simple technique to train your focus&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-the-internet-can-cause-you-adhd-like-symptoms&amp;#34;&amp;gt;How the Internet can cause ADHD-like symptoms&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20211118-161931/</link>
      <pubDate>Thu, 18 Nov 2021 16:19:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20211118-161931/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/donate-stripe&amp;#34;&amp;gt;Be part of The Markup’s future. Give now!&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/people/julia-angwin#content&amp;#34;&amp;gt;Skip navigation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/11/18/how-we-investigated-facebooks-most-popular-content&amp;#34;&amp;gt;Show Your Work Citizen Browser How We Investigated Facebook’s Most  Popular Content We found that Facebook&amp;#39;s popularity metric obscures how well ultra-conservative content does on the platform November 18, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/11/18/facebook-isnt-telling-you-how-popular-right-wing-content-is-on-the-platform&amp;#34;&amp;gt;Citizen Browser Facebook Isn’t Telling You How Popular Right-Wing Content Is on the Platform Facebook insists that mainstream news sites perform the best on its platform. But by other measures, sensationalist, partisan content reigns November 18, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211118-122222/</link>
      <pubDate>Thu, 18 Nov 2021 12:22:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211118-122222/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/mutable/&amp;#34;&amp;gt;mutable&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/stuarray/&amp;#34;&amp;gt;STUArray&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/17/competitive-programming-in-haskell-bfs-part-4-implementation-via-stuarray/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211118-081710/</link>
      <pubDate>Thu, 18 Nov 2021 08:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211118-081710/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/16/technology/senate-approves-jonathan-kanter.html&amp;#34;&amp;gt;Senate approves Jonathan Kanter, a Big Tech critic, as the top U.S. antitrust official. Mr. Kanter has fought against Google and other tech giants for years. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211118-080845/</link>
      <pubDate>Thu, 18 Nov 2021 08:08:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211118-080845/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/lbb-customer-story/&amp;#34;&amp;gt;This is the story about how different teams at LBB moved their workflows to Retool to give engineering more time to focus on growing the business and improving the product experience—not redundant tasks.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211118-042609/</link>
      <pubDate>Thu, 18 Nov 2021 04:26:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211118-042609/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/11/effs-how-fix-internet-podcast-offers-optimistic-solutions-tech-dystopias&amp;#34;&amp;gt;How to Fix the Internet Podcast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211118-042607/</link>
      <pubDate>Thu, 18 Nov 2021 04:26:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211118-042607/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/11/effs-how-fix-internet-podcast-offers-optimistic-solutions-tech-dystopias&amp;#34;&amp;gt;How to Fix the Internet Podcast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211118-042318/</link>
      <pubDate>Thu, 18 Nov 2021 04:23:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211118-042318/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/17/competitive-programming-in-haskell-bfs-part-4-implementation-via-stuarray/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 4 (implementation via STUArray)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/&amp;#34;&amp;gt;a previous post&amp;lt;/a&amp;gt; , we saw one way to implement our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;BFS API&amp;lt;/a&amp;gt; , but I claimed that it is not fast enough to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; . Today, I want to demonstrate a faster implementation. (It’s almost certainly possible to make it faster still; I welcome suggestions!)&amp;lt;br&amp;gt;
Once again, the idea is to replace the&amp;lt;br&amp;gt;
s from last time with mutable arrays , but in such a way that we get to keep the same pure API—almost. In order to allow arbitrary vertex types, while storing the vertices efficiently in a mutable array, we will require one extra argument to our&amp;lt;br&amp;gt;
function, namely, an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/15/competitive-programming-in-haskell-enumeration/&amp;#34;&amp;gt;Enumeration&amp;lt;/a&amp;gt; specifying a way to map back and forth between vertices and array indices.&amp;lt;br&amp;gt;
So why not instead just restrict vertices to some type that can be used as keys of a mutable array? That would work, but would unnecessarily restrict the API. For example, it is very common to see competitive programming problems that are “just” a standard graph algorithm, but on a non-obvious graph where the vertices are conceptually some more complex algebraic type, or on a graph where the vertices are specified as strings. Typically, competitive programmers just implement a mapping between vertices to integers on the fly—using either some math or some lookup data structures on the side—but wouldn’t it be nicer to be able to compositionally construct such a mapping and then have the graph search algorithm automatically handle the conversion back and forth? This is exactly what the&amp;lt;br&amp;gt;
abstraction gives us.&amp;lt;br&amp;gt;
This post is literate Haskell; you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hub.darcs.net/byorgey/byorgey-wordpress/browse/2019-04-comprog-hs/24-BFS-impl-STUArray.lhs&amp;#34;&amp;gt;obtain the source from the darcs repo&amp;lt;/a&amp;gt; . The source code (without accompanying blog post) can also be found &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/comprog-hs/blob/master/Graph.hs&amp;#34;&amp;gt;in my comprog-hs repo&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
{-# LANGUAGE FlexibleContexts    #-} {-# LANGUAGE RankNTypes          #-} {-# LANGUAGE RecordWildCards     #-} {-# LANGUAGE ScopedTypeVariables #-} module Graph where import Enumeration import Control.Arrow ( ( &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; ) ) import Control.Monad import Control.Monad.ST import qualified Data.Array.IArray as IA import Data.Array.ST import Data.Array.Unboxed ( UArray ) import qualified Data.Array.Unboxed as U import Data.Array.Unsafe ( unsafeFreeze ) import Data.Sequence ( Seq ( .. ) , ViewL ( .. ) , ( &amp;amp;lt;| ) , ( |&amp;amp;gt; ) ) import qualified Data.Sequence as Seq infixl 0 &amp;amp;gt;$&amp;amp;gt; ( &amp;amp;gt;$&amp;amp;gt; ) :: a -&amp;amp;gt; ( a -&amp;amp;gt; b ) -&amp;amp;gt; b ( &amp;amp;gt;$&amp;amp;gt; ) = flip ( $ ) {-# INLINE (&amp;amp;gt;$&amp;amp;gt;) #-}&amp;lt;br&amp;gt;
exhaustM&amp;lt;br&amp;gt;
is like&amp;lt;br&amp;gt;
from the last post, but in the context of an arbitrary&amp;lt;br&amp;gt;
. Each step will now be able to have effects (namely, updating mutable arrays) so needs to be monadic.&amp;lt;br&amp;gt;
exhaustM :: Monad m =&amp;amp;gt; ( a -&amp;amp;gt; m ( Maybe a ) ) -&amp;amp;gt; a -&amp;amp;gt; m a exhaustM f = go where go a = do ma &amp;amp;lt;- f a maybe ( return a ) go ma&amp;lt;br&amp;gt;
type is the same as before.&amp;lt;br&amp;gt;
Instead of using&amp;lt;br&amp;gt;
s in our&amp;lt;br&amp;gt;
as before, we will use&amp;lt;br&amp;gt;
STUArray&amp;lt;br&amp;gt;
s. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com#fn1&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; These are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/array-0.5.4.0/docs/Data-Array-ST.html&amp;#34;&amp;gt;unboxed, mutable arrays&amp;lt;/a&amp;gt; which we can use in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/base-4.13.0.0/docs/Control-Monad-ST-Safe.html#t:ST&amp;#34;&amp;gt;ST monad&amp;lt;/a&amp;gt; . Note we also define&amp;lt;br&amp;gt;
V&amp;lt;br&amp;gt;
as a synonym for&amp;lt;br&amp;gt;
, just as a mnemonic way to remind ourselves which&amp;lt;br&amp;gt;
values are supposed to represent vertices.&amp;lt;br&amp;gt;
type V = Int data BFSState s = BS { level :: STUArray s V Int , parent :: STUArray s V V , queue :: Seq V }&amp;lt;br&amp;gt;
To initialize a BFS state, we allocate new mutable level and parent arrays (initializing them to all values), and fill in the&amp;lt;br&amp;gt;
array and queue with the given start vertices. Notice how we need to be explicitly given the size of the arrays we should allocate; we will get this size from the&amp;lt;br&amp;gt;
passed to&amp;lt;br&amp;gt;
initBFSState :: Int -&amp;amp;gt; [ V ] -&amp;amp;gt; ST s ( BFSState s ) initBFSState n vs = do l &amp;amp;lt;- newArray ( 0 , n - 1 ) ( - 1 ) p &amp;amp;lt;- newArray ( 0 , n - 1 ) ( - 1 ) forM_ vs $ \ v -&amp;amp;gt; writeArray l v 0 return $ BS l p ( Seq.fromList vs )&amp;lt;br&amp;gt;
bfs&amp;amp;#39;&amp;lt;br&amp;gt;
function implements the BFS algorithm itself. Notice that it is not polymorphic in the vertex type; we will fix that with a wrapper function later. If you squint, the implementation looks very similar to the implementation of&amp;lt;br&amp;gt;
from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/&amp;#34;&amp;gt;my previous post&amp;lt;/a&amp;gt; , with the big difference that everything has to be in the&amp;lt;br&amp;gt;
monad now.&amp;lt;br&amp;gt;
bfs&amp;amp;#39; :: Int -&amp;amp;gt; [ V ] -&amp;amp;gt; ( V -&amp;amp;gt; [ V ] ) -&amp;amp;gt; ( V -&amp;amp;gt; Bool ) -&amp;amp;gt; ST s ( BFSState s ) bfs&amp;amp;#39; n vs next goal = do st &amp;amp;lt;- initBFSState n vs exhaustM bfsStep st where bfsStep st @ BS { .. } = case Seq.viewl queue of EmptyL -&amp;amp;gt; return Nothing v :&amp;amp;lt; q&amp;amp;#39; | goal v -&amp;amp;gt; return Nothing | otherwise -&amp;amp;gt; v &amp;amp;gt;$&amp;amp;gt; next &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; filterM ( fmap not . visited st ) &amp;amp;gt;=&amp;amp;gt; foldM ( upd v ) ( st { queue = q&amp;amp;#39; } ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; fmap Just upd p b @ BS { .. } v = do lp &amp;amp;lt;- readArray level p writeArray level v ( lp &#43; 1 ) writeArray parent v p return $ b { queue = queue |&amp;amp;gt; v } visited :: BFSState s -&amp;amp;gt; V -&amp;amp;gt; ST s Bool visited BS { .. } v = ( /= - 1 ) &amp;amp;lt;$&amp;amp;gt; readArray level v {-# INLINE visited #-}&amp;lt;br&amp;gt;
function is a wrapper around&amp;lt;br&amp;gt;
. It presents the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;same API as before&amp;lt;/a&amp;gt; , with the exception that it requires an extra&amp;lt;br&amp;gt;
Enumeration v&amp;lt;br&amp;gt;
argument, and uses it to convert vertices to integers for the inner&amp;lt;br&amp;gt;
call, and then back to vertices for the final result. It also handles freezing the mutable arrays returned from&amp;lt;br&amp;gt;
and constructing level and parent lookup functions that index into them. Note, the use of&amp;lt;br&amp;gt;
unsafeFreeze&amp;lt;br&amp;gt;
seems unavoidable, since&amp;lt;br&amp;gt;
runSTUArray&amp;lt;br&amp;gt;
only allows us to work with a single mutable array; in any case, it is safe for the same reason the use of&amp;lt;br&amp;gt;
in the implementation of&amp;lt;br&amp;gt;
itself is safe: we can see from the type of&amp;lt;br&amp;gt;
toResult&amp;lt;br&amp;gt;
that the&amp;lt;br&amp;gt;
parameter cannot escape, so the type system will not allow any further mutation to the arrays after it completes.&amp;lt;br&amp;gt;
bfs :: forall v . Enumeration v -&amp;amp;gt; [ v ] -&amp;amp;gt; ( v -&amp;amp;gt; [ v ] ) -&amp;amp;gt; ( v -&amp;amp;gt; Bool ) -&amp;amp;gt; BFSResult v bfs Enumeration { .. } vs next goal = toResult $ bfs&amp;amp;#39; card ( map locate vs ) ( map locate . next . select ) ( goal . select ) where toResult :: ( forall s . ST s ( BFSState s ) ) -&amp;amp;gt; BFSResult v toResult m = runST $ do st &amp;amp;lt;- m ( level&amp;amp;#39; :: UArray V Int ) &amp;amp;lt;- unsafeFreeze ( level st ) ( parent&amp;amp;#39; :: UArray V V ) &amp;amp;lt;- unsafeFreeze ( parent st ) return $ BFSR ( ( \ l -&amp;amp;gt; guard ( l /= - 1 ) &amp;amp;gt;&amp;amp;gt; Just l ) . ( level&amp;amp;#39; IA .! ) . locate ) ( ( \ p -&amp;amp;gt; guard ( p /= - 1 ) &amp;amp;gt;&amp;amp;gt; Just ( select p ) ) . ( parent&amp;amp;#39; IA .! ) . locate )&amp;lt;br&amp;gt;
Incidentally, instead of adding an&amp;lt;br&amp;gt;
argument, why don’t we just make a type class&amp;lt;br&amp;gt;
Enumerable&amp;lt;br&amp;gt;
, like this?&amp;lt;br&amp;gt;
class Enumerable v where enumeration :: Enumeration v bfs :: forall v . Enumerable v =&amp;amp;gt; [ v ] -&amp;amp;gt; ...&amp;lt;br&amp;gt;
This would allow us to keep the same API for BFS, up to only different type class constraints on&amp;lt;br&amp;gt;
. We could do this, but it doesn’t particularly seem worth it. It would typically require us to make a&amp;lt;br&amp;gt;
for our vertex type (necessitating extra code to map in and out of the&amp;lt;br&amp;gt;
) and to declare an&amp;lt;br&amp;gt;
instance; in comparison, the current approach with an extra argument to&amp;lt;br&amp;gt;
requires us to do nothing other than constructing the&amp;lt;br&amp;gt;
itself.&amp;lt;br&amp;gt;
Using this implementation,&amp;lt;br&amp;gt;
is finally fast enough to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; , like this:&amp;lt;br&amp;gt;
main = C.interact $ runScanner tc &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; format data Move = Move { a :: ! Int , b :: ! Int } deriving ( Eq , Show ) data TC = TC { m :: Int , s0 :: Int , moves :: [ Move ] } deriving ( Eq , Show ) tc :: Scanner TC tc = do m &amp;amp;lt;- int n &amp;amp;lt;- int TC m &amp;amp;lt;$&amp;amp;gt; int &amp;amp;lt;*&amp;amp;gt; n &amp;amp;gt;&amp;amp;lt; ( Move &amp;amp;lt;$&amp;amp;gt; int &amp;amp;lt;*&amp;amp;gt; int ) type Output = Maybe Int format :: Output -&amp;amp;gt; ByteString format = maybe &amp;amp;#34;-1&amp;amp;#34; showB solve :: TC -&amp;amp;gt; Output solve TC { .. } = getLevel res 0 where res = bfs ( finiteE m ) [ s0 ] ( \ v -&amp;amp;gt; map ( step m v ) moves ) ( == 0 ) step :: Int -&amp;amp;gt; Int -&amp;amp;gt; Move -&amp;amp;gt; Int step m v ( Move a b ) = ( a * v &#43; b ) `mod` m {-# INLINE step #-}&amp;lt;br&amp;gt;
It’s pretty much unchanged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;from before&amp;lt;/a&amp;gt; , except for the need to pass an&amp;lt;br&amp;gt;
(in this case we just use&amp;lt;br&amp;gt;
finiteE m&amp;lt;br&amp;gt;
, which is the identity on the interval ).&amp;lt;br&amp;gt;
Some remaining questions&amp;lt;br&amp;gt;
This is definitely not the end of the story.&amp;lt;br&amp;gt;
Submitting all this code (BFS,&amp;lt;br&amp;gt;
, and the above solution itself) as a single file gives a 2x speedup over submitting them as three separate modules. That’s annoying—why is that?&amp;lt;br&amp;gt;
Can we make this even faster? My solution to Modulo Solitaire runs in 0.57s. There are faster Haskell solutions (for example, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://anurudhp.github.io/blogs/tags/competitive-programming&amp;#34;&amp;gt;Anurudh Peduri&amp;lt;/a&amp;gt; has a solution that runs in 0.32s), and there are Java solutions as fast as 0.18s, so it seems to me there ought to be ways to make it much faster. If you have an idea for optimizing this code I’d be very interested to hear it! I am far from an expert in Haskell optimization.&amp;lt;br&amp;gt;
Can we generalize this nicely to other kinds of graph search algorithms (at a minimum, DFS and Dijkstra)? I definitely plan to explore this question in the future.&amp;lt;br&amp;gt;
For next time: Breaking Bad&amp;lt;br&amp;gt;
Next time, I want to look at a few other applications of this BFS code (and perhaps see if we can improve it along the way); I challenge you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/breakingbad&amp;#34;&amp;gt;Breaking Bad&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Why not use&amp;lt;br&amp;gt;
Vector&amp;lt;br&amp;gt;
, you ask? It’s probably even a bit faster, but the&amp;lt;br&amp;gt;
library is not supported on as many platforms. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com#fnref1&amp;#34;&amp;gt;↩︎&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/mutable/&amp;#34;&amp;gt;mutable&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/stuarray/&amp;#34;&amp;gt;STUArray&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/17/competitive-programming-in-haskell-bfs-part-4-implementation-via-stuarray/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/enumeration/&amp;#34;&amp;gt;enumeration&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/index/&amp;#34;&amp;gt;index&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/invertible/&amp;#34;&amp;gt;invertible&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/15/competitive-programming-in-haskell-enumeration/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/17/competitive-programming-in-haskell-bfs-part-4-implementation-via-stuarray/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 4 (implementation via STUArray)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20211118-042030/</link>
      <pubDate>Thu, 18 Nov 2021 04:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20211118-042030/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-11-17-githubs-developer-first-approach-to-content-moderation/&amp;#34;&amp;gt;GitHub’s developer-first approach to content moderation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GitHub puts the needs of developers at the core of our content moderation policies. Learn more about our approach and how you can contribute.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20211118-041232/</link>
      <pubDate>Thu, 18 Nov 2021 04:12:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20211118-041232/</guid>
      <description>I made an appearance at IntelON to talk about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/intelon-2021-processor-benchmarking&amp;#34;&amp;gt;Processor Benchmarking&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/intelon-2021-processor-benchmarking&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/IntelON2021_ProcessorBenchmarking.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel.com/content/www/us/en/events/on-event-series.html?videoId=6281338772001&amp;#34;&amp;gt;video @25:04&amp;lt;/a&amp;gt; ). (2021)&amp;lt;br&amp;gt;
My video appearance (with pandemic hair) at IntelON about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel.com/content/www/us/en/events/on-event-series.html?videoId=6281338772001&amp;#34;&amp;gt;Processor Benchmarking&amp;lt;/a&amp;gt; is at offset 25:04 ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel.com/content/www/us/en/events/on-event-series.html?videoId=6281338772001&amp;#34;&amp;gt;video&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/intelon-2021-processor-benchmarking&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ). (2021)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ramblings from Jessie: Home</title>
      <link>https://www.whatsupup.com/blog/conservatorship/reemphasize/20211118-041145/</link>
      <pubDate>Thu, 18 Nov 2021 04:11:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/conservatorship/reemphasize/20211118-041145/</guid>
      <description>Chip Measuring Contest&amp;lt;br&amp;gt;
The benefits of purpose-built chips.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>www.bitlog.com - Jake Voytko&#39;s personal log of bits</title>
      <link>https://www.whatsupup.com/blog/misinform/lossy/20211118-041105/</link>
      <pubDate>Thu, 18 Nov 2021 04:11:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/misinform/lossy/20211118-041105/</guid>
      <description>Over the past few years, I’ve reviewed lots of resumes for friends and former coworkers. I’ve also reviewed resumes from strangers, like on Twitter, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/jakevoytko/status/1421953039045480459&amp;#34;&amp;gt;where I offered to do resume reviews&amp;lt;/a&amp;gt; . I’ve been told that my reviews are helpful, so I’m documenting my approach, which focuses on whether the resume is a good fit for the job that the candidate wants.&amp;lt;br&amp;gt;
Software engineers can have their resume reviewed for free in a number of ways, such as by consulting Reddit, Discord and other forums, or by asking friends. From my observation, most online reviewers begin with the assumption that the candidate has provided all the necessary information. They then suggest tactics for strengthening that information. For example, they help candidates to rewrite each bullet point to fit frameworks like “Situation, Task, Action, Outcome.” They fix formatting, suggest rewrites, and highlight formatting inconsistencies. They’re really good at focusing on the tactics of writing a resume.&amp;lt;br&amp;gt;
Tactics are fine. Everything I mentioned in the previous paragraph is important. But tactics are best supplemented with a good strategy. How do you know that your resume has the right information? You could describe work experience in an infinite number of ways. Demonstrate how your existing work experience makes you a good candidate for the job that you want.&amp;lt;br&amp;gt;
Many reviewers ask, “How can you present this information in the best way possible?” I also ask, “How do you know that you included the right information?”&amp;lt;br&amp;gt;
That might sound obvious, but it’s difficult to apply in practice. I know this from my own experience. When I review resumes, I ask candidates for the resume and job postings that interest them. In a vast majority of reviews, I demonstrate how candidates can include extra experience to more effectively show that they meet the criteria mentioned in the job description.&amp;lt;br&amp;gt;
Part of a “please tear my resume to shreds” review that I did for a friend&amp;lt;br&amp;gt;
Resumes suck, but most jobs require one. Maximize the impact of your resume. Incorporate information from job postings, job descriptions, and any other relevant information, and use it all to produce a targeted resume.&amp;lt;br&amp;gt;
A quick note: this is written for software engineers with previous work experience who want a new job in the field. If that doesn’t describe you, you might still find this useful but you should think about what’s different for your situation.&amp;lt;br&amp;gt;
Here’s how I’d write my own resume if I had to write one today&amp;lt;br&amp;gt;
The TL;DR of my strategy is to iterate from a generic resume to a specific one. Start with a baseline resume that reflects your experience to the best of your ability but is not tailored to a specific job. Then, find information about the jobs that you want. Take notes from the job postings. Rewrite your resume using the information in those notes.&amp;lt;br&amp;gt;
And now, in more detail:&amp;lt;br&amp;gt;
Step 1: Write a resume the way you normally would&amp;lt;br&amp;gt;
Create a resume however you want. Modify an old resume or create a new one. I don’t care which. Don’t overthink it.&amp;lt;br&amp;gt;
Personally, I modify my old resumes. They’re always written in LaTeX because when I was in college, I hoped that I would get street cred by ignoring decades of word processor innovations. I don’t know if this worked, but I’m too lazy to change my approach at this point. If I had to make a resume today, I’d dust off this file and modify it to reflect my most recent experience and remove irrelevant information. Then I’d relearn how to run LaTeX in The Year of Our Lord 2021.&amp;lt;br&amp;gt;
Anyways, include all of the usual sections in your resume: name, contact information, experience, any relevant schooling, maybe relevant/interesting projects, maybe publication experience if you’re a researcher, maybe other things like security clearance if you have it and it’s relevant.&amp;lt;br&amp;gt;
Your resume should resemble other resumes in your field. If resumes in your field tend to be compact, then your resume should be compact.&amp;lt;br&amp;gt;
Spell check and proofread it. Be prepared to have a conversation about every fact on your resume. Just like you shouldn’t build a house on an unstable foundation, you shouldn’t mention something on your resume if you can’t back it up.&amp;lt;br&amp;gt;
Step 2: Collect three or four relevant job postings that intrigue you&amp;lt;br&amp;gt;
Find job postings that appeal to you. If you want to work for a specific company, find the available listings in the “Jobs” or “Careers” section of its website. Otherwise, look for companies offering the role you want.&amp;lt;br&amp;gt;
It’s OK if you don’t know what job you want yet. Look for listings that appeal to you. Spend some time researching different companies and fields until you have identified a few job postings that stand out to you.&amp;lt;br&amp;gt;
It’s important to collect more than one job posting. If you’re starting with a job posting from a specific company that you’re interested in working for, supplement it with similar postings from that company, or other postings from similar companies. Why? You don’t want to assume that any single job posting is complete. You will be mining these postings for data, and a single posting might omit something relevant to the job. But the more postings that you examine, the less likely that an important qualification will go unmentioned in any of them.&amp;lt;br&amp;gt;
Step 3: Create a spreadsheet and aggregate data from the job postings&amp;lt;br&amp;gt;
Make a table in a spreadsheet with 3-5 columns. The columns should represent different, and mostly non-overlapping, competency areas. Then, read through the job postings sentence-by-sentence, and add information from the job postings to these columns.&amp;lt;br&amp;gt;
I typically create categories like these:&amp;lt;br&amp;gt;
TECHNICAL SKILLS: Any hard skills that are explicitly named. Programming languages, operating systems, third-party libraries, applications, etc. “Experience with Python in Unix operating systems a plus” or keyword soup kind of things.&amp;lt;br&amp;gt;
DELIVERY: Anything related to execution. The types of projects that you’ve designed, implemented, or delivered. Whether you’re going to be on a pager rotation. The size and scope of the tasks that you’re expected to complete. The types of financial, product, or technical outcomes that you’re expected to achieve (or have already achieved).&amp;lt;br&amp;gt;
LEADERSHIP: This can take a lot of different forms. Information in this category might call out specific leadership roles, like tech lead, project lead, or management. They may want you to be proactive about suggesting product or process improvements. They may want you to mentor more junior engineers. If you haven’t been in the industry for long, it’s okay to skip this category, or merge it with COMMUNICATION.&amp;lt;br&amp;gt;
COMMUNICATION: Anything related to interacting with other people. There are a wide range of skills that could fit here. It could be project management practices, how you work day-to-day with teams, expected response times for answering support tickets, ability to be a point-person for your team or for external stakeholders.&amp;lt;br&amp;gt;
Tailor these categories to your specific field. If you are applying for research jobs, then you’ll probably have a RESEARCH category. The category names don’t matter too much. You only need a few that capture different concepts.&amp;lt;br&amp;gt;
Now that you’ve made the categories, the actual work begins. Read through every sentence of each job posting and incorporate each piece of information from the sentence into at least one of the categories. If you encounter a line like “Experience with Go a plus,” then put “Go” under TECHNICAL SKILLS. You don’t need to record duplicate information. If two job postings mention Go, put it once. If two job postings mention working as a tech lead, put it once. Make sure that the information in each sentence is captured in your spreadsheet.&amp;lt;br&amp;gt;
This can be time-consuming. It takes a while to process all of the sentences in the job postings. Thankfully, processing each subsequent posting will take less time once the first posting is finished. Job postings will have duplicate information. You only need to record the differences.&amp;lt;br&amp;gt;
If something doesn’t fit into one of the categories, try to include it somewhere, even if you need a MISCELLANEOUS category. You don’t want blind spots in your resume. For example, senior&#43; engineers often overemphasize their technical skills and project experience, and underemphasize their soft skills.&amp;lt;br&amp;gt;
Step 4: Modify your resume to address as many of the relevant competencies as possible&amp;lt;br&amp;gt;
Look at each item that you recorded in the previous step. Look through your resume and ask yourself, “Does my resume address this? If not, can I add a new bullet point, or can I add relevant information to an existing bullet point?”&amp;lt;br&amp;gt;
At this point, your resume might get longer as you add information to address criteria from the previous step. If this makes your resume longer, then rewrite the bullet points for brevity. Avoid making your resume significantly longer than when you started.&amp;lt;br&amp;gt;
It’s okay if you don’t address every item in the categories that you produced. Again, you should feel confident in every item on your resume. Don’t add something if you can’t talk about it for 10 minutes in an interview. If a job asks for PHP experience and you’ve only written 50 lines of PHP in your life, leave it off your resume.&amp;lt;br&amp;gt;
Step 5: Make the hiring manager want to hire you&amp;lt;br&amp;gt;
People will look at each line of your resume and say, “So what?” To counter this, make sure that you explain the impact of your experience.&amp;lt;br&amp;gt;
Think about the people making the hiring decision. This will differ per company. At a megacorp, the people hiring you might be a collective of managers or senior (or above) engineers. If you’re applying to work for medium-sized companies, the hiring manager will probably be in your management chain; either your manager or a boss of theirs. At a small startup, the founders might hire you themselves.&amp;lt;br&amp;gt;
Make people want to work with you. The people at the megacorp want to prove that they consistently hire high performers. Your manager wants to know that you can function effectively in a team environment. A startup founder wants to know that you can …</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211118-040713/</link>
      <pubDate>Thu, 18 Nov 2021 04:07:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211118-040713/</guid>
      <description>The CEO of a South Carolina technology firm has pleaded guilty to 20 counts of wire fraud in connection with an elaborate network of phony companies set up to obtain more than 735,000 Internet Protocol (IP) addresses from the nonprofit organization that leases the digital real estate to entities in North America.&amp;lt;br&amp;gt;
In 2018, the American Registry for Internet Numbers (ARIN), which oversees IP addresses assigned to entities in the U.S., Canada, and parts of the Caribbean, notified Charleston, S.C. based Micfo LLC that it intended to revoke 735,000 addresses.&amp;lt;br&amp;gt;
ARIN said they wanted the addresses back because the company and its owner — 38-year-old Amir Golestan — had obtained them under false pretenses. A global &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/IPv4_address_exhaustion&amp;#34;&amp;gt;shortage of IPv4 addresses&amp;lt;/a&amp;gt; has massively driven up the price of these resources over the years: At the time of this dispute, a single IP address could fetch between $15 and $25 on the open market.&amp;lt;br&amp;gt;
Micfo responded by suing ARIN to try to stop the IP address seizure. Ultimately, ARIN and Micfo settled the dispute in arbitration, with Micfo returning most of the addresses that it hadn’t already sold.&amp;lt;br&amp;gt;
But the legal tussle caught the attention of South Carolina U.S. Attorney Sherri Lydon , who in May 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/05/a-tough-week-for-ip-address-scammers/&amp;#34;&amp;gt;filed criminal wire fraud charges against Golestan&amp;lt;/a&amp;gt; , alleging he’d orchestrated a network of shell companies and fake identities to prevent ARIN from knowing the addresses were all going to the same buyer.&amp;lt;br&amp;gt;
Each of those shell companies involved the production of notarized affidavits in the names of people who didn’t exist. As a result, Lydon was able to charge Golestan with 20 counts of wire fraud — one for each payment made by the phony companies that bought the IP addresses from ARIN.&amp;lt;br&amp;gt;
Amir Golestan, CEO of Micfo.&amp;lt;br&amp;gt;
On Nov. 16, just two days into his trial, Golestan changed his “not guilty” plea, agreeing to plead guilty to all 20 wire fraud charges. KrebsOnSecurity interviewed Golestan about his case at length last year, but he has not responded to requests for comment on his plea change.&amp;lt;br&amp;gt;
By 2013, a number of Micfo’s customers had landed on the radar of Spamhaus , a group that many network operators rely upon to help block junk email. But shortly after Spamhaus began blocking Micfo’s IP address ranges, Micfo shifted gears and began reselling IP addresses mainly to companies marketing “virtual private networking” or VPN services that help customers hide their real IP addresses online.&amp;lt;br&amp;gt;
But in a 2020 interview, Golestan told KrebsOnSecurity that Micfo was at one point responsible for brokering roughly 40 percent of the IP addresses used by the world’s largest VPN providers. Throughout that conversation, Golestan maintained his innocence, even as he explained that the creation of the phony companies was necessary to prevent entities like Spamhaus from interfering with his business going forward.&amp;lt;br&amp;gt;
Stephen Ryan , an attorney representing ARIN, said Golestan changed his plea after the court heard from a former Micfo employee and public notary who described being instructed by Golestan to knowingly certify false documents.&amp;lt;br&amp;gt;
“Her testimony made him appear bullying and unsavory,” Ryan said. “Because it turned out he had also sued her to try to prevent her from disclosing the actions he’d directed.”&amp;lt;br&amp;gt;
Golestan’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/11/golestanplea.pdf&amp;#34;&amp;gt;rather sparse plea agreement&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wsj.com/articles/executive-pleads-guilty-in-internet-address-fraud-case-11637101781&amp;#34;&amp;gt;first reported by The Wall Street Journal&amp;lt;/a&amp;gt; ) does not specify any sort of leniency he might gain from prosecutors for agreeing to end the trial prematurely. But it’s worth noting that a conviction on a single act of wire fraud can result in fines and up to 20 years in prison. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/tech-ceo-pleads-to-wire-fraud-in-ip-address-scheme/#more-57598&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/tech-ceo-pleads-to-wire-fraud-in-ip-address-scheme/&amp;#34;&amp;gt;Tech CEO Pleads to Wire Fraud in IP Address Scheme&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-162108/</link>
      <pubDate>Tue, 16 Nov 2021 16:21:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-162108/</guid>
      <description>November 16, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/11/16/Cash-for-leftpad.html&amp;#34;&amp;gt;I will pay you cash to delete your npm module&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-122021/</link>
      <pubDate>Tue, 16 Nov 2021 12:20:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-122021/</guid>
      <description>November 16, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/11/16/Python-stop-screwing-distros-over.html&amp;#34;&amp;gt;Python: Please stop screwing over Linux distros&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211116-121834/</link>
      <pubDate>Tue, 16 Nov 2021 12:18:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211116-121834/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/account/login?redirect=%2F%3F&amp;amp;email=&amp;amp;with_password=&amp;amp;justTrying=&amp;#34;&amp;gt;Login&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/privacy&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/tos&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/ccpa#personal-data-collected&amp;#34;&amp;gt;Information collection notice&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A Substack newsletter by Alex Kantrowitz&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog by Jared Nelsen</title>
      <link>https://www.whatsupup.com/blog/baldish/wince/20211116-120855/</link>
      <pubDate>Tue, 16 Nov 2021 12:08:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/baldish/wince/20211116-120855/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/the-utilitarians&amp;#34;&amp;gt;The Utilitarians&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Reflections on Utility&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/welcome-to-future-corp&amp;#34;&amp;gt;Welcome to Future Corp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A conversation about conversations&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211116-042020/</link>
      <pubDate>Tue, 16 Nov 2021 04:20:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211116-042020/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/15/competitive-programming-in-haskell-enumeration/&amp;#34;&amp;gt;Competitive programming in Haskell: Enumeration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-041855/</link>
      <pubDate>Tue, 16 Nov 2021 04:18:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211116-041855/</guid>
      <description>November 15, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/11/15/Reframing-gemini.gmi&amp;#34;&amp;gt;Reframing the philosophy of Gemini&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211116-001934/</link>
      <pubDate>Tue, 16 Nov 2021 00:19:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211116-001934/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/15/competitive-programming-in-haskell-enumeration/&amp;#34;&amp;gt;Competitive programming in Haskell: Enumeration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I’m in the middle of a multi-part series on implementing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; in Haskell. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/&amp;#34;&amp;gt;my last post&amp;lt;/a&amp;gt; , we saw one implementation, but I claimed that it is not fast enough to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; , and I promised to show off a faster implementation in this post, but I lied; we have to take a small detour first.&amp;lt;br&amp;gt;
The main idea to make a faster BFS implementation is to replace the&amp;lt;br&amp;gt;
s from last time with mutable arrays , but hopefully in such a way that we get to keep the same pure API. Using mutable arrays introduces a few wrinkles, though.&amp;lt;br&amp;gt;
The API we have says we get to use any type&amp;lt;br&amp;gt;
for our vertices, as long as it is an instance of&amp;lt;br&amp;gt;
. However, this is not going to work so well for mutable arrays. We still want the external API to allow us to use any type for our vertices, but we will need a way to convert vertices to and from&amp;lt;br&amp;gt;
values we can use to index the internal mutable array.&amp;lt;br&amp;gt;
A data structre like&amp;lt;br&amp;gt;
is dynamically sized, but we don’t have this luxury with arrays. We will have to know the size of the array up front.&amp;lt;br&amp;gt;
In other words, we need to provide a way to bijectively map vertices to a finite prefix of the natural numbers; that is, we need what I call invertible enumerations . This idea has come up for me multiple times: in 2016, I &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2016/10/25/adventures-in-enumerating-balanced-brackets/&amp;#34;&amp;gt;wrote about using such an abstraction to solve another competitive programming problem&amp;lt;/a&amp;gt; , and in 2019 I &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/07/05/lightweight-invertible-enumerations-in-haskell/&amp;#34;&amp;gt;published a library for working with invertible enumerations&amp;lt;/a&amp;gt; . I’ve now put together a lightweight version of that library for use in competitive programming. I’ll walk through the code below, and you can also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/comprog-hs/blob/master/Enumeration.hs&amp;#34;&amp;gt;find the source code in my comprog-hs repository&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
First, some extensions and imports.&amp;lt;br&amp;gt;
{-# LANGUAGE ScopedTypeVariables #-} {-# LANGUAGE TypeApplications #-} module Enumeration where import qualified Data.List as L import Data.Hashable import qualified Data.Array as A import qualified Data.HashMap.Strict as HM&amp;lt;br&amp;gt;
An&amp;lt;br&amp;gt;
Enumeration a&amp;lt;br&amp;gt;
consists of a cardinality, and two functions,&amp;lt;br&amp;gt;
select&amp;lt;br&amp;gt;
locate&amp;lt;br&amp;gt;
, which together form a bijection between (some subset of) values of type&amp;lt;br&amp;gt;
and a finite prefix of the natural numbers. We can convert an&amp;lt;br&amp;gt;
Enumeration&amp;lt;br&amp;gt;
into a list just by mapping the&amp;lt;br&amp;gt;
function over that finite prefix.&amp;lt;br&amp;gt;
data Enumeration a = Enumeration { card :: ! Int , select :: Int -&amp;amp;gt; a , locate :: a -&amp;amp;gt; Int } enumerate :: Enumeration a -&amp;amp;gt; [ a ] enumerate e = map ( select e ) [ 0 .. card e - 1 ]&amp;lt;br&amp;gt;
Since&amp;lt;br&amp;gt;
occurs both positively and negatively,&amp;lt;br&amp;gt;
is not a&amp;lt;br&amp;gt;
Functor&amp;lt;br&amp;gt;
, but we can map over&amp;lt;br&amp;gt;
s as long as we provide both directions of a bijection&amp;lt;br&amp;gt;
a &amp;amp;lt;-&amp;amp;gt; b&amp;lt;br&amp;gt;
mapE :: ( a -&amp;amp;gt; b ) -&amp;amp;gt; ( b -&amp;amp;gt; a ) -&amp;amp;gt; Enumeration a -&amp;amp;gt; Enumeration b mapE f g ( Enumeration c s l ) = Enumeration c ( f . s ) ( l . g )&amp;lt;br&amp;gt;
We have various fundamental ways to build enumerations: empty and unit enumerations, and an identity enumeration on a finite prefix of natural numbers.&amp;lt;br&amp;gt;
voidE :: Enumeration a voidE = Enumeration 0 ( error &amp;amp;#34;select void&amp;amp;#34; ) ( error &amp;amp;#34;locate void&amp;amp;#34; ) unitE :: Enumeration () unitE = singletonE () singletonE :: a -&amp;amp;gt; Enumeration a singletonE a = Enumeration 1 ( const a ) ( const 0 ) finiteE :: Int -&amp;amp;gt; Enumeration Int finiteE n = Enumeration n id id&amp;lt;br&amp;gt;
We can automatically enumerate all the values of a&amp;lt;br&amp;gt;
Bounded&amp;lt;br&amp;gt;
Enum&amp;lt;br&amp;gt;
instance. This is useful, for example, when we have made a custom enumeration type.&amp;lt;br&amp;gt;
boundedEnum :: forall a . ( Enum a , Bounded a ) =&amp;amp;gt; Enumeration a boundedEnum = Enumeration { card = hi - lo &#43; 1 , select = toEnum . ( &#43; lo ) , locate = subtract lo . fromEnum } where lo , hi :: Int lo = fromIntegral ( fromEnum ( minBound @ a ) ) hi = fromIntegral ( fromEnum ( maxBound @ a ) )&amp;lt;br&amp;gt;
We can also build an enumeration from an explicit list. We want to make sure this is efficient, since it is easy to imagine using this e.g. on a very large list of vertex values given as part of the input of a problem. So we build an array and a hashmap to allow fast lookups in both directions.&amp;lt;br&amp;gt;
listE :: forall a . ( Hashable a , Eq a ) =&amp;amp;gt; [ a ] -&amp;amp;gt; Enumeration a listE as = Enumeration n ( toA A .! ) ( fromA HM .! ) where n = length as toA :: A.Array Int a toA = A.listArray ( 0 , n - 1 ) as fromA :: HM.HashMap a Int fromA = HM.fromList ( zip as [ 0 :: Int .. ] )&amp;lt;br&amp;gt;
Finally, we have a couple ways to combine enumerations into more complex ones, via sum and product.&amp;lt;br&amp;gt;
( &amp;amp;gt;&#43;&amp;amp;lt; ) :: Enumeration a -&amp;amp;gt; Enumeration b -&amp;amp;gt; Enumeration ( Either a b ) a &amp;amp;gt;&#43;&amp;amp;lt; b = Enumeration { card = card a &#43; card b , select = \ k -&amp;amp;gt; if k &amp;amp;lt; card a then Left ( select a k ) else Right ( select b ( k - card a ) ) , locate = either ( locate a ) ( ( &#43; card a ) . locate b ) } ( &amp;amp;gt;*&amp;amp;lt; ) :: Enumeration a -&amp;amp;gt; Enumeration b -&amp;amp;gt; Enumeration ( a , b ) a &amp;amp;gt;*&amp;amp;lt; b = Enumeration { card = card a * card b , select = \ k -&amp;amp;gt; let ( i , j ) = k `divMod` card b in ( select a i , select b j ) , locate = \ ( x , y ) -&amp;amp;gt; card b * locate a x &#43; locate b y }&amp;lt;br&amp;gt;
There are a few more combinators &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/comprog-hs/blob/master/Enumeration.hs&amp;#34;&amp;gt;in the source code&amp;lt;/a&amp;gt; but I don’t know whether I’ll ever use them. You can read about them if you want. For now, let’s try using this to solve a problem!&amp;lt;br&amp;gt;
…ah, who am I kidding, I can’t find any problems that can be directly solved using this framework. Invertibility is a double-edged sword—we absolutely need it for creating an efficient BFS with arbitrary vertices, and the combinators will come in quite handy if we want to use some complex type for vertices. However, requiring invertibility also limits the expressiveness of the library. For example, there is no&amp;lt;br&amp;gt;
Monad&amp;lt;br&amp;gt;
instance. This is why my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/simple-enumeration&amp;#34;&amp;gt;simple-enumeration&amp;lt;/a&amp;gt; library has both invertible and non-invertible variants.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/enumeration/&amp;#34;&amp;gt;enumeration&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/index/&amp;#34;&amp;gt;index&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/invertible/&amp;#34;&amp;gt;invertible&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/11/15/competitive-programming-in-haskell-enumeration/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211116-001643/</link>
      <pubDate>Tue, 16 Nov 2021 00:16:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211116-001643/</guid>
      <description>By Alex Kantrowitz  ·  Tens of thousands of subscribers&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive?sort=top&amp;#34;&amp;gt;Top posts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/archive&amp;#34;&amp;gt;Archive&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about?sort=people&amp;#34;&amp;gt;Authors&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/account/login?redirect=%2F%3F&amp;amp;email=&amp;amp;with_password=&amp;amp;justTrying=&amp;#34;&amp;gt;Login&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays - Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20211116-001354/</link>
      <pubDate>Tue, 16 Nov 2021 00:13:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20211116-001354/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/building-things-that-do-just-one-thing/&amp;#34;&amp;gt;Building things [ that do just one thing ]&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20211115-160916/</link>
      <pubDate>Mon, 15 Nov 2021 16:09:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20211115-160916/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/goodtaste.html&amp;#34;&amp;gt;Good Taste&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/smart.html&amp;#34;&amp;gt;Beyond Smart&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/weird.html&amp;#34;&amp;gt;Weird Languages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211114-201350/</link>
      <pubDate>Sun, 14 Nov 2021 20:13:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211114-201350/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/30/Diablo-Immortal&amp;#34;&amp;gt;Diablo Immortal&amp;lt;/a&amp;gt; · I tried out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://diabloimmortal.blizzard.com/en-us/&amp;#34;&amp;gt;Diablo Immortal&amp;lt;/a&amp;gt; on my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/22/Galaxy-Tab-S7-Plus&amp;#34;&amp;gt;Galaxy Tab 7&#43;&amp;lt;/a&amp;gt; and, well, it’s pretty convincing off the top.     But I wonder if it’s ethical to play anything from Blizzard, these days?     Protip: At the moment you can’t get into the closed beta unless you’re on Android in Canada &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/30/Diablo-Immortal&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211114-041524/</link>
      <pubDate>Sun, 14 Nov 2021 04:15:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211114-041524/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#image-processing&amp;#34;&amp;gt;image-processing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pretty-pictures&amp;#34;&amp;gt;pretty-pictures&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Via &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news.ycombinator.com/item?id=29185167&amp;#34;&amp;gt;Hacker News&amp;lt;/a&amp;gt; : You may
know that you can reverse a string by first reversing the order of the words
in the string, then reversing the characters in each word. (So&amp;lt;br&amp;gt;
hello world&amp;lt;br&amp;gt;
becomes&amp;lt;br&amp;gt;
world hello&amp;lt;br&amp;gt;
, and then we recursively reverse each word to get&amp;lt;br&amp;gt;
dlrow olleh&amp;lt;br&amp;gt;
.)
Well, it turns out you can do the same kind of thing in two dimensions:
to rotate an image by 90 degrees, you can just rotate the order of the
quadrants, and then recursively rotate each quadrant.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211114-040712/</link>
      <pubDate>Sun, 14 Nov 2021 04:07:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211114-040712/</guid>
      <description>Late in the evening on Nov. 12 ET, tens of thousands of emails &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/spamhaus/status/1459450061696417792&amp;#34;&amp;gt;began flooding out&amp;lt;/a&amp;gt; from the FBI address &amp;lt;a href=&amp;#34;mailto:eims@ic.fbi.gov&amp;#34;&amp;gt;eims@ic.fbi.gov&amp;lt;/a&amp;gt; , warning about fake cyberattacks. Around that time, KrebsOnSecurity received a message from the same email address.&amp;lt;br&amp;gt;
“Hi its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mobile.twitter.com/pompompur_in&amp;#34;&amp;gt;pompompurin&amp;lt;/a&amp;gt; ,” read the missive. “Check headers of this email it’s actually coming from FBI server. I am contacting you today because we located a botnet being hosted on your forehead, please take immediate action thanks.”&amp;lt;br&amp;gt;
A review of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/briankrebs/status/1459523630996598790&amp;#34;&amp;gt;the email’s message headers&amp;lt;/a&amp;gt; indicated it had indeed been sent by the FBI, and from the agency’s own Internet address. The domain in the “from:” portion of the email I received — &amp;lt;a href=&amp;#34;mailto:eims@ic.fbi.gov&amp;#34;&amp;gt;eims@ic.fbi.gov&amp;lt;/a&amp;gt; — corresponds to the FBI’s Criminal Justice Information Services division (CJIS).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211114-000747/</link>
      <pubDate>Sun, 14 Nov 2021 00:07:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211114-000747/</guid>
      <description>The Federal Bureau of Investigation (FBI) confirmed today that its fbi.gov domain name and Internet address were used to blast out thousands of fake emails about a cybercrime investigation. According to an interview with the person who claimed responsibility for the hoax, the spam messages were sent by abusing insecure code in an FBI online portal designed to share information with state and local law enforcement authorities.&amp;lt;br&amp;gt;
The phony message sent late Thursday evening via the FBI’s email system. Image: Spamhaus.org&amp;lt;br&amp;gt;
Late in the evening of Nov. 12 ET, tens of thousands of emails &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/spamhaus/status/1459450061696417792&amp;#34;&amp;gt;began flooding out&amp;lt;/a&amp;gt; from the FBI address &amp;lt;a href=&amp;#34;mailto:eims@ic.fbi.gov&amp;#34;&amp;gt;eims@ic.fbi.gov&amp;lt;/a&amp;gt; , warning about fake cyberattacks. Around that time, KrebsOnSecurity received an email from the same email address.&amp;lt;br&amp;gt;
“Hi its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mobile.twitter.com/pompompur_in&amp;#34;&amp;gt;pompompurin&amp;lt;/a&amp;gt; ,” read the message. “Check headers of this email it’s actually coming from FBI server. I am contacting you today because we located a botnet being hosted on your forehead, please take immediate action thanks.”&amp;lt;br&amp;gt;
A review of the email’s message headers indicated it had indeed been sent by the FBI, and from the agency’s own Internet address. The domain in the “from:” portion of the email I received — &amp;lt;a href=&amp;#34;mailto:eims@ic.fbi.gov&amp;#34;&amp;gt;eims@ic.fbi.gov&amp;lt;/a&amp;gt; — corresponds to the FBI’s Criminal Justice Information Services division (CJIS).&amp;lt;br&amp;gt;
According to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/tribal/national-crime-information-systems&amp;#34;&amp;gt;Department of Justice&amp;lt;/a&amp;gt; , “CJIS manages and operates several national crime information systems used by the public safety community for both criminal and civil purposes. CJIS systems are available to the criminal justice community, including law enforcement, jails, prosecutors, courts, as well as probation and pretrial services.”&amp;lt;br&amp;gt;
In response to a request for comment, the FBI confirmed the unauthorized messages, but declined to offer further information.&amp;lt;br&amp;gt;
“The FBI and CISA [the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/&amp;#34;&amp;gt;Cybersecurity and Infrastructure Security Agency&amp;lt;/a&amp;gt; ]  are aware of the incident this morning involving fake emails from an @ic.fbi.gov email account,” reads the FBI statement. “This is an ongoing situation and we are not able to provide any additional information at this time. The impacted hardware was taken offline quickly upon discovery of the issue. We continue to encourage the public to be cautious of unknown senders and urge you to report suspicious activity to &amp;lt;a href=&amp;#34;http://www.ic3.gov&amp;#34;&amp;gt;www.ic3.gov&amp;lt;/a&amp;gt; or &amp;lt;a href=&amp;#34;http://www.cisa.gov&amp;#34;&amp;gt;www.cisa.gov&amp;lt;/a&amp;gt;.”&amp;lt;br&amp;gt;
In an interview with KrebsOnSecurity, Pompompurin said the hack was done to point out a glaring vulnerability in the FBI’s system.&amp;lt;br&amp;gt;
“I could’ve 1000% used this to send more legit looking emails, trick companies into handing over data etc.,” Pompompurin said. “And this would’ve never been found by anyone who would responsibly disclose, due to the notice the feds have on their website.”&amp;lt;br&amp;gt;
Pompompurin says the illicit access to the FBI’s email system began with an exploration of its Law Enforcement Enterprise Portal (LEEP), which the bureau describes as “a gateway providing law enforcement agencies, intelligence groups, and criminal justice entities access to beneficial resources.”&amp;lt;br&amp;gt;
The FBI’s Law Enforcement Enterprise Portal (LEEP).&amp;lt;br&amp;gt;
“These resources will strengthen case development for investigators, enhance information sharing between agencies, and be accessible in one centralized location!,” the FBI’s site enthuses.&amp;lt;br&amp;gt;
Until sometime this morning, the LEEP portal allowed anyone to apply for an account. Helpfully, step-by-step instructions for registering a new account on the LEEP portal also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/tribal/page/file/1260671/download&amp;#34;&amp;gt;are available from the DOJ’s website&amp;lt;/a&amp;gt; . [It should be noted that “Step 1” in those instructions is to visit the site in Microsoft’s Internet Explorer, an outdated web browser that even Microsoft no longer encourages people to use for security reasons.]&amp;lt;br&amp;gt;
Much of that process involves filling out forms with the applicant’s personal and contact information, and that of their organization. A critical step in that process says applicants will receive an email confirmation from &amp;lt;a href=&amp;#34;mailto:eims@ic.fbi.gov&amp;#34;&amp;gt;eims@ic.fbi.gov&amp;lt;/a&amp;gt; with a one-time passcode — ostensibly to validate that the applicant can receive email at the domain in question.&amp;lt;br&amp;gt;
But according to Pompompurin, the FBI’s own website leaked that one-time passcode in the HTML code of the web page.&amp;lt;br&amp;gt;
A screenshot shared by Pompompurin. Image: KrebOnSecurity.com&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/hoax-email-blast-abused-poor-coding-in-fbi-website/&amp;#34;&amp;gt;Hoax Email Blast Abused Poor Coding in FBI Website&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211113-002355/</link>
      <pubDate>Sat, 13 Nov 2021 00:23:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211113-002355/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/about/in-memoriam&amp;#34;&amp;gt;In Memoriam&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211113-002353/</link>
      <pubDate>Sat, 13 Nov 2021 00:23:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211113-002353/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/about/in-memoriam&amp;#34;&amp;gt;In Memoriam&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211113-002108/</link>
      <pubDate>Sat, 13 Nov 2021 00:21:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211113-002108/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2011/04/18/monoids-for-maybe/&amp;#34;&amp;gt;Monoids for Maybe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211113-001706/</link>
      <pubDate>Sat, 13 Nov 2021 00:17:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211113-001706/</guid>
      <description>Want the full experience?&amp;lt;br&amp;gt;
Just join the free list, for now&amp;lt;br&amp;gt;
Learn more&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211113-001458/</link>
      <pubDate>Sat, 13 Nov 2021 00:14:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211113-001458/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#board-games&amp;#34;&amp;gt;board-games&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#how-to&amp;#34;&amp;gt;how-to&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Many years ago, someone taught me a party game suitable for
four to a-whole-bunch-of players. The game is called Contact .
It’s a word game. It’s also a “one versus many” game in the vein of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boardgamegeek.com/boardgame/6830/zendo&amp;#34;&amp;gt;Zendo&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boardgamegeek.com/image/4277011/elon-musks-ipod-submarine&amp;#34;&amp;gt;Elon Musk’s iPod Submarine&amp;lt;/a&amp;gt; .
Unlike those games, this one requires no physical components at all.
Like them, it’s a lot of fun. Here’s how to play.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211112-202540/</link>
      <pubDate>Fri, 12 Nov 2021 20:25:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211112-202540/</guid>
      <description>Since August, EFF and others have been &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life&amp;#34;&amp;gt;telling&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/08/if-you-build-it-they-will-come-apple-has-opened-backdoor-increased-surveillance&amp;#34;&amp;gt;Apple&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/event/perspectives-encryption-and-child-safety&amp;#34;&amp;gt;to&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/08/how-lgbtq-content-censored-under-guise-sexually-explicit&amp;#34;&amp;gt;cancel&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/08/eff-joins-global-coalition-asking-apple-ceo-tim-cook-stop-phone-scanning&amp;#34;&amp;gt;its&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/08/apples-plan-scan-photos-messages-turns-young-people-privacy-pawns&amp;#34;&amp;gt;new&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/09/delays-arent-good-enough-apple-must-abandon-its-surveillance-plans&amp;#34;&amp;gt;child&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/09/dont-stop-now-join-eff-fight-future-apple-protests-nationwide&amp;#34;&amp;gt;safety&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2021/09/why-eff-flew-plane-over-apples-headquarters&amp;#34;&amp;gt;plans&amp;lt;/a&amp;gt; . Apple is now changing its tune about one component of its plans: the Messages app will &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cnet.com/tech/mobile/apple-to-beta-test-imessage-feature-that-warns-kids-about-nude-imagery/&amp;#34;&amp;gt;no longer send notifications&amp;lt;/a&amp;gt; to parent accounts.That’s good&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211112-200723/</link>
      <pubDate>Fri, 12 Nov 2021 20:07:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211112-200723/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-the-Internet-can-cause-adhd-like-symptoms&amp;#34;&amp;gt;How the Internet can cause ADHD-like symptoms&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211112-041634/</link>
      <pubDate>Fri, 12 Nov 2021 04:16:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211112-041634/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-linkedin-is-the-one-good-social&amp;#34;&amp;gt;Why LinkedIn Is The One Good Social Network&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-linkedin-is-the-one-good-social&amp;#34;&amp;gt;What the professional social network gets right. And what others can learn from it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211112-041559/</link>
      <pubDate>Fri, 12 Nov 2021 04:15:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211112-041559/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03409-2&amp;#34;&amp;gt;Diamond delivers long-sought mineral from the deep Earth&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Davemaoite is a vehicle for radioactive isotopes that help to heat the planet’s mantle.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211111-201451/</link>
      <pubDate>Thu, 11 Nov 2021 20:14:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211111-201451/</guid>
      <description>To learn more, check out the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/clusterfuzzlite/&amp;#34;&amp;gt;ClusterFuzzLite documentation&amp;lt;/a&amp;gt; . ClusterFuzzLite currently supports &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions&amp;#34;&amp;gt;GitHub Actions&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/build&amp;#34;&amp;gt;Google Cloud Build&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/kubernetes/test-infra/tree/master/prow#readme&amp;#34;&amp;gt;Prow&amp;lt;/a&amp;gt; . We built this with CI system extensibility in mind, and adding support for other CI systems is straightforward. Please &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/clusterfuzzlite/issues/new&amp;#34;&amp;gt;contact us&amp;lt;/a&amp;gt; if you’re interested in contributing support, or have any questions, feedback or feature requests.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>privacy Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/evildoer/onionskin/20211111-200859/</link>
      <pubDate>Thu, 11 Nov 2021 20:08:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/evildoer/onionskin/20211111-200859/</guid>
      <description>Earlier this year the European Commission unveiled its proposed ‘Digital Identity Framework’, a revision to the 2014 eIDAS regulation. While the draft law includes many welcome provisions on the security … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/11/04/mozilla-publishes-position-paper-on-the-eu-digital-identity-framework/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211111-200650/</link>
      <pubDate>Thu, 11 Nov 2021 20:06:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211111-200650/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-the-internet-can-cause-you-adhd&amp;#34;&amp;gt;How the Internet can cause you ADHD&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211111-121632/</link>
      <pubDate>Thu, 11 Nov 2021 12:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211111-121632/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-for.html&amp;#34;&amp;gt;ClusterFuzzLite: Continuous fuzzing for all&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Jonathan Metzman, Google Open Source Security Team&amp;lt;br&amp;gt;
In recent years, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/fuzzing/blob/master/docs/intro-to-fuzzing.md&amp;#34;&amp;gt;continuous fuzzing&amp;lt;/a&amp;gt; has become an essential part of the software development lifecycle. By feeding unexpected or random data into a program, fuzzing catches bugs that would otherwise slip through the most thorough manual checks and provides coverage that would take staggering human effort to replicate. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/recommended-minimum-standards-vendor-or&amp;#34;&amp;gt;NIST’s guidelines for software verification&amp;lt;/a&amp;gt; , recently released in response to the White House &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&amp;#34;&amp;gt;Executive Order on Improving the Nation’s Cybersecurity&amp;lt;/a&amp;gt; , specify fuzzing among the minimum standard requirements for code verification. Today, we are excited to announce &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/clusterfuzzlite&amp;#34;&amp;gt;ClusterFuzzLite&amp;lt;/a&amp;gt; , a continuous fuzzing solution that runs as part of CI/CD workflows to find vulnerabilities faster than ever before. With just a few lines of code, GitHub users can integrate ClusterFuzzLite into their workflow and fuzz pull requests to catch bugs before they are committed, enhancing the overall security of the software supply chain. Since its release in 2016, over 500 critical open source projects have integrated into Google’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html&amp;#34;&amp;gt;OSS-Fuzz&amp;lt;/a&amp;gt; program, resulting in over &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/oss-fuzz/issues/list?q=Type%3DBug-Security%20status%3AVerified&amp;amp;can=1&amp;#34;&amp;gt;6,500&amp;lt;/a&amp;gt; vulnerabilities and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/oss-fuzz/issues/list?q=Type%3DBug%20status%3AVerified%20-Type%3DBug-Security&amp;amp;can=1&amp;#34;&amp;gt;21,000&amp;lt;/a&amp;gt; functional bugs being fixed. ClusterFuzzLite goes hand-in-hand with OSS-Fuzz, by catching regression bugs much earlier in the development process. Large projects including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/systemd/systemd/actions/workflows/cifuzz.yml&amp;#34;&amp;gt;systemd&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/curl/curl/actions/workflows/fuzz.yml&amp;#34;&amp;gt;curl&amp;lt;/a&amp;gt; are already using ClusterFuzzLite during code review, with positive results. According to Daniel Stenberg, author of curl, “When the human reviewers nod and have approved the code and your static code analyzers and linters can&amp;amp;#39;t detect any more issues, fuzzing is what takes you to the next level of code maturity and robustness. OSS-Fuzz and ClusterFuzzLite help us maintain curl as a quality project, around the clock, every day and every commit.” With the release of ClusterFuzzLite, any project can integrate this essential testing standard and benefit from fuzzing. ClusterFuzzLite offers many of the same features as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/clusterfuzz&amp;#34;&amp;gt;ClusterFuzz&amp;lt;/a&amp;gt; , such as continuous fuzzing, sanitizer support, corpus management, and coverage report generation. Most importantly, it’s easy to set up and works with closed source projects, making ClusterFuzzLite a convenient option for any developer who wants to fuzz their software.&amp;lt;br&amp;gt;
With ClusterFuzzLite, fuzzing is no longer just an idealized &amp;amp;#34;bonus&amp;amp;#34; round of testing for those who have access to it, but a critical must-have step that everyone can use continuously on every software project. By finding and preventing bugs before they enter the codebase we can build a more secure software ecosystem.&amp;lt;br&amp;gt;
To learn more, check out the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/clusterfuzzlite/&amp;#34;&amp;gt;ClusterFuzzLite documentation&amp;lt;/a&amp;gt; . ClusterFuzzLite currently supports &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/actions&amp;#34;&amp;gt;GitHub Actions&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/build&amp;#34;&amp;gt;Google Cloud Build&amp;lt;/a&amp;gt; . We built this with CI system extensibility in mind, and adding support for other CI systems is straightforward. Please &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/clusterfuzzlite/issues/new&amp;#34;&amp;gt;contact us&amp;lt;/a&amp;gt; if you’re interested in contributing support, or have any questions, feedback or feature requests.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211111-080624/</link>
      <pubDate>Thu, 11 Nov 2021 08:06:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211111-080624/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/11/10/glitch-ot-rm.html&amp;#34;&amp;gt;The privileged daemon that used shell-quote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/11/10/division2-targeted-set.html&amp;#34;&amp;gt;Set item drops in Division 2, Tom Clancy’s The&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211111-041714/</link>
      <pubDate>Thu, 11 Nov 2021 04:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211111-041714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/account/login?redirect=%2F%3F&amp;amp;email=&amp;amp;with_password=&amp;amp;justTrying=&amp;#34;&amp;gt;Sign in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211111-000654/</link>
      <pubDate>Thu, 11 Nov 2021 00:06:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211111-000654/</guid>
      <description>Most of us have probably heard the term “smishing” — which is a portmanteau for traditional ph ishing scams sent through SMS text messages. Smishing messages usually include a link to a site that spoofs a popular bank and tries to siphon personal information. But increasingly, phishers are turning to a hybrid form of smishing — blasting out linkless text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text.&amp;lt;br&amp;gt;
KrebsOnSecurity recently heard from a reader who said his daughter received an SMS that said it was from her bank, and inquired whether she’d authorized a $5,000 payment from her account. The message said she should reply “Yes” or “No,” or 1 to decline future fraud alerts.&amp;lt;br&amp;gt;
Since this seemed like a reasonable and simple request — and she indeed had an account at the bank in question — she responded, “NO.”&amp;lt;br&amp;gt;
Seconds later, her mobile phone rang.&amp;lt;br&amp;gt;
“When she replied ‘no,’ someone called immediately, and the caller ID said ‘JP Morgan Chase’,” reader Kris Stevens told KrebsOnSecurity. “The person on the phone said they were from the fraud department and they needed to help her secure her account but needed information from her to make sure they were talking to the account owner and not the scammer.”&amp;lt;br&amp;gt;
Thankfully, Stevens said his daughter had honored the gold rule regarding incoming phone calls about fraud: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/04/when-in-doubt-hang-up-look-up-call-back/&amp;#34;&amp;gt;When In Doubt, Hang up, Look up, and Call Back&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“She knows the drill so she hung up and called Chase, who confirmed they had not called her,” he said. “What was different about this was it was all very smooth. No foreign accents, the pairing of the call with the text message, and the fact that she does have a Chase account.”&amp;lt;br&amp;gt;
The remarkable aspect of these phone-based phishing scams is typically the attackers never even try to log in to the victim’s bank account. The entirety of the scam takes place over the phone.&amp;lt;br&amp;gt;
We don’t know what the fraudsters behind this clever hybrid SMS/voice phishing scam intended to do with the information they might have coaxed from Stevens’ daughter. But in previous stories and reporting on voice phishing schemes, the fraudsters used the phished information to set up new financial accounts in the victim’s name, which they then used to receive and forward large wire transfers of stolen funds.&amp;lt;br&amp;gt;
Even many security-conscious people tend to focus on protecting their online selves, while perhaps discounting the threat from less technically sophisticated phone-based scams. In 2020 I told the story of “Mitch” — the tech-savvy Silicon Valley executive &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/04/when-in-doubt-hang-up-look-up-call-back/&amp;#34;&amp;gt;who got voice phished after he thought he’d turned the tables on the scammers&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Unlike Stevens’ daughter, Mitch didn’t hang up with the suspected scammers. Rather, he put them on hold. Then Mitch called his bank on the other line and asked if their customer support people were in fact engaged in a separate conversation with him over the phone.&amp;lt;br&amp;gt;
The bank replied that they were indeed speaking to the same customer on a different line at that very moment. Feeling better, Mitch got back on the line with the scammers. What Mitch couldn’t have known at that point was that a member of the fraudster’s team simultaneously was impersonating him on the phone with the bank’s customer service people.&amp;lt;br&amp;gt;
So don’t be Mitch. Don’t try to outsmart the crooks. Just remember this anti-fraud mantra, and maybe repeat it a few times in front of your friends and family: When in doubt, hang up, look up, and call back. If you believe the call might be legitimate, look up the number of the organization supposedly calling you, and call them back.&amp;lt;br&amp;gt;
And I suppose the same time-honored advice about not replying to spam email goes doubly for unsolicited text messages: When in doubt, it’s best not to respond.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/sms-about-bank-fraud-as-a-pretext-for-voice-phishing/&amp;#34;&amp;gt;SMS About Bank Fraud as a Pretext for Voice Phishing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211110-200914/</link>
      <pubDate>Wed, 10 Nov 2021 20:09:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211110-200914/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/lbb-customer-story/&amp;#34;&amp;gt;Dhruv Mathur is the Co-Founder and Head of Product at LBB, a marketplace for customers to shop Indian brands and discover new products. LBB boasts 2 million monthly active users shopping 200,000&#43;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211110-000736/</link>
      <pubDate>Wed, 10 Nov 2021 00:07:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211110-000736/</guid>
      <description>Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in active attacks online, and four of the flaws were disclosed publicly before today — potentially giving adversaries a head start in figuring out how to exploit them.&amp;lt;br&amp;gt;
Among the zero-day bugs is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42292&amp;#34;&amp;gt;CVE-2021-42292&amp;lt;/a&amp;gt; , a “security feature bypass” problem with Microsoft Excel versions 2013-2021 that could allow attackers to install malicious code just by convincing someone to open a booby-trapped Excel file (Microsoft says Mac versions of Office are also affected, but several places are reporting that Office for Mac security updates aren’t available yet).&amp;lt;br&amp;gt;
Microsoft’s revised, more sparse security advisories don’t offer much detail on what exactly is being bypassed in Excel with this flaw. But Dustin Childs over at Trend Micro’s Zero Day Initiative &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.zerodayinitiative.com/blog/2021/11/9/the-november-2021-security-update-review&amp;#34;&amp;gt;says&amp;lt;/a&amp;gt; the vulnerability is likely due to loading code that should be limited by a user prompt — such as a warning about external content or scripts — but for whatever reason that prompt does not appear, thus bypassing the security feature.&amp;lt;br&amp;gt;
The other critical flaw patched today that’s already being exploited in the wild is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42321&amp;#34;&amp;gt;CVE-2021-42321&amp;lt;/a&amp;gt; , yet another zero-day in Microsoft Exchange Server . You may recall that earlier this year a majority of the world’s organizations running Microsoft Exchange Servers were &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/&amp;#34;&amp;gt;hit with four zero-day attacks that let thieves install backdoors and siphon email&amp;lt;/a&amp;gt; . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/microsoft-patch-tuesday-november-2021-edition/#more-57502&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211109-202106/</link>
      <pubDate>Tue, 09 Nov 2021 20:21:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211109-202106/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/09/technology/meta-facebook-ad-targeting.html&amp;#34;&amp;gt;Meta plans to remove thousands of sensitive ad-targeting categories. Ad buyers will no longer be able to use topics such as health, race or sexual orientation to target people with unwanted ads on Facebook or other Meta apps. By Mike Isaac and Tiffany Hsu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211109-201554/</link>
      <pubDate>Tue, 09 Nov 2021 20:15:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211109-201554/</guid>
      <description>by value&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-learner-track&amp;#34;&amp;gt;c&#43;&#43;-learner-track&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#parameter-only-types&amp;#34;&amp;gt;parameter-only-types&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
It is idiomatic to pass&amp;lt;br&amp;gt;
by value. Let’s see why.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211109-160700/</link>
      <pubDate>Tue, 09 Nov 2021 16:06:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211109-160700/</guid>
      <description>Exhibit #1: Yaroslav Vasinskyi , the 22-year-old Ukrainian national accused of being REvil Affiliate #22. Vasinskyi was arrested Oct. 8 in Poland, which maintains an extradition treaty with the United States. Prosecutors say Vasinskyi was involved in a number of REvil ransomware attacks, including the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html&amp;#34;&amp;gt;July 2021 attack&amp;lt;/a&amp;gt; against Kaseya , a Miami-based company whose products help system administrators manage large networks remotely.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211109-041306/</link>
      <pubDate>Tue, 09 Nov 2021 04:13:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211109-041306/</guid>
      <description>Aarthi Ramamurthy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/aarthir&amp;#34;&amp;gt;@aarthir&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Replays is here on @Clubhouse and I’m really, really excited! If you’ve been waiting to listen to the @typesfast interview from last week on @GoodTimeShowCH from @sriramk, @pmarca, @stevesi and me, here it is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/G95k5iwdIy&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/G95k5iwdIy&amp;#34;&amp;gt;https://t.co/G95k5iwdIy&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; (update app to latest version).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211109-040709/</link>
      <pubDate>Tue, 09 Nov 2021 04:07:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211109-040709/</guid>
      <description>The U.S. Department of Justice today announced the arrest of Ukrainian man accused of deploying ransomware on behalf of the REvil ransomware gang, a Russian-speaking cybercriminal collective that has extorted hundreds of millions from victim organizations. The DOJ also said it had seized $6.1 million in cryptocurrency sent to another REvil affiliate, and that the U.S. Department of State is now offering up to $10 million for the name or location any key REvil leaders, and up to $5 million for information on REvil affiliates.&amp;lt;br&amp;gt;
If it sounds unlikely that a normal Internet user could make millions of dollars unmasking the identities of REvil gang members, take heart and consider that the two men indicted as part &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/pr/ukrainian-arrested-and-charged-ransomware-attack-kaseya&amp;#34;&amp;gt;this law enforcement action&amp;lt;/a&amp;gt; do not appear to have done much to separate their cybercriminal identities from their real-life selves.&amp;lt;br&amp;gt;
Exhibit #1: Yaroslav Vasinskyi , the 22-year-old Ukrainian national accused of being REvil Affiliate #22. Vasinskyi was arrested Oct. 8 in Poland, which maintains an extradition treaty with the United States. Prosecutors say Vasinskyi was involved in a number of REvil ransomware attacks, including the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html&amp;#34;&amp;gt;July 2021 attack&amp;lt;/a&amp;gt; against Kaseya , Miami-based company whose products help system administrators manage large networks remotely.&amp;lt;br&amp;gt;
Yaroslav Vasinksyi’s Vkontakte profile reads “If they tell you nasty things about me, believe every word.”&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/press-release/file/1447126/download&amp;#34;&amp;gt;his indictment&amp;lt;/a&amp;gt; (PDF), Vasinskyi used a variety of hacker handles, including “Profcomserv” — the nickname behind an online service that floods phone numbers with junk calls for a fee. Prosecutors say Vasinskyi also used the monikers  “ Yarik45 ,” and “ Yaroslav2468 .”&amp;lt;br&amp;gt;
These last two nicknames correspond to accounts on several top cybercrime forums way back in 2013, where a user named “Yaroslav2468” registered using the email address &amp;lt;a href=&amp;#34;mailto:yarik45@gmail.com&amp;#34;&amp;gt;yarik45@gmail.com&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
That email address was used to register an account at Vkontakte (the Russian version of Facebook/Meta) under the profile name of “Yaroslav ‘sell the blood of css’ Vasinskyi.” Vasinskyi’s Vkontakte profile says his current city as of Oct. 3 was Lublin, Poland. Perhaps tauntingly, Vasinskyi’s profile page also lists the FBI’s 1-800 tip line as his contact phone number. He’s now in custody in Poland, awaiting extradition to the United States.&amp;lt;br&amp;gt;
Exhibit #2: Yevgeniy Igorevich Polyanin , the 28-year-old Russian national who is alleged to be REvil Affiliate #23. The DOJ said it seized $6.1 million in funds traceable to alleged ransom payments received by Polyanin, and that the defendant had been involved in REvil ransomware attacks on multiple U.S. victim organizations.&amp;lt;br&amp;gt;
The FBI’s wanted poster for Polyanin.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/press-release/file/1447121/download&amp;#34;&amp;gt;Polyanin’s indictment&amp;lt;/a&amp;gt; (PDF) says he also favored numerous hacker handles, including LK4D4 , Damnating , Damn2life , Noolleds , and Antunpitre . Some of these nicknames go back more than a decade on Russian cybercrime forums, many of which have been hacked and relieved of their user databases over the years.&amp;lt;br&amp;gt;
Among those was carder[.]su, and that forum’s database says a user by the name “Damnating” registered with the forum in 2008 using the email address &amp;lt;a href=&amp;#34;mailto:damnating@yandex.ru&amp;#34;&amp;gt;damnating@yandex.ru&amp;lt;/a&amp;gt; . Sure enough, there is a Vkontakte profile tied to that email address under the name “Yevgeniy ‘damn’ Polyanin” from Barnaul, a city in the southern Siberian region of Russia. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/#more-57474&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/revil-ransom-arrest-6m-seizure-and-10m-reward/&amp;#34;&amp;gt;REvil Ransom Arrest, $6M Seizure, and $10M Reward&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211109-001836/</link>
      <pubDate>Tue, 09 Nov 2021 00:18:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211109-001836/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber/u-s-charges-ukrainian-and-russian-in-major-ransomware-spree-seizes-6-million-idUSKBN2HT1WC&amp;#34;&amp;gt;U.S. charges Ukrainian and Russian in major ransomware spree, seizes $6 million&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
6:02pm EST&amp;lt;br&amp;gt;
The U.S. Justice Department charged a Ukraine national and a Russian in one of the worst ransomware attacks against American targets, court filings showed on Monday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211107-082028/</link>
      <pubDate>Sun, 07 Nov 2021 08:20:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211107-082028/</guid>
      <description>Thousands rally in cold, damp Glasgow for COP26 climate action &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/cop/thousands-rally-rainy-glasgow-cop26-climate-action-2021-11-06/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20211107-080924/</link>
      <pubDate>Sun, 07 Nov 2021 08:09:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20211107-080924/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/last-of-us-part-2/&amp;#34;&amp;gt;It can’t be for nothing: notes from The Last of Us Part 2&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211106-042134/</link>
      <pubDate>Sat, 06 Nov 2021 04:21:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211106-042134/</guid>
      <description>After daylong standoff, Democrats reach a tentative agreement to pass the bipartisan infrastructure bill and climate change bill &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/bidens-sweeping-infrastructure-social-spending-bills-finally-get-vote-2021-11-05/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211106-001950/</link>
      <pubDate>Sat, 06 Nov 2021 00:19:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211106-001950/</guid>
      <description>Become a paid subscriber&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211106-001020/</link>
      <pubDate>Sat, 06 Nov 2021 00:10:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211106-001020/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-a-dynamodb-gui/&amp;#34;&amp;gt;As a DynamoDB user, you’ve likely encountered the need for a quick and easy way to modify the data.  This guide will teach you how to build GUI with CRUD functionality for your DynamoDB instance in about 15 minutes.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211105-201649/</link>
      <pubDate>Fri, 05 Nov 2021 20:16:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211105-201649/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#old-shit&amp;#34;&amp;gt;old-shit&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#paradigm-shift&amp;#34;&amp;gt;paradigm-shift&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I just finished reading William A. Granville’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://archive.org/details/fourthdimensionb00gran/&amp;#34;&amp;gt;The Fourth Dimension and the Bible&amp;lt;/a&amp;gt; (1922).
It’s quite mind-bending! I don’t mean the Biblical stuff (which is all quite a stretch),
but specifically Granville’s mathematical examples, several of which were completely new to me.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211105-201000/</link>
      <pubDate>Fri, 05 Nov 2021 20:10:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211105-201000/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/archilogic-customer-story/&amp;#34;&amp;gt;Tim, VP of Product and Customer Ops, needed to replace slow, messy spreadsheets with a real-time insights dashboard. He used Retool to make it happen.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211105-122237/</link>
      <pubDate>Fri, 05 Nov 2021 12:22:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211105-122237/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/05/technology/facebook-stores-meta-metaverse.html&amp;#34;&amp;gt;To Build the Metaverse, Meta First Wants to Build Stores The social networking company has discussed opening physical stores to showcase its virtual reality and augmented reality devices. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211105-122150/</link>
      <pubDate>Fri, 05 Nov 2021 12:21:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211105-122150/</guid>
      <description>November 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/11/05/Apollo-federation-2-gaslighting.html&amp;#34;&amp;gt;Breaking down Apollo Federation&amp;#39;s anti-FOSS corporate gaslighting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20211105-120806/</link>
      <pubDate>Fri, 05 Nov 2021 12:08:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20211105-120806/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-make-quitting-your-addiction-easier&amp;#34;&amp;gt;How to make quitting your addiction easier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/pursue-high-quality-leisure&amp;#34;&amp;gt;Pursue High-quality Leisure&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211105-081417/</link>
      <pubDate>Fri, 05 Nov 2021 08:14:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211105-081417/</guid>
      <description>Talking global supply chain chaos on @Clubhouse — join us right now! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/5Skina4Vo5&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/5Skina4Vo5&amp;#34;&amp;gt;https://t.co/5Skina4Vo5&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20211105-042055/</link>
      <pubDate>Fri, 05 Nov 2021 04:20:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20211105-042055/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-11-03-thank-you-github/&amp;#34;&amp;gt;Thank you, GitHub&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
This morning, I sent the following post to the GitHub team. TL;DR: I’m moving on to my next adventure, and Thomas Dohmke (currently Chief Product Officer) will be GitHub’s next CEO.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology - by Alex Kantrowitz</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211105-030555/</link>
      <pubDate>Fri, 05 Nov 2021 03:05:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211105-030555/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-case-to-reform-the-share-button&amp;#34;&amp;gt;The Case To Reform The Share Button, According To Facebook’s Own Research&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-case-to-reform-the-share-button&amp;#34;&amp;gt;New leaked document shows Facebook’s Share button spreads misinformation pervasively after two hops down the chain. Fix the button, fix the platform.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20211105-023502/</link>
      <pubDate>Fri, 05 Nov 2021 02:35:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20211105-023502/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/pages/corporate-documents&amp;#34;&amp;gt;Corporate Documents&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20211105-023453/</link>
      <pubDate>Fri, 05 Nov 2021 02:34:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20211105-023453/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/pages/corporate-documents&amp;#34;&amp;gt;Corporate Documents&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211105-023212/</link>
      <pubDate>Fri, 05 Nov 2021 02:32:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211105-023212/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/hashmap/&amp;#34;&amp;gt;HashMap&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211105-022947/</link>
      <pubDate>Fri, 05 Nov 2021 02:29:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211105-022947/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/11/04/science/astronomy-decadal-survey-telescope.html&amp;#34;&amp;gt;Out There A New 10-Year Plan for the Cosmos On astronomers’ wish list for the next decade: two giant telescopes and a space telescope to search for life and habitable worlds beyond Earth. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211105-022753/</link>
      <pubDate>Fri, 05 Nov 2021 02:27:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211105-022753/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-03027-y&amp;#34;&amp;gt;US astronomy&amp;#39;s 10-year plan is super-ambitious&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Its ‘decadal survey’ pitches big new space observatories, funding for large telescopes and a reckoning over social issues plaguing the field.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211105-022231/</link>
      <pubDate>Fri, 05 Nov 2021 02:22:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211105-022231/</guid>
      <description>&amp;lt;p&amp;gt;Sriram Krishnan - sriramk.eth &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/sriramk&amp;#34;&amp;gt;@sriramk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
we have @typesfast joining @aarthir, me and @pmarca tomorrow Nov 4th 10pm PT to talk about his deep dive into the supply chain crisis and the &amp;amp;quot;tweet storm that saved Christmas&amp;amp;quot;.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;What do you want us to ask Ryan? Post question here.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;lt;em&amp;gt;Only on @GoodTimeShowCH on @Clubhouse&amp;lt;/em&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Security Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/sovietizing/ohioan/20211105-021910/</link>
      <pubDate>Fri, 05 Nov 2021 02:19:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sovietizing/ohioan/20211105-021910/</guid>
      <description>Earlier this year the European Commission unveiled its proposed ‘Digital Identity Framework’, a revision to the 2014 eIDAS regulation. While the draft law includes many welcome provisions on the security … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/11/04/mozilla-publishes-position-paper-on-the-eu-digital-identity-framework/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211105-021848/</link>
      <pubDate>Fri, 05 Nov 2021 02:18:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211105-021848/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/getaround-customer-story/&amp;#34;&amp;gt;How an operations analyst built an app so internal teams could connect car hosts with safe, convenient, and affordable parking spots faster and more reliably.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211105-021558/</link>
      <pubDate>Fri, 05 Nov 2021 02:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211105-021558/</guid>
      <description>&amp;lt;p&amp;gt;The holiday shopping season always means big business for phishers, who tend to find increased success this time of year with a lure about a wayward package that needs redelivery. Here’s a look at a fairly elaborate SMS-based phishing scam that spoofs FedEx in a bid to extract personal and financial information from unwary recipients.&amp;lt;br&amp;gt;
One of dozens of FedEx-themed phishing sites currently being advertised via SMS spam.&amp;lt;br&amp;gt;
Louis Morton , a security professional based in Fort Worth, Texas, forwarded an SMS phishing or “smishing” message sent to his wife’s mobile device that indicated a package couldn’t be delivered.&amp;lt;br&amp;gt;
“It is a nearly perfect attack vector at this time of year,” Morton said. “A link was included, implying that the recipient could reschedule delivery.”&amp;lt;br&amp;gt;
Attempting to visit the domain in the phishing link — o001cfedeex[.]com — from a desktop web browser redirects the visitor to a harmless page with ads for car insurance quotes. But by loading it in a mobile device (or by mimicking one using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.mozilla.org/en-US/docs/Learn/Common_questions/What_are_browser_developer_tools&amp;#34;&amp;gt;developer tools&amp;lt;/a&amp;gt; ), we can see the intended landing page pictured in the screenshot to the right — returns-fedex[.]com .&amp;lt;br&amp;gt;
Blocking non-mobile users from visiting the domain can help minimize scrutiny of the site from non-potential victims, such as security researchers, and thus potentially keep the scam site online longer.&amp;lt;br&amp;gt;
Clicking “Schedule new delivery” brings up a page that requests your name, address, phone number and date of birth. Those who click “Next Step” after providing that information are asked to add a payment card to cover the $2.20 “redelivery fee.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/tis-the-season-for-the-wayward-package-phish/#more-57437&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A number of publications in September warned about the emergence of “ Groove ,” a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests online. It now appears that Groove was all a big hoax designed to toy with security firms and journalists.&amp;lt;br&amp;gt;
“An appeal to business brothers!” reads the Oct. 22 post from Groove calling for attacks on the United States government sector.&amp;lt;br&amp;gt;
Groove was first announced Aug. 22 on RAMP , a new and fairly exclusive Russian-language darknet cybercrime forum.&amp;lt;br&amp;gt;
“GROOVE is first and foremost an aggressive financially motivated criminal organization dealing in industrial espionage for about two years,” wrote RAMP’s administrator “Orange” in a post asking forum members to compete in a contest for designing a website for the new group. “Let’s make it clear that we don’t do anything without a reason, so at the end of the day, it’s us who will benefit most from this contest.”&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.mcafee.com/blogs/enterprise/mcafee-enterprise-atr/how-groove-gang-is-shaking-up-the-ransomware-as-a-service-market-to-empower-affiliates/&amp;#34;&amp;gt;a report&amp;lt;/a&amp;gt; published by McAfee , Orange launched RAMP to appeal to ransomware-related threat actors who were were ousted from major cybercrime forums for being too toxic, or to cybercriminals who complained of being short-changed or stiffed altogether by different ransomware affiliate programs.&amp;lt;br&amp;gt;
The report said RAMP was the product of a dispute between members of the Babuk ransomware gang, and that its members likely had connections to another ransomware group called BlackMatter .&amp;lt;br&amp;gt;
“[McAfee] believes, with high confidence, that the Groove gang is a former affiliate or subgroup of the Babuk gang, who are willing to collaborate with other parties, as long as there is financial gain for them,” the report said. “Thus, an affiliation with the BlackMatter gang is likely.”&amp;lt;br&amp;gt;
In the first week of September, Groove posted on its darknet blog nearly 500,000 login credentials for customers of Fortinet VPN products, usernames and passwords that could be used to remotely connect to vulnerable systems. Fortinet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fortinet.com/blog/psirt-blogs/malicious-actor-discloses-fortigate-ssl-vpn-credentials&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; the credentials were collected from systems that hadn’t yet implemented a patch issued in May 2019.&amp;lt;br&amp;gt;
Some security experts said the post of the Fortinet VPN usernames and passwords was aimed at drawing new affiliates to Groove. But it seems more likely the credentials were posted to garner the attention of security researchers and journalists.&amp;lt;br&amp;gt;
Sometime in the last week, Groove’s darknet blog disappeared. In a post on the Russian cybercrime forum XSS , an established cybercrook using the handle “ Boriselcin ” explained that Groove was little more than a pet project to screw with the media and security industry.&amp;lt;br&amp;gt;
“For those who don’t understand what’s going on: I set up a fake Groove Gang and named myself a gang,” Boriselcin wrote. The rest of the post reads:&amp;lt;br&amp;gt;
“They ate it up, I dumped 500k old Fortinet [access credentials] that no one needed and they ate it up. I say that I am going to target the U.S. government sector and they eat it up. Few journalists realized that this was all a show, a fake, and a scam! And my respect goes out to those who figured it out. I don’t even know what to do now with this blog with a ton of traffic. Maybe sell it? Now I just need to start writing [the article], but I can’t start writing it without checking everything.”&amp;lt;br&amp;gt;
A review of Boriselcin’s recent postings on XSS indicate he has been planning this scheme for several months. On Sept. 13, Boriselcin posted that “several topics are ripening,” and that he intended to publish an article about duping the media and security firms.&amp;lt;br&amp;gt;
“Manipulation of large information security companies and the media through a ransom blog,” he wrote. “It’s so funny to read Twitter and the news these days But the result is great so far. Triggering the directors of information security companies. We fuck the supply chain of the information security office.”&amp;lt;br&amp;gt;
Image: @nokae8&amp;lt;br&amp;gt;
This vulnerability is, as far as I know, the first one to affect almost everything.”&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/tis-the-season-for-the-wayward-package-phish/&amp;#34;&amp;gt;‘Tis the Season for the Wayward Package Phish&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/the-groove-ransomware-gang-was-a-hoax/&amp;#34;&amp;gt;The ‘Groove’ Ransomware Gang Was a Hoax&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211105-021544/</link>
      <pubDate>Fri, 05 Nov 2021 02:15:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211105-021544/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/11/02/multi-account-containers.html&amp;#34;&amp;gt;Firefox Multi-Account Containers now needing permission to “Exchange messages with programs other than Firefox”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211102-040936/</link>
      <pubDate>Tue, 02 Nov 2021 04:09:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211102-040936/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/import-csv-files-into-a-firestore-db-firebase/&amp;#34;&amp;gt;Importing a CSV file into your Firestore database is one of the most common and fundamental ways of getting information into a database. In this post, you&amp;#39;ll learn to do it, as well as learn concepts which can help you get all sorts of other data into your Firestore instance.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211102-002135/</link>
      <pubDate>Tue, 02 Nov 2021 00:21:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211102-002135/</guid>
      <description>New York grand jury indicts real estate heir Robert Durst for the 1982 murder of his first wife, Kathleen Durst &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/litigation/real-estate-heir-robert-durst-indicted-1982-murder-first-wife-kathie-durst-2021-11-01/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211102-001836/</link>
      <pubDate>Tue, 02 Nov 2021 00:18:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211102-001836/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/11/trick-treat-paying-leets-and-sweets-for.html&amp;#34;&amp;gt;Trick &amp;amp;amp; Treat! 🎃 Paying Leets and Sweets for Linux Kernel privescs and k8s escapes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Eduardo Vela, Google Bug Hunters Team Starting today and for the next 3 months (until January 31 2022), we will pay 31,337 USD to security researchers that exploit privilege escalation in our lab environment with a patched vulnerability, and 50,337 USD to those that use a previously unpatched vulnerability, or a new exploit technique. We are constantly investing in the security of the Linux Kernel because much of the internet, and Google—from the devices in our pockets, to the services running on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kubernetes.io/&amp;#34;&amp;gt;Kubernetes&amp;lt;/a&amp;gt; in the cloud—depend on the security of it. We &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html&amp;#34;&amp;gt;research its vulnerabilities and attacks&amp;lt;/a&amp;gt; , as well as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html&amp;#34;&amp;gt;study and develop its defenses&amp;lt;/a&amp;gt; . But we know that there is more work to do. That’s why we have decided to build on top of our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/05/expanding-our-work-with-open-source.html&amp;#34;&amp;gt;kCTF VRP&amp;lt;/a&amp;gt; from last year and triple our previous reward amounts (for at least the next 3 months). Our base rewards for each publicly patched vulnerability is 31,337 USD (at most one exploit per vulnerability), but the reward can go up to 50,337 USD in two cases:&amp;lt;br&amp;gt;
If the vulnerability was otherwise unpatched in the Kernel (0day)&amp;lt;br&amp;gt;
If the exploit uses a new attack or technique, as determined by Google&amp;lt;br&amp;gt;
We hope the new rewards will encourage the security community to explore new Kernel exploitation techniques to achieve privilege escalation and drive quicker fixes for these vulnerabilities. It is important to note, that the easiest exploitation primitives are not available in our lab environment due to the hardening done on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/container-optimized-os/docs&amp;#34;&amp;gt;Container-Optimized OS&amp;lt;/a&amp;gt; . Note this program complements Android&amp;amp;#39;s VRP rewards, so exploits that work on Android could also be eligible for up to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/6171833274204160&amp;#34;&amp;gt;250,000 USD&amp;lt;/a&amp;gt; (that&amp;amp;#39;s in addition to this program). The mechanics are:&amp;lt;br&amp;gt;
Connect to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/kctf/vrp&amp;#34;&amp;gt;kCTF VRP cluster&amp;lt;/a&amp;gt; , obtain root and read the flag (read &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/security-research/blob/master/pocs/linux/cve-2021-22555/writeup.md&amp;#34;&amp;gt;this writeup&amp;lt;/a&amp;gt; for how it was done before, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/kctf/security-threat-model.html&amp;#34;&amp;gt;this threat model&amp;lt;/a&amp;gt; for inspiration), and then submit your flag and a checksum of your exploit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeQf6aWmIIjtG4sbEKfgOBK0KL3zzeHCrsgA1EcPr-xsFAk7w/viewform&amp;#34;&amp;gt;in this form&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
(If applicable) report vulnerabilities to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/kctf/blob/v1/SECURITY.md&amp;#34;&amp;gt;upstream&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We strongly recommend including a patch since that could qualify for an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/patch-rewards&amp;#34;&amp;gt;additional reward&amp;lt;/a&amp;gt; from our Patch Reward Program, but please report vulnerabilities upstream promptly once you confirm they are exploitable.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/report/vrp&amp;#34;&amp;gt;Report your finding&amp;lt;/a&amp;gt; to Google VRP once all patches are publicly available (we don&amp;amp;#39;t want to receive details of unpatched vulnerabilities ahead of the public.)&amp;lt;br&amp;gt;
Provide the exploit code and the algorithm used to calculate the hash checksum.&amp;lt;br&amp;gt;
A rough description of the exploit strategy is welcome.&amp;lt;br&amp;gt;
Reports will be triaged on a weekly basis. If anyone has problems with the lab environment (if it&amp;amp;#39;s unavailable, technical issues or other questions), contact us on Discord in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discord.gg/V8UqnZ6JBG&amp;#34;&amp;gt;#kctf&amp;lt;/a&amp;gt; . You can read more details about the program &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/kctf/vrp&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . Happy hunting!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211102-001442/</link>
      <pubDate>Tue, 02 Nov 2021 00:14:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211102-001442/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/logistics/&amp;#34;&amp;gt;supply chains, logistics, and infrastructure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20211101-201318/</link>
      <pubDate>Mon, 01 Nov 2021 20:13:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20211101-201318/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/keeping-spam-off-signal/&amp;#34;&amp;gt;Improving first impressions on Signal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The phenomenon of unsolicited and unwanted messaging dates back to the earliest communication platforms: from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.livescience.com/7028-ancient-cave-art-full-teenage-graffiti.html&amp;#34;&amp;gt;prehistoric cave graffiti&amp;lt;/a&amp;gt; and postal chain letters to popup ads and robocalls. To prevent spam, most online services rely on large-scale inspection of plaintext conversation content or detailed social-graph analysis to determine who is saying what to whom and whether or not that should be allowed. At Signal, we build on a foundation of privacy and do not have access to that type of data or metadata.&amp;lt;br&amp;gt;
We build Signal in the open, with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/signalapp&amp;#34;&amp;gt;publicly available&amp;lt;/a&amp;gt; source code for our applications and servers. To keep Signal a free global communication service without spam, we must depart from our totally-open posture and develop one piece of the server in private: a system for detecting and disrupting spam campaigns. Unlike encryption protocols, which are designed to be provably secure even if everyone knows how they work, spam detection is an ongoing chore for which there is no concrete resolution and for which transparency is a major disadvantage. If we put this code on the Internet alongside everything else, spammers would just read it and adjust their tactics to gain an advantage in the cat-and-mouse game of keeping spam off the network. The Signal protocols, cryptography, and source code are peer reviewed, shared for independent inspection, and provably private by design. We are bound by these security guarantees, so that your conversations and contacts remain as private and protected as ever, even if we keep spam-fighting tools out of sight.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211101-120759/</link>
      <pubDate>Mon, 01 Nov 2021 12:07:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211101-120759/</guid>
      <description>Virtually all compilers — programs that transform human-readable source code into computer-executable machine code — are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities into any software without being detected, new research released today warns. The vulnerability disclosure was coordinated with multiple organizations, some of whom are now releasing updates to address the security weakness.&amp;lt;br&amp;gt;
Researchers with the University of Cambridge discovered a bug that affects most computer code compilers and many software development environments. At issue is a component of the digital text encoding standard &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://home.unicode.org/&amp;#34;&amp;gt;Unicode&amp;lt;/a&amp;gt; , which allows computers to exchange information regardless of the language used. Unicode currently defines more than 143,000 characters across 154 different language scripts (in addition to many non-script character sets, such as emojis).&amp;lt;br&amp;gt;
Specifically, the weakness involves Unicode’s bi-directional or “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.w3.org/International/articles/inline-bidi-markup/uba-basics&amp;#34;&amp;gt;Bidi” algorithm&amp;lt;/a&amp;gt; , which handles displaying text that includes mixed scripts with different display orders, such as Arabic — which is read right to left — and English (left to right).&amp;lt;br&amp;gt;
But computer systems need to have a deterministic way of resolving conflicting directionality in text. Enter the “Bidi override,” which can be used to make left-to-right text read right-to-left, and vice versa.&amp;lt;br&amp;gt;
“In some scenarios, the default ordering set by the Bidi Algorithm may not be sufficient,” the Cambridge researchers wrote. “For these cases, Bidi override control characters enable switching the display ordering of groups of characters.”&amp;lt;br&amp;gt;
Bidi overrides enable even single-script characters to be displayed in an order different from their logical encoding. As the researchers point out, this fact has previously been exploited &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/09/right-to-left-override-aids-email-attacks/&amp;#34;&amp;gt;to disguise the file extensions of malware disseminated via email&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Here’s the problem: Most programming languages let you put these Bidi overrides in comments and strings. This is bad because most programming languages allow comments within which all text — including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Control_character&amp;#34;&amp;gt;control characters&amp;lt;/a&amp;gt; — is ignored by compilers and interpreters. Also, it’s bad because most programming languages allow &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ibm.com/docs/en/zos/2.3.0?topic=literals-string&amp;#34;&amp;gt;string literals&amp;lt;/a&amp;gt; that may contain arbitrary characters, including control characters.&amp;lt;br&amp;gt;
“So you can use them in source code that appears innocuous to a human reviewer [that] can actually do something nasty,” said Ross Anderson , a professor of computer security at Cambridge and co-author of the research. “That’s bad news for projects like Linux and Webkit that accept contributions from random people, subject them to manual review, then incorporate them into critical code. This vulnerability is, as far as I know, the first one to affect almost everything.”&amp;lt;br&amp;gt;
The research paper, which dubbed the vulnerability “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.trojansource.codes/&amp;#34;&amp;gt;Trojan Source&amp;lt;/a&amp;gt; ,” notes that while both comments and strings will have syntax-specific semantics indicating their start and end, these bounds are not respected by Bidi overrides . From the paper:&amp;lt;br&amp;gt;
“Therefore, by placing Bidi override characters exclusively within comments and strings, we can smuggle them into source code in a manner that most compilers will accept. Our key insight is that we can reorder source code characters in such a way that the resulting display order also represents syntactically valid source code.”&amp;lt;br&amp;gt;
“Bringing all this together, we arrive at a novel supply-chain attack on source code. By injecting Unicode Bidi override characters into comments and strings, an adversary can produce syntactically-valid source code in most modern languages for which the display order of characters presents logic that diverges from the real logic. In effect, we anagram program A into program B.”&amp;lt;br&amp;gt;
Anderson said such an attack could be challenging for a human code reviewer to detect, as the rendered source code looks perfectly acceptable.&amp;lt;br&amp;gt;
“If the change in logic is subtle enough to go undetected in subsequent testing, an adversary could introduce targeted vulnerabilities without being detected,” he said.&amp;lt;br&amp;gt;
Equally concerning is that Bidi override characters persist through the copy-and-paste functions on most modern browsers, editors, and operating systems.&amp;lt;br&amp;gt;
“Any developer who copies code from an untrusted source into a protected code base may inadvertently introduce an invisible vulnerability,” Anderson told KrebsOnSecurity. “Such code copying is a significant source of real-world security exploits.”&amp;lt;br&amp;gt;
Image: XKCD.com/2347/&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://isi.jhu.edu/~mgreen/&amp;#34;&amp;gt;Matthew Green&amp;lt;/a&amp;gt; , an associate professor at the Johns Hopkins Information Security Institute , said the Cambridge research clearly shows that most compilers can be tricked with Unicode into processing code in a different way than a reader would expect it to be processed.&amp;lt;br&amp;gt;
“Before reading this paper, the idea that Unicode could be exploited in some way wouldn’t have surprised me,” Green told KrebsOnSecurity. “What does surprise me is how many compilers will happily parse Unicode without any defenses, and how effective their right-to-left encoding technique is at sneaking code into codebases. That’s a really clever trick I didn’t even know was possible. Yikes.”&amp;lt;br&amp;gt;
Green said the good news is that the researchers conducted a widespread vulnerability scan, but were unable to find evidence that anyone was exploiting this. Yet.&amp;lt;br&amp;gt;
“The bad news is that there were no defenses to it, and now that people know about it they might start exploiting it,” Green said. “Hopefully compiler and code editor developers will patch this quickly! But since some people don’t update their development tools regularly there will be some risk for a while at least.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/trojan-source-bug-threatens-the-security-of-all-code/#more-57367&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/11/trojan-source-bug-threatens-the-security-of-all-code/&amp;#34;&amp;gt;‘Trojan Source’ Bug Threatens the Security of All Code&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-201819/</link>
      <pubDate>Sun, 31 Oct 2021 20:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-201819/</guid>
      <description>Moderna says FDA might take until January to complete review of its COVID-19 shot for adolescents &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/healthcare-pharmaceuticals/moderna-says-fda-needs-more-time-complete-review-its-covid-19-shot-adolescents-2021-10-31/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-162013/</link>
      <pubDate>Sun, 31 Oct 2021 16:20:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-162013/</guid>
      <description>G20 statement urges &amp;#39;meaningful and effective&amp;#39; action to limit global warming, but offers few concrete commitments &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/environment/g20-leaders-face-tough-climate-talks-second-day-summit-2021-10-30/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211031-121327/</link>
      <pubDate>Sun, 31 Oct 2021 12:13:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211031-121327/</guid>
      <description>&amp;lt;p&amp;gt;Sajith Pai &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/sajithpai&amp;#34;&amp;gt;@sajithpai&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
First appearance of &amp;#39;Product/Market Fit&amp;#39; in the Wild.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;This is 1937!&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Of course, I dont think they meant what @pmarca meant when he wrote &amp;#39;The Only Thing That Matters&amp;#39;. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/H6TmQ0Rlol&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/H6TmQ0Rlol&amp;#34;&amp;gt;https://t.co/H6TmQ0Rlol&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211031-082210/</link>
      <pubDate>Sun, 31 Oct 2021 08:22:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211031-082210/</guid>
      <description>October 31, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/10/31/Spooky.gmi&amp;#34;&amp;gt;On a dark and stormy night&amp;amp;hellip;&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211031-041548/</link>
      <pubDate>Sun, 31 Oct 2021 04:15:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211031-041548/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/30/Diablo-Immortal&amp;#34;&amp;gt;Diablo Immortal&amp;lt;/a&amp;gt; · I tried out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://diabloimmortal.blizzard.com/en-us/&amp;#34;&amp;gt;Diablo Immortal&amp;lt;/a&amp;gt; on my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/22/Galaxy-Tab-S7-Plus&amp;#34;&amp;gt;Galaxy Tab 7&#43;&amp;lt;/a&amp;gt; and, well, it’s pretty convincing off the top.     But I wonder if it’s ethical to play anything from Blizzard, these days?     Protip: At the moment you can’t get into the closed beta unless you’re on Android in Canada &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/30/Diablo-Immortal&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-002051/</link>
      <pubDate>Sun, 31 Oct 2021 00:20:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211031-002051/</guid>
      <description>How an open phone line exposed a &amp;#39;coup plan&amp;#39; at Canada&amp;#39;s Rogers Communications &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/media-telecom/how-an-accidental-phone-answer-exposed-coup-plan-canadas-rogers-communications-2021-10-30/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211031-001419/</link>
      <pubDate>Sun, 31 Oct 2021 00:14:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211031-001419/</guid>
      <description>Here&amp;#39;s our actual proposal. Doesn&amp;#39;t say anything  like that. Highly recommend reading primary sources :) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/V4x51PuQmf&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/V4x51PuQmf&amp;#34;&amp;gt;https://t.co/V4x51PuQmf&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SRXH6cuEp6&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SRXH6cuEp6&amp;#34;&amp;gt;https://t.co/SRXH6cuEp6&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20211030-200854/</link>
      <pubDate>Sat, 30 Oct 2021 20:08:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20211030-200854/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ieeexplore.ieee.org/document/9354592&amp;#34;&amp;gt;Scalable Scalable Vector Graphics: Automatic Translation of Interactive SVGs to a Multithread VDOM for Fast Rendering&amp;lt;/a&amp;gt; Michail Schwab, David Saffo, Nicholas Bond, Shash Sinha, Cody Dunne, Jeff Huang, James Tompkin, Michelle Borkin TVCG (Transactions on Visualization and Computer Graphics), to appear &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ssvg.io/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211030-162110/</link>
      <pubDate>Sat, 30 Oct 2021 16:21:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211030-162110/</guid>
      <description>U.S., EU expected to announce deal ending steel, aluminum tariff dispute this weekend &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us-eu-expected-announce-deal-ending-steel-aluminum-tariff-dispute-sources-say-2021-10-30/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211030-042231/</link>
      <pubDate>Sat, 30 Oct 2021 04:22:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211030-042231/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 3 (implementation via HashMap)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;a previous post&amp;lt;/a&amp;gt; , I showed how we can solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; (and hopefully other BFS problems as well) using a certain API for BFS, and we also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/18/competitive-programming-in-haskell-bfs-part-2-alternative-apis/&amp;#34;&amp;gt;explored some alternatives&amp;lt;/a&amp;gt; . I had a very interesting discussion with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blogs.ncl.ac.uk/andreymokhov/about/&amp;#34;&amp;gt;Andrey Mokhov&amp;lt;/a&amp;gt; in the comments about potential designs for an even more general API; more on that in a future post, perhaps!&amp;lt;br&amp;gt;
For today, though, I want to finally show one way to implement this API efficiently. Spoiler alert: this implementation ultimately won’t be fast enough for us, but it will be a helpful stepping stone on our way to a yet faster implementation (which will of course get its own post in due time).&amp;lt;br&amp;gt;
This post is literate Haskell; you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hub.darcs.net/byorgey/byorgey-wordpress/browse/2019-04-comprog-hs/22-BFS-impl-HashMap.lhs&amp;#34;&amp;gt;obtain the source from the darcs repo&amp;lt;/a&amp;gt; . We begin with a few&amp;lt;br&amp;gt;
pragmas and imports.&amp;lt;br&amp;gt;
{-# LANGUAGE RecordWildCards            #-} {-# LANGUAGE ScopedTypeVariables        #-} {-# LANGUAGE TupleSections              #-} module BFS where import Control.Arrow ( ( &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; ) ) import Data.Hashable ( Hashable ) import Data.HashMap.Strict ( HashMap , ( ! ) ) import qualified Data.HashMap.Strict as HM import Data.List ( foldl&amp;amp;#39; ) import Data.Sequence ( Seq ( .. ) , ViewL ( .. ) , ( |&amp;amp;gt; ) ) import qualified Data.Sequence as Seq&amp;lt;br&amp;gt;
Now a couple utility functions:&amp;lt;br&amp;gt;
(&amp;amp;gt;$&amp;amp;gt;)&amp;lt;br&amp;gt;
is just flipped function application, and&amp;lt;br&amp;gt;
exhaust&amp;lt;br&amp;gt;
iterates an&amp;lt;br&amp;gt;
(a -&amp;amp;gt; Maybe a)&amp;lt;br&amp;gt;
function as many times as possible, returning the last non-&amp;lt;br&amp;gt;
Nothing&amp;lt;br&amp;gt;
value.&amp;lt;br&amp;gt;
infixl 0 &amp;amp;gt;$&amp;amp;gt; ( &amp;amp;gt;$&amp;amp;gt; ) :: a -&amp;amp;gt; ( a -&amp;amp;gt; b ) -&amp;amp;gt; b ( &amp;amp;gt;$&amp;amp;gt; ) = flip ( $ ) {-# INLINE (&amp;amp;gt;$&amp;amp;gt;) #-} exhaust :: ( a -&amp;amp;gt; Maybe a ) -&amp;amp;gt; a -&amp;amp;gt; a exhaust f = go where go a = maybe a go ( f a )&amp;lt;br&amp;gt;
Here is the&amp;lt;br&amp;gt;
record that we ultimately want to produce; it should be familiar from previous posts.&amp;lt;br&amp;gt;
data BFSResult v = BFSR { getLevel :: v -&amp;amp;gt; Maybe Int , getParent :: v -&amp;amp;gt; Maybe v }&amp;lt;br&amp;gt;
While running our BFS, we’ll keep track of three things: the level of each vertex that has been encountered; a mapping from each encountered vertex to its parent; and a queue of vertices that have been encountered but yet to be processed. We use a&amp;lt;br&amp;gt;
Seq&amp;lt;br&amp;gt;
from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/containers-0.6.5.1/docs/Data-Sequence.html&amp;#34;&amp;gt;Data.Sequence&amp;lt;/a&amp;gt; to represent the queue, since it supports efficient (amortized constant-time) insertion and removal from either end of the sequence. There are certainly other potential ways to represent a queue in Haskell (and this probably deserves its own blog post) but&amp;lt;br&amp;gt;
Data.Sequence&amp;lt;br&amp;gt;
seems to give good performance for minimal effort (and in any case, as we’ll see, it’s not the performance bottleneck here). We use a pair of&amp;lt;br&amp;gt;
HashMap&amp;lt;br&amp;gt;
s to represent the&amp;lt;br&amp;gt;
maps.&amp;lt;br&amp;gt;
data BFSState v = BS { level :: HashMap v Int , parent :: HashMap v v , queue :: Seq v }&amp;lt;br&amp;gt;
Given a list of starting vertices, we can create an initial state, with a queue containing the starting vertices and all of them set to level 0.&amp;lt;br&amp;gt;
initBFSState :: ( Eq v , Hashable v ) =&amp;amp;gt; [ v ] -&amp;amp;gt; BFSState v initBFSState vs = BS ( HM.fromList ( map ( , 0 ) vs ) ) HM.empty ( Seq.fromList vs )&amp;lt;br&amp;gt;
Now, here is our imeplementation of BFS, using the API discussed previously: it takes a list of starting vertices, a function giving the neighbors of each vertex, and a function identifying “target vertices” (so we can stop early), and returns a&amp;lt;br&amp;gt;
record. We create an initial state, run&amp;lt;br&amp;gt;
bfsStep&amp;lt;br&amp;gt;
as much as possible, and convert the end state into a result.&amp;lt;br&amp;gt;
bfs :: forall v . ( Eq v , Hashable v ) =&amp;amp;gt; [ v ] -&amp;amp;gt; ( v -&amp;amp;gt; [ v ] ) -&amp;amp;gt; ( v -&amp;amp;gt; Bool ) -&amp;amp;gt; BFSResult v bfs vs next goal = toResult $ exhaust bfsStep ( initBFSState vs ) where&amp;lt;br&amp;gt;
Converting the final&amp;lt;br&amp;gt;
BFSState&amp;lt;br&amp;gt;
is easy: just return functions that do a&amp;lt;br&amp;gt;
into the relevant map.&amp;lt;br&amp;gt;
toResult BS { .. } = BFSR ( `HM.lookup` level ) ( `HM.lookup` parent )&amp;lt;br&amp;gt;
To do a single step of BFS, try to remove the next vertex&amp;lt;br&amp;gt;
from the queue. If the queue is empty, or the next vertex is a goal vertex, return&amp;lt;br&amp;gt;
to signal that we are done.&amp;lt;br&amp;gt;
bfsStep st @ BS { .. } = case Seq.viewl queue of EmptyL -&amp;amp;gt; Nothing v :&amp;amp;lt; q&amp;amp;#39; | goal v -&amp;amp;gt; Nothing&amp;lt;br&amp;gt;
Otherwise, use the&amp;lt;br&amp;gt;
function to find the neighbors of&amp;lt;br&amp;gt;
, keep only those we haven’t encountered before ( i.e. those which are not keys in the&amp;lt;br&amp;gt;
map), and use each one to update the BFS state (being sure to first set the queue to the new one with&amp;lt;br&amp;gt;
removed).&amp;lt;br&amp;gt;
| otherwise -&amp;amp;gt; v &amp;amp;gt;$&amp;amp;gt; next &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; filter ( not . ( `HM.member` level ) ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; foldl&amp;amp;#39; ( upd v ) ( st { queue = q&amp;amp;#39; } ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; Just&amp;lt;br&amp;gt;
To update the BFS state based on a newly visited vertex, we record its parent, insert it into the&amp;lt;br&amp;gt;
map with a level one greater than its parent, and add it to the end of the queue.&amp;lt;br&amp;gt;
upd p BS { .. } v = BS ( HM.insert v l level ) ( HM.insert v p parent ) ( queue |&amp;amp;gt; v ) where l = level ! p &#43; 1&amp;lt;br&amp;gt;
And that’s it! This is good enough to solve many BFS problems on Open Kattis, such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/breakingbad&amp;#34;&amp;gt;Breaking Bad&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/armpitcomputations&amp;#34;&amp;gt;ARMPIT Computations&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/foldingacube&amp;#34;&amp;gt;Folding a Cube&amp;lt;/a&amp;gt; . (I will leave you the pleasure of solving these problems yourself; I am especially fond of my Haskell solution to Folding a Cube.)&amp;lt;br&amp;gt;
Unfortunately, it is not fast enough to solve Modulo Solitaire, which I picked specifically because it seems to be one of the most computationally demanding BFS problems I’ve seen. My solution using this&amp;lt;br&amp;gt;
-based implementation solves a bunch of initial test cases, but exceeds the 2 second time limit on one of the later test cases. Next time, I’ll show how to adapt this into an even faster implementation which is actually fast enough to solve Modulo Solitaire.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/hashmap/&amp;#34;&amp;gt;HashMap&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/29/competitive-programming-in-haskell-bfs-part-3-implementation-via-hashmap/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 3 (implementation via HashMap)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211030-020418/</link>
      <pubDate>Sat, 30 Oct 2021 02:04:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211030-020418/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/28/technology/facebook-meta-name-change.html&amp;#34;&amp;gt;Facebook Renames Itself Meta The social network, under fire for spreading misinformation and other issues, said the change was part of its bet on a next digital frontier called the metaverse. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/27/technology/facebook-legal-communications.html&amp;#34;&amp;gt;Facebook tells employees to preserve all communications for legal reasons. The move follows intense scrutiny after a whistle-blower provided documents about the social network’s inner workings. By Ryan Mac and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Sahil Lavingia</title>
      <link>https://www.whatsupup.com/blog/barbecuing/persuadably/20211030-020338/</link>
      <pubDate>Sat, 30 Oct 2021 02:03:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/barbecuing/persuadably/20211030-020338/</guid>
      <description>Fund&amp;lt;br&amp;gt;
Investing $10 million a year into early-stage startups. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shl.vc/lp&amp;#34;&amp;gt;Co-invest with me?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211030-020129/</link>
      <pubDate>Sat, 30 Oct 2021 02:01:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211030-020129/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/silicon-valleys-open-culture-era&amp;#34;&amp;gt;Silicon Valley’s Open Culture Era Comes To An End&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/silicon-valleys-open-culture-era&amp;#34;&amp;gt;The tech giants exported their open work cultures to the world. But now, after the Facebook leaks, the concept is headed to its grave.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211030-015855/</link>
      <pubDate>Sat, 30 Oct 2021 01:58:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211030-015855/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/10/protecting-your-device-information-with.html&amp;#34;&amp;gt;Protecting your device information with Private Set Membership&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Kevin Yeo and Sarvar Patel, Private Computing Team&amp;lt;br&amp;gt;
At Google, keeping you safe online is our top priority, so we continuously build the most advanced privacy-preserving technologies into our products. Over the past few years, we&amp;amp;#39;ve utilized innovations in cryptographic research to keep your personal information private by design and secure by default. As part of this, we launched &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2019/02/protect-your-accounts-from-data.html&amp;#34;&amp;gt;Password Checkup&amp;lt;/a&amp;gt; , which protects account credentials by notifying you if an entered username and password are known to have been compromised in a prior data breach. Using cryptographic techniques, Password Checkup can do this without revealing your credentials to anyone, including Google. Today, Password Checkup protects users across many platforms including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/02/new-password-checkup-feature-coming-to.html&amp;#34;&amp;gt;Android&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2019/12/better-password-protections-in-chrome.html&amp;#34;&amp;gt;Chrome&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/password-checkup/&amp;#34;&amp;gt;Google Password Manager&amp;lt;/a&amp;gt; . Another example is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2019/06/helping-organizations-do-more-without-collecting-more-data.html&amp;#34;&amp;gt;Private Join and Compute&amp;lt;/a&amp;gt; , an open source protocol which enables organizations to work together and draw insights from confidential data sets. Two parties are able to encrypt their data sets, join them, and compute statistics over the joint data. By leveraging secure multi-party computation, Private Join and Compute is designed to ensure that the plaintext data sets are concealed from all parties. In this post, we introduce the next iteration of our research, Private Set Membership, as well as its &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/private-membership&amp;#34;&amp;gt;open-source availability&amp;lt;/a&amp;gt; . At a high level, Private Set Membership considers the scenario in which Google holds a database of items, and user devices need to contact Google to check whether a specific item is found in the database. As an example, users may want to check membership of a computer program on a block list consisting of known malicious software before executing the program. Often, the set’s contents and the queried items are sensitive, so we designed Private Set Membership to perform this task while preserving the privacy of our users. Protecting your device information during enrollment Beginning in Chrome 94, Private Set Membership will enable Chrome OS devices to complete the enrollment process in a privacy-preserving manner. Device enrollment is an integral part of the out-of-box experience that welcomes you when getting started with a Chrome OS device. The device enrollment process requires checking membership of device information in encrypted Google databases, including checking if a device is enterprise enrolled or determining if a device was pre-packaged with a license. The correct end state of your Chrome OS device is determined using the results of these membership checks. During the enrollment process, we protect your Chrome OS devices by ensuring no information ever leaves the device that may be decrypted by anyone else when using Private Set Membership. Google will never learn any device information and devices will not learn any unnecessary information about other devices. ​​To our knowledge, this is the first instance of advanced cryptographic tools being leveraged to protect device information during the enrollment process. A deeper look at Private Set Membership Private Set Membership is built upon two cryptographic tools:&amp;lt;br&amp;gt;
Homomorphic encryption is a powerful cryptographic tool that enables computation over encrypted data without the need for decryption. As an example, given the encryptions of values X and Y, homomorphic encryption enables computing the encryption of the sum of X and Y without ever needing to decrypt.  This preserves privacy as the data remains concealed during the computation. Private Set Membership is built upon Google’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/shell-encryption&amp;#34;&amp;gt;open source&amp;lt;/a&amp;gt; homomorphic encryption library.&amp;lt;br&amp;gt;
Oblivious hashing is a cryptographic technique that enables two parties to jointly compute a hash, H(K, x), where the sender holds the key, K, and the receiver holds the hash input, x. The receiver will obtain the hash, H(K, x), without learning the key K. At the same time, the input x will be hidden from the sender.&amp;lt;br&amp;gt;
Take a look at how Private Set Membership utilizes homomorphic encryption and oblivious hashing to protect data below:&amp;lt;br&amp;gt;
For a deeper look into the technology behind Private Set Membership, you can also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/private-membership&amp;#34;&amp;gt;access our open source code&amp;lt;/a&amp;gt; . Privacy properties By using Private Set Membership, the following privacy properties are obtained:&amp;lt;br&amp;gt;
No data leaves the device when checking membership. We designed Private Set Membership using advanced cryptographic techniques to ensure that data never leaves the device in an unencrypted manner when performing membership checks. As a result, the data on your device will be concealed from everyone, including Google.&amp;lt;br&amp;gt;
Devices learn only membership information and nothing else. Private Set Membership was designed to prevent devices from learning any unnecessary information about other devices when querying. For each query, devices learn only the results of the membership check and no other information.&amp;lt;br&amp;gt;
Using Private Set Membership to solve more problems Private Set Membership is a powerful tool that solves a fundamental problem in a privacy-preserving manner. This is just the beginning of what’s possible using this technology. Private Set Membership can help preserve user privacy across a wide array of applications. For example:&amp;lt;br&amp;gt;
Checking allow or block lists. In this setting, users check membership in an allow or block list to determine whether to proceed with the desired action. Private Set Membership enables this check without any information about the software leaving the device.&amp;lt;br&amp;gt;
Control flows with conditional membership checks. Control flows are a common computer science concept that represent arbitrary computer programs with conditional branching. In many cases, the conditional branches require checking membership of sensitive data to determine the next step of the algorithm. By utilizing Private Set Membership, we enable execution of these algorithms while ensuring data never leaves the user’s device.&amp;lt;br&amp;gt;
We still have a ways to go before Private Set Membership is used for general membership checks by devices. At Google, we are exploring a number of potential use cases to protect your privacy using Private Set Membership. We are excited to continue advancing the state-of-the-art cryptographic research to keep you safe. Acknowledgements The work in this post is the result of a collaboration between a large group of current and former Google engineers, research scientists and others including: Amr Aboelkher, Asra Ali, Ghous Amjad, Yves Arrouye, Roland Bock, Xi Chen, Maksim Ivanov, Dennis Kalinichenko, Nirdhar Khazanie, Dawon Lee, Tancrède Lepoint, Lawrence Lui, Pavol Marko, Thiemo Nagel, Mariana Raykova, Aaron Segal, Joon Young Seo, Karn Seth, and Jason Wong.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html&amp;#34;&amp;gt;Pixel 6: Setting a new standard for mobile security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Dave Kleidermacher, Jesse Seed, Brandon Barbello, and Stephan Somogyi, Android, Pixel &amp;amp;amp; Tensor security teams&amp;lt;br&amp;gt;
With Pixel 6 and Pixel 6 Pro, we’re launching our most secure Pixel phone yet, with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/pixelphone/answer/4457705?p=pixel_android_updates&amp;amp;visit_id=637708689245917155-1925669063&amp;amp;rd=1&amp;#34;&amp;gt;5 years of security updates&amp;lt;/a&amp;gt; and the most layers of hardware security. These new Pixel smartphones take a layered security approach, with innovations spanning across the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/pixel/introducing-google-tensor/&amp;#34;&amp;gt;Google Tensor&amp;lt;/a&amp;gt; system on a chip (SoC) hardware to new Pixel-first features in the Android operating system, making it the first Pixel phone with Google security from the silicon all the way to the data center. Multiple dedicated security teams have also worked to ensure that Pixel’s security is provable through transparency and external validation.&amp;lt;br&amp;gt;
Secure to the Core&amp;lt;br&amp;gt;
Google has put user data protection and transparency at the forefront of hardware security with Google Tensor. Google Tensor’s main processors are Arm-based and utilize &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.arm.com/ip-products/security-ip/trustzone&amp;#34;&amp;gt;TrustZone&amp;lt;/a&amp;gt; ™ technology. TrustZone is a key part of our security architecture for general secure processing, but the security improvements included in Google Tensor go beyond TrustZone.&amp;lt;br&amp;gt;
Figure 1. Pixel Secure Environments&amp;lt;br&amp;gt;
The Google Tensor security core is a custom designed security subsystem dedicated to the preservation of user privacy.  It&amp;amp;#39;s distinct from the application processor, not only logically, but physically, and consists of a dedicated CPU, ROM, one-time-programmable (OTP) memory, crypto engine, internal SRAM, and protected DRAM.  For Pixel 6 and 6 Pro, the security core’s primary use cases include protecting user data keys at runtime, hardening secure boot, and interfacing with Titan M2 TM .&amp;lt;br&amp;gt;
Your secure hardware is only as good as your secure OS, and we are using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/security/trusty&amp;#34;&amp;gt;Trusty&amp;lt;/a&amp;gt; , our open source trusted execution environment. Trusty OS is the secure OS used both in TrustZone and the Google Tensor security core.&amp;lt;br&amp;gt;
With Pixel 6 and Pixel 6 Pro your security is enhanced by the new Titan M2 TM , our discrete security chip, fully designed and developed by Google. In this next generation chip, we moved to an in-house designed RISC-V processor, with extra speed and memory, and made it even more resilient to advanced attacks. Titan M2 TM has been tested against the most rigorous standard for vulnerability assessment, AVA_VAN.5, by an independent, accredited evaluation lab. Titan M2™ supports &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/training/articles/keystore#HardwareSecurityModule&amp;#34;&amp;gt;Android Strongbox&amp;lt;/a&amp;gt; , which securely generates and stores keys used to protect your PINs and password, and works hand-in-hand with Google Tensor security core to protect user data keys while in use in the SoC.&amp;lt;br&amp;gt;
Moving a step higher in the system, Pixel 6 and Pixel 6 Pro ship with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2021/10/android-12-is-live-in-aosp.html&amp;#34;&amp;gt;Android 12&amp;lt;/a&amp;gt; and a slew of Pixel-first and Pixel-exclusive features.&amp;lt;br&amp;gt;
Enhanced Controls&amp;lt;br&amp;gt;
We aim to give users better ways to control their data and manage their devices with every release of Android. Starting with Android 12 on Pixel, you can use the new Security hub to manage all your security settings in one place. It helps protect your phone, apps, Google Account, and passwords by giving you a central view of your device’s current configuration. Security hub also provides recommendations to improve your security, helping you decide what settings best meet your needs.&amp;lt;br&amp;gt;
For privacy, we are launching Privacy Dashboard, which will give you a …</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211030-015828/</link>
      <pubDate>Sat, 30 Oct 2021 01:58:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211030-015828/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cppcon&amp;#34;&amp;gt;cppcon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#overload-resolution&amp;#34;&amp;gt;overload-resolution&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#puzzles&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I contributed some puzzles to the online venue for CppCon 2021.
Some of my contributions were just C&#43;&#43; Pub Quiz questions recycled from 2019;
but I also contributed a set of logic puzzles that I think are fairly novel.
I’m going to call this type of puzzle “overload arrangement.”&amp;lt;br&amp;gt;
C&#43;&#43; Pub Quiz at CppCon 2021, Game Two&amp;lt;br&amp;gt;
Last night I emceed Game 2 of CppCon 2021’s “C&#43;&#43; Pub Quiz.”
This time, five teams participated, and the results were again pretty close:
In first place, the ironically named Team Dead Weight with 29.5 points,
followed by&amp;lt;br&amp;gt;
decltype(&amp;lt;a href=&amp;#34;&amp;#34;&amp;gt;&amp;lt;/a&amp;gt;{})&amp;lt;br&amp;gt;
at 28 and the Metaprogrammers at 27.
Thanks also to the Leftovers and the Abominable Types.&amp;lt;br&amp;gt;
C&#43;&#43; Pub Quiz at CppCon 2021, Game One&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cppcon.org/program2021/&amp;#34;&amp;gt;CppCon 2021&amp;lt;/a&amp;gt; is half over already. Tonight I emceed
the first game of the third annual CppCon “C&#43;&#43; Pub Quiz.” Herb Sutter offered opening remarks,
and then joined one of our seven teams for a few rounds of play.
What is C&#43;&#43; Pub Quiz, you ask? It’s a straightforward trivia night — five rounds,
ten questions per round, write down your team’s answers on a sheet of paper and turn it in
at the end of the round. High score after five rounds wins the game.&amp;lt;br&amp;gt;
Seven teams participated in this year’s Pub Quiz.
The winning team of the night was Team BYOB, with a score of 33 points, just edging out
Team Hufflepuff at 32. Third place went to Rotate! That’s A with 30 points. Thanks also
to Symbol Not Found; Unit Tested; the Reference ₩rappers a.k.a. UB Unicorns; and Flying Blind.&amp;lt;br&amp;gt;
Don’t reopen&amp;lt;br&amp;gt;
namespace std&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cppcon&amp;#34;&amp;gt;cppcon&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#sd-8-adjacent&amp;#34;&amp;gt;sd-8-adjacent&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slogans&amp;#34;&amp;gt;slogans&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#templates&amp;#34;&amp;gt;templates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today (in two different contexts) I saw people reopening&amp;lt;br&amp;gt;
in order to introduce a specialization of a standard template.
For example:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211030-015735/</link>
      <pubDate>Sat, 30 Oct 2021 01:57:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211030-015735/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/08/The-WOrst-Case&amp;#34;&amp;gt;Worst Case&amp;lt;/a&amp;gt; · Suppose you’re running your organization’s crucial apps in the cloud. Specifically, suppose you’re running them them     on AWS, and in particular in the “us-east-1” region?  Could us-east-1 go away? What might you do about it? Let’s catastrophize! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/08/The-WOrst-Case&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [19 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211030-015125/</link>
      <pubDate>Sat, 30 Oct 2021 01:51:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211030-015125/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-i-created-a-coding-font-game-with-low-code/&amp;#34;&amp;gt;Our customer Wendy Zhang made a very cool coding font app/gamified experience that helps you find your true love amongst coding fonts. What&amp;#39;s also cool is that it&amp;#39;s a consumer-facing app built entirely on Retool! Check out what it does, and how Wendy built it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/tripplo-customer-story/&amp;#34;&amp;gt;How the engineering team at Tripplo replaced 3 separate internal apps—a PHP admin panel, a custom React app, and spreadsheets—with Retool, thus saving 5 hours of eng time a week, and improving collaboration with business teams and agents.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211030-014837/</link>
      <pubDate>Sat, 30 Oct 2021 01:48:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211030-014837/</guid>
      <description>In December 2018, bling vendor Signet Jewelers fixed a weakness in their Kay Jewelers and Jared websites that exposed the order information for all of their online customers. This week, Signet subsidiary Zales.com updated its website to remediate a nearly identical customer data exposure.&amp;lt;br&amp;gt;
Last week, KrebsOnSecurity heard from a reader who was browsing Zales.com and suddenly found they were looking at someone else’s order information on the website, including their name, billing address, shipping address, phone number, email address, items and total amount purchased, delivery date, tracking link, and the last four digits of the customer’s credit card number.&amp;lt;br&amp;gt;
The reader noticed that the link for the order information she’d stumbled on included a lengthy numeric combination that — when altered — would produce yet another customer’s order information.&amp;lt;br&amp;gt;
When the reader failed to get an immediate response from Signet, KrebsOnSecurity contacted the company. In a written response, Signet said, “A concern was brought to our attention by an IT professional. We addressed it swiftly, and upon review we found no misuse or negative impact to any systems or customer data.”&amp;lt;br&amp;gt;
Their statement continues:&amp;lt;br&amp;gt;
“As a business principle we make consumer information protection the highest priority, and proactively initiate independent and industry-leading security testing. As a result, we exceed industry benchmarks on data protection maturity. We always appreciate it when consumers reach out to us with feedback, and have committed to further our efforts on data protection maturity.”&amp;lt;br&amp;gt;
When Signet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/12/jared-kay-jewelers-parent-fixes-data-leak/&amp;#34;&amp;gt;fixed similar weaknesses with its Jared and Kay websites back in 2018&amp;lt;/a&amp;gt; , the reader who found and reported that data exposure said his mind quickly turned to the various ways crooks might exploit access to customer order information.&amp;lt;br&amp;gt;
“My first thought was they could track a package of jewelry to someone’s door and swipe it off their doorstep,” said Brandon Sheehy , a Dallas-based Web developer. “My second thought was that someone could call Jared’s customers and pretend to be Jared, reading the last four digits of the customer’s card and saying there’d been a problem with the order, and if they could get a different card for the customer they could run it right away and get the order out quickly. That would be a pretty convincing scam. Or just targeted phishing attacks.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/zales-com-leaked-customer-data-just-like-sister-firms-jared-kay-jewelers-did-in-2018/#more-57314&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/zales-com-leaked-customer-data-just-like-sister-firms-jared-kay-jewelers-did-in-2018/&amp;#34;&amp;gt;Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211030-014820/</link>
      <pubDate>Sat, 30 Oct 2021 01:48:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211030-014820/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html&amp;#34;&amp;gt;Exploiting CVE-2021-4274&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211027-001837/</link>
      <pubDate>Wed, 27 Oct 2021 00:18:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211027-001837/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02931-7&amp;#34;&amp;gt;Mysterious ‘alien beacon’ was false alarm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211026-200915/</link>
      <pubDate>Tue, 26 Oct 2021 20:09:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211026-200915/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/why-is-oracle-worth-260b/&amp;#34;&amp;gt;How did software that most developers at startups have never used get this big? Understanding Oracle starts with understanding the history of relational databases, and digging into their business and competitive practices.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211026-200655/</link>
      <pubDate>Tue, 26 Oct 2021 20:06:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211026-200655/</guid>
      <description>U.S. federal investigators today raided the Florida offices of PAX Technology , a Chinese provider of point-of-sale devices used by millions of businesses and retailers globally. KrebsOnSecurity has learned the raid is tied to reports that PAX’s systems may have been involved in cyberattacks on U.S. and E.U. organizations.&amp;lt;br&amp;gt;
FBI agents entering PAX Technology offices in Jacksonville today. Source: WOKV.com.&amp;lt;br&amp;gt;
Headquartered in Shenzhen, China, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.pax.us/&amp;#34;&amp;gt;PAX Technology Inc.&amp;lt;/a&amp;gt; has more than 60 million point-of-sale terminals in use throughout 120 countries. Earlier today, Jacksonville, Fla. based WOKV.com &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wokv.com/news/local/fbi-jacksonville-homeland-security-agents-investigating-outside-southside-business/BVFSPMUVUJHWRJTX56PSQDXAZ4/&amp;#34;&amp;gt;reported&amp;lt;/a&amp;gt; that agents with the FBI and Department of Homeland Security (DHS) had raided a local PAX Technology warehouse.&amp;lt;br&amp;gt;
In an official statement, investigators told WOKV only that they were executing a court-authorized search at the warehouse as a part of a federal investigation, and that the inquiry included the Department of Customs and Border Protection and the Naval Criminal Investigative Services (NCIS). The FBI has not responded to requests for comment.&amp;lt;br&amp;gt;
Several days ago, KrebsOnSecurity heard from a trusted source that the FBI began investigating PAX after a major U.S. payment processor started asking questions about unusual network packets originating from the company’s payment terminals.&amp;lt;br&amp;gt;
According to that source, the payment processor found that the PAX terminals were being used both as a malware “dropper” — a repository for malicious files — and as “command-and-control” locations for staging attacks and collecting information.&amp;lt;br&amp;gt;
“FBI and MI5 are conducting an intensive investigation into PAX,” the source said. “A major US payment processor began asking questions about network packets originating from PAX terminals and were not given any good answers.”&amp;lt;br&amp;gt;
KrebsOnSecurity reached out to PAX Technology’s CEO on Sunday. The company has not yet responded to requests for comment.&amp;lt;br&amp;gt;
The source said two major financial providers — one in the United States and one in the United Kingdom — had already begun pulling PAX terminals from their payment infrastructure, a claim that was verified by two different sources. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/fbi-raids-chinese-point-of-sale-giant-pax-technology/#more-57313&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/fbi-raids-chinese-point-of-sale-giant-pax-technology/&amp;#34;&amp;gt;FBI Raids Chinese Point-of-Sale Giant PAX Technology&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211026-161933/</link>
      <pubDate>Tue, 26 Oct 2021 16:19:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211026-161933/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/10/26/espanol/facebook-documentos-desinformacion.html&amp;#34;&amp;gt;Las investigaciones internas de Facebook: los documentos muestran señales de alarma sobre la desinformación Documentos de la empresa revelan que en varias ocasiones trabajadores de la red social advirtieron de la difusión de desinformación y teorías de la conspiración antes y después de las elecciones presidenciales de Estados Unidos. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211026-122118/</link>
      <pubDate>Tue, 26 Oct 2021 12:21:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211026-122118/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/10/26/espanol/facebook-documentos-desinformacion.html&amp;#34;&amp;gt;Las investigaciones internas de Facebook: los documentos muestran señales de alarma sobre la desinformación Documentos de la empresa revelan que en varias ocasiones trabajadores de la red social advirtieron de la difusión de desinformación y teorías de la conspiración antes y después de las elecciones presidenciales de Estados Unidos. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/25/technology/facebook-profits-earnings-q3-2021.html&amp;#34;&amp;gt;Facebook’s profit jumps 17 percent. The results in the latest quarter are a sign of the company’s financial strength as it faces a public relations crisis. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211026-122041/</link>
      <pubDate>Tue, 26 Oct 2021 12:20:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211026-122041/</guid>
      <description>October 26, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/10/26/stalebot.html&amp;#34;&amp;gt;GitHub stale bot considered harmful&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211026-082111/</link>
      <pubDate>Tue, 26 Oct 2021 08:21:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211026-082111/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/26/technology/facebook-sec-complaints.html&amp;#34;&amp;gt;The Facebook Papers Facebook Faces a Public Relations Crisis. What About a Legal One? One of the most pressing questions is whether the Securities and Exchange Commission will significantly add to the company’s woes. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/10/26/espanol/facebook-documentos-desinformacion.html&amp;#34;&amp;gt;Las investigaciones internas de Facebook: los documentan muestran señales de alarma sobre la desinformación Documentos de la empresa revelan que en varias ocasiones trabajadores de la red social advirtieron de la difusión de desinformación y teorías de la conspiración antes y después de las elecciones presidenciales de Estados Unidos. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211026-081827/</link>
      <pubDate>Tue, 26 Oct 2021 08:18:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211026-081827/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/26/technology/facebook-sec-complaints.html&amp;#34;&amp;gt;The Facebook Papers Facebook Faces a Public Relations Crisis. What About a Legal One? One of the most pressing questions is whether the Securities and Exchange Commission will significantly add to the company’s woes. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/10/26/espanol/facebook-documentos-desinformacion.html&amp;#34;&amp;gt;Las investigaciones internas de Facebook: los documentan muestran señales de alarma sobre la desinformación Documentos de la empresa revelan que en varias ocasiones trabajadores de la red social advirtieron de la difusión de desinformación y teorías de la conspiración antes y después de las elecciones presidenciales de Estados Unidos. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211026-002105/</link>
      <pubDate>Tue, 26 Oct 2021 00:21:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211026-002105/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/25/technology/facebook-profits-earnings-q3-2021.html&amp;#34;&amp;gt;Facebook profits jump 17 percent. The results in the latest quarter are a sign of the company’s financial strength as it faces a public relations crisis. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/25/business/frances-haugen-facebook.html&amp;#34;&amp;gt;Facebook Whistle-Blower Brings Campaign to Europe After Disclosures Beginning a European tour in Britain, the former Facebook manager was questioned by policymakers drafting tougher tech regulations. By Adam Satariano and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211026-001750/</link>
      <pubDate>Tue, 26 Oct 2021 00:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211026-001750/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-removed-the-news-feed-algorithm&amp;#34;&amp;gt;Facebook Removed The News Feed Algorithm In An Experiment. Then It Gave Up.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-removed-the-news-feed-algorithm&amp;#34;&amp;gt;New leaked Facebook documents show what happened when Facebook tried to remove feed ranking. It didn&amp;#39;t go well.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211026-001728/</link>
      <pubDate>Tue, 26 Oct 2021 00:17:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211026-001728/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02931-7&amp;#34;&amp;gt;Mysterious &amp;#39;alien beacon&amp;#39; was false alarm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Radio signal seemed to originate from the star Proxima Centauri, and provided a helpful drill for future searches.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211025-200635/</link>
      <pubDate>Mon, 25 Oct 2021 20:06:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211025-200635/</guid>
      <description>The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.&amp;lt;br&amp;gt;
A redacted screenshot of the Conti News victim shaming blog.&amp;lt;br&amp;gt;
“We are looking for a buyer to access the network of this organization and sell data from their network,” reads the confusingly worded message inserted into multiple recent victim listings on Conti’s shaming blog.&amp;lt;br&amp;gt;
It’s unclear what prompted the changes, or what Conti hopes to gain from the move. It’s also not obvious why they would advertise having hacked into companies if they plan on selling that access to extract sensitive data going forward. Conti did not respond to requests for comment.&amp;lt;br&amp;gt;
“I wonder if they are about to close down their operation and want to sell data or access from an in-progress breach before they do,” said Fabian Wosar , chief technology officer at computer security firm Emsisoft . “But it’s somewhat stupid to do it that way as you will alert the companies that they have a breach going on.”&amp;lt;br&amp;gt;
The unexplained shift comes as policymakers in the United States and Europe are moving forward on efforts to disrupt some of the top ransomware gangs. Reuters recently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/&amp;#34;&amp;gt;reported&amp;lt;/a&amp;gt; that the U.S. government was behind an ongoing hacking operation that penetrated the computer systems of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=REvil&amp;#34;&amp;gt;REvil&amp;lt;/a&amp;gt; , a ransomware affiliate group that experts say is about as aggressive and ruthless as Conti in dealing with victims. What’s more, REvil was among the first ransomware groups to start selling its victims’ data.&amp;lt;br&amp;gt;
REvil’s darknet victim shaming site remains offline. In response, a representative for the Conti gang posted a long screed on Oct. 22 to a Russian language hacking forum denouncing the attack on REvil as the “unilateral, extraterritorial, and bandit-mugging behavior of the United States in world affairs.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/#more-57318&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/&amp;#34;&amp;gt;Conti Ransom Gang Starts Selling Access to Victims&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211025-122035/</link>
      <pubDate>Mon, 25 Oct 2021 12:20:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211025-122035/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/25/technology/facebook-like-share-buttons.html&amp;#34;&amp;gt;The Facebook Papers Facebook Wrestles With the Features It Used to Define Social Networking Likes and shares made the social media site what it is. Now, company documents show, it’s struggling to deal with their effects. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211025-001927/</link>
      <pubDate>Mon, 25 Oct 2021 00:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211025-001927/</guid>
      <description>&amp;#39;You beat me&amp;#39;: Colombia caught its most-wanted drug lord and promised swift extradition to the U.S. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas/colombias-priority-is-extradite-drug-lord-otoniel-united-states-sources-2021-10-24/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211025-000643/</link>
      <pubDate>Mon, 25 Oct 2021 00:06:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211025-000643/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/10/24/shell-quote-rce.html&amp;#34;&amp;gt;Command injection through shell-quote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211024-161929/</link>
      <pubDate>Sun, 24 Oct 2021 16:19:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211024-161929/</guid>
      <description>Eastern Europe COVID-19 cases pass 20 million, according to a Reuters tally. The region accounts for about 20% of new cases reported globally &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/outbreak-worsens-covid-19-cases-eastern-europe-near-20-million-2021-10-24/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211024-001932/</link>
      <pubDate>Sun, 24 Oct 2021 00:19:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211024-001932/</guid>
      <description>There were safety fears on the Rust film set before Alec Baldwin accidentally fired a live round, killing the cinematographer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/media-telecom/director-gutted-by-death-cinematographer-accidental-shooting-2021-10-23/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211024-001904/</link>
      <pubDate>Sun, 24 Oct 2021 00:19:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211024-001904/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/23/technology/facebook-india-misinformation.html&amp;#34;&amp;gt;The Facebook Papers In India, Facebook Grapples With an Amplified Version of Its Problems Internal documents show a struggle with misinformation, hate speech and celebrations of violence in the country, the company’s biggest market. By Sheera Frenkel and Davey Alba&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20211024-000857/</link>
      <pubDate>Sun, 24 Oct 2021 00:08:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20211024-000857/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/UXFactor_CSCW21.pdf&amp;#34;&amp;gt;The UX Factor: Using Comparative Peer Review to Evaluate Designs through User Preferences&amp;lt;/a&amp;gt; Sarah Bawabe, Laura Wilson, Tongyu Zhou, Ezra Marks, Jeff Huang CSCW 2021    (Honorable Mention Award, Impact Recognition Award) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://uxfactor.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeTCgnwF1gjrc1O8mfJ_5TmT_TLowFQ2DUhsollmqPG84pAFQ/viewform?usp=pp_url&amp;amp;entry.1299571007=UX&#43;Factor:&#43;peer&#43;ux&#43;review&amp;amp;entry.1760653896=uxfactor&#43;homepage&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/TabularDatasets_CSCW21.pdf&amp;#34;&amp;gt;Case Studies on the Motivation and Performance of Contributors Who Verify and Maintain In-Flux Tabular Datasets&amp;lt;/a&amp;gt; Shaun Wallace, Alexandra Papoutsaki, Neilly H. Tan, Hua Guo, Jeff Huang CSCW 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Portalware_DIS21.pdf&amp;#34;&amp;gt;Portalware: Exploring Free-Hand AR Drawing with a Dual-Display Smartphone-Wearable Paradigm&amp;lt;/a&amp;gt; Jing Qian, Tongyu Zhou, Meredith Young-Ng, Jiaju Ma, Angel Cheung, Xiangyu Li, Ian Gonsher, Jeff Huang DIS 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SelfE_CHI21.pdf&amp;#34;&amp;gt;Self-E: Smartphone-Supported Guidance for Customizable Self-Experimentation&amp;lt;/a&amp;gt; Nediyana Daskalova, Eindra Kyi, Kevin Ouyang, Arthur Borem, Sally Chen, Sung Hyun Park, Nicole Nugent, Jeff Huang CHI 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://selfe.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Sochiatrist_CSCW20.pdf&amp;#34;&amp;gt;Sochiatrist: Signals of Affect in Messaging Data&amp;lt;/a&amp;gt; Talie Massachi, Grant Fong, Varun Mathur, Sachin Pendse, Gabriela Hoefer, Jessica Fu, Chong Wang, Nikita Ramoji, Nicole Nugent, Megan Ranney, Daniel Dickstein, Michael Armey, Ellie Pavlick, Jeff Huang CSCW 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sochiatrist.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Sketchy_CSCW20.pdf&amp;#34;&amp;gt;Sketchy: Drawing Inspiration from the Crowd&amp;lt;/a&amp;gt; Shaun Wallace, Brendan Le, Luis Leiva, Aman Haq, Ari Kintisch, Gabrielle Bufrem, Linda Chang, Jeff Huang CSCW 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sketchy.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SleepBandits_CHI20.pdf&amp;#34;&amp;gt;SleepBandits: Guided Flexible Self-Experiments for Sleep&amp;lt;/a&amp;gt; Nediyana Daskalova, Jina Yoon, Yibing Wang, Cintia Araujo, Guillermo Beltran, Nicole Nugent, John McGeary, Joseph Jay Williams, Jeff Huang CHI 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sleepcoacher.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Portalble_UIST19.pdf&amp;#34;&amp;gt;Portal-ble: Intuitive Free-Hand Manipulation in Unbounded Smartphone-based Augmented Reality&amp;lt;/a&amp;gt; Jing Qian, Jiaju Ma, Xiangyu Li, Benjamin Attal, Haoming Lai, James Tompkin, John Hughes, Jeff Huang UIST 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://portalble.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Remotion_IMWUT18.pdf&amp;#34;&amp;gt;Remotion: A Motion-Based Capture and Replay Platform of Mobile Device Interaction for Remote Usability Testing&amp;lt;/a&amp;gt; Jing Qian, Arielle Chapin, Alexandra Papoutsaki, Fumeng Yang, Klaas Nelissen, Jeff Huang IMWUT 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://remotion.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeTCgnwF1gjrc1O8mfJ_5TmT_TLowFQ2DUhsollmqPG84pAFQ/viewform?usp=pp_url&amp;amp;entry.1299571007=Remotion:&#43;mobile&#43;motion&#43;replay&amp;amp;entry.1760653896=remotion&#43;homepage&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/EyeTyper_ETRA18.pdf&amp;#34;&amp;gt;The Eye of the Typer: A Benchmark and Analysis of Gaze Behavior during Typing&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Aaron Gokaslan, James Tompkin, Yuze He, Jeff Huang ETRA 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/data/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeTCgnwF1gjrc1O8mfJ_5TmT_TLowFQ2DUhsollmqPG84pAFQ/viewform?usp=pp_url&amp;amp;entry.1299571007=WebGazer:&#43;webcam&#43;eyetracking&amp;amp;entry.1760653896=webgazer&#43;frontpage&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SelfExperiments_IMWUT17.pdf&amp;#34;&amp;gt;Lessons Learned from Two Cohorts of Personal Informatics Self-Experiments&amp;lt;/a&amp;gt; Nediyana Daskalova, Karthik Desingh, Alexandra Papoutsaki, Diane Schulze, Han Sha, Jeff Huang IMWUT 2017 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Drafty_HCOMP17.pdf&amp;#34;&amp;gt;Drafty: Enlisting Users to be Editors who Maintain Structured Data&amp;lt;/a&amp;gt; Shaun Wallace, Lucy van Kleunen, Marianne Aubin-Le Quere, Abraham Peterkin, Yirui Huang, Jeff Huang HCOMP 2017 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drafty.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SearchGazer_CHIIR17.pdf&amp;#34;&amp;gt;SearchGazer: Webcam Eye Tracking for Remote Studies of Web Search&amp;lt;/a&amp;gt; Alexandra Papoutsaki, James Laskey, Jeff Huang CHIIR 2017    (Best Paper Finalist) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/search/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeTCgnwF1gjrc1O8mfJ_5TmT_TLowFQ2DUhsollmqPG84pAFQ/viewform?usp=pp_url&amp;amp;entry.1299571007=WebGazer:&#43;webcam&#43;eyetracking&amp;amp;entry.1760653896=webgazer&#43;frontpage&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SleepCoacher_UIST16.pdf&amp;#34;&amp;gt;SleepCoacher: A Personalized Automated Self-Experimentation System for Sleep Recommendations&amp;lt;/a&amp;gt; Nediyana Daskalova, Danaë Metaxa, Adrienne Tran, Nicole Nugent, Julie Boergers, John McGeary, Jeff Huang UIST 2016 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sleepcoacher.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/WebGazer_IJCAI16.pdf&amp;#34;&amp;gt;WebGazer: Scalable Webcam Eye Tracking Using User Interactions&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Patsorn Sangkloy, James Laskey, Nediyana Daskalova, Jeff Huang, James Hays IJCAI 2016 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSeTCgnwF1gjrc1O8mfJ_5TmT_TLowFQ2DUhsollmqPG84pAFQ/viewform?usp=pp_url&amp;amp;entry.1299571007=WebGazer:&#43;webcam&#43;eyetracking&amp;amp;entry.1760653896=webgazer&#43;frontpage&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/CrowdsourcingNovices_HCOMP15.pdf&amp;#34;&amp;gt;Crowdsourcing from Scratch: A Pragmatic Experiment in Data Collection by Novice Requesters&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Hua Guo, Danaë Metaxa, Connor Gramazio, Jeff Rasley, Wenting Xie, Guan Wang, Jeff Huang HCOMP 2015    (Best Paper Finalist) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com&amp;#34;&amp;gt;[subscribe]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211023-202304/</link>
      <pubDate>Sat, 23 Oct 2021 20:23:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211023-202304/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/23/technology/facebook-india-misinformation.html&amp;#34;&amp;gt;The Facebook Papers In India, Facebook Grapples With an Amplified Version of Its Problems Internal documents show a struggle with misinformation, hate speech and celebrations of violence in the country, the company’s biggest market. By Sheera Frenkel and Davey Alba&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211023-202031/</link>
      <pubDate>Sat, 23 Oct 2021 20:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211023-202031/</guid>
      <description>Turkey set to banish U.S., Canadian and other ambassadors for urging a philanthropist’s release from prison &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/middle-east/turkeys-erdogan-orders-10-ambassadors-declared-persona-non-grata-2021-10-23/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211023-002254/</link>
      <pubDate>Sat, 23 Oct 2021 00:22:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211023-002254/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/22/technology/facebook-election-misinformation.html&amp;#34;&amp;gt;Internal Alarm, Public Shrugs: Facebook’s Employees Dissect Its Election Role Company documents show that the social network’s employees repeatedly raised red flags about the spread of misinformation and conspiracies before and after the contested November vote. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211023-002015/</link>
      <pubDate>Sat, 23 Oct 2021 00:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211023-002015/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/22/technology/facebook-election-misinformation.html&amp;#34;&amp;gt;Internal Alarm, Public Shrugs: Facebook’s Employees Dissect Its Election Role Company documents show that the social network’s employees repeatedly raised red flags about the spread of misinformation and conspiracies before and after the contested November vote. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211023-001725/</link>
      <pubDate>Sat, 23 Oct 2021 00:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211023-001725/</guid>
      <description>doesn’t obsolete the hidden friend idiom&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#operator-spaceship&amp;#34;&amp;gt;operator-spaceship&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#stl-classic&amp;#34;&amp;gt;stl-classic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
C&#43;&#43;20 introduces new expression-rewriting rules for comparison operators, such that
the compiler can rewrite&amp;lt;br&amp;gt;
a &amp;amp;lt; b&amp;lt;br&amp;gt;
as either&amp;lt;br&amp;gt;
(a &amp;amp;lt;=&amp;amp;gt; b) &amp;amp;lt; 0&amp;lt;br&amp;gt;
or&amp;lt;br&amp;gt;
0 &amp;amp;lt; (b &amp;amp;lt;=&amp;amp;gt; a)&amp;lt;br&amp;gt;
, and&amp;lt;br&amp;gt;
a != b&amp;lt;br&amp;gt;
!(a == b)&amp;lt;br&amp;gt;
!(b == a)&amp;lt;br&amp;gt;
. Today, someone
asked whether these new rules decrease the attractiveness of the hidden friend idiom
for overloaded operators — at least for&amp;lt;br&amp;gt;
, should we just declare it
as a member function? The answer is no. Observe ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/e3eE39xhW&amp;#34;&amp;gt;Godbolt&amp;lt;/a&amp;gt; ):&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211022-162007/</link>
      <pubDate>Fri, 22 Oct 2021 16:20:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211022-162007/</guid>
      <description>October 22, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/10/22/Smarter-every-day-and-4privacy.html&amp;#34;&amp;gt;How SmarterEveryDay&amp;#39;s 4privacy can, and cannot, meet its goals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211022-081613/</link>
      <pubDate>Fri, 22 Oct 2021 08:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211022-081613/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Relaying DCOM Authent&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html&amp;#34;&amp;gt;Using Kerberos for Authentication Relay Attacks&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211022-080832/</link>
      <pubDate>Fri, 22 Oct 2021 08:08:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211022-080832/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/top-5-mysql-gui-tools/&amp;#34;&amp;gt;This article breaks down the leading MySQL tools and their benefits and potential drawbacks. We look at features, platform compatibility, use cases, and MySQL support.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211022-041900/</link>
      <pubDate>Fri, 22 Oct 2021 04:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211022-041900/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-revil/corrected-exclusive-governments-turn-tables-on-ransomware-gang-revil-by-pushing-it-offline-sources-idUSL1N2RH1PT&amp;#34;&amp;gt;CORRECTED-EXCLUSIVE-Governments turn tables on ransomware gang REvil by pushing it offline -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Oct 21 The ransomware group REvil was itself
hacked and forced offline this week by a multi-country
operation, according to three private sector cyber experts
working with the United States and one former official.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology | Alex Kantrowitz | Substack</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211022-001801/</link>
      <pubDate>Fri, 22 Oct 2021 00:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211022-001801/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/we-need-to-have-this-knife-fight&amp;#34;&amp;gt;“We Need to Have This Knife Fight:” Inside Facebook’s Strategy To Bring The War To Apple.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/we-need-to-have-this-knife-fight&amp;#34;&amp;gt;An internal Facebook plan reveals the machinations of a company determined to fend off Apple’s new privacy controls.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211021-201725/</link>
      <pubDate>Thu, 21 Oct 2021 20:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211021-201725/</guid>
      <description>Federal Reserve bans individual stock purchases by top officials and unveils other restrictions on their investing activities &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/fed-bans-stock-trading-restricts-other-investing-activities-by-top-officials-2021-10-21/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-revil/exclusive-governments-turn-tables-on-ransomware-gang-revil-by-pushing-it-offline-sources-idUSKBN2HB2J5&amp;#34;&amp;gt;Exclusive: Governments turn tables on ransomware gang REvil by pushing it offline -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The ransomware group REvil was itself hacked and forced offline this week by a multi-country operation, according to three private sector cyber experts working with the United States and one former official.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211021-201442/</link>
      <pubDate>Thu, 21 Oct 2021 20:14:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211021-201442/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#celebration-of-mind&amp;#34;&amp;gt;celebration-of-mind&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#etymology&amp;#34;&amp;gt;etymology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#puzzles&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#today-i-learned&amp;#34;&amp;gt;today-i-learned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20211021-201044/</link>
      <pubDate>Thu, 21 Oct 2021 20:10:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20211021-201044/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2021/10/20/cablev2.html&amp;#34;&amp;gt;Phones as security keys in Chrome&amp;lt;/a&amp;gt; (20 Oct 2021)&amp;lt;br&amp;gt;
With Chrome 94, if you have an Android phone with Chrome on it, and it’s syncing to the same Google account as Chrome on a Chrome OS/Windows/macOS device, then you’ll be able to use that phone as a security key. You should be able to try this out on any WebAuthn using website, for example &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webauthn.io/&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . (But not accounts.google.com, which uses a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/accounts/answer/9289445?hl=en&amp;amp;co=GENIE.Platform%3DAndroid&amp;#34;&amp;gt;different system&amp;lt;/a&amp;gt; .)&amp;lt;br&amp;gt;
The reason that you are reading about this here and not on an official Google site is that people shouldn’t start registering their phone as a security key unless they have a physical security key as a back up. Just like a regular security key, if you lose the phone then you lose the credentials. So, just like a regular security key, you should have a back up. (You can also lose your credentials if you remove the screen lock, or somehow wipeout Play Services state — e.g. by doing a factory reset.)&amp;lt;br&amp;gt;
We have plans for addressing this and making this suitable for regular people, and to allow use in other profiles, but we’re not there yet. We are interested in whether the communications infrastructure is good enough though. (More below.)&amp;lt;br&amp;gt;
For signing into Google, it has long been possible to use your phone as a security key. This only worked in Chrome and functioned over BLE GATT between the desktop and phone. We have wanted to expand this to the web in general for years, but the success rate that we measured with BLE was poor. After quite a lot of work trying to improve the BLE success rate, we didn’t achieve much.&amp;lt;br&amp;gt;
But the use of BLE is more than just a convenience. The security model demands some proof of physical proximity between the authenticator and the machine that is being authenticated. For a USB security key the authenticator will only respond to something that is making physical contact with it. So when a phone is acting as a security key it needs to prove that the machine it is talking to is physically close by. (Or at least that the attacker is in control of a BLE radio that is physically close.)&amp;lt;br&amp;gt;
We looked at other Bluetooth modes in the hopes that they might work better, but classic Bluetooth RFCOMM isn’t supported on iOS and requires a lot of user interaction on android. BLE L2CAP is supported on iOS, but isn’t supported (in user space) on Windows. It’s also flaky in the face of MAC address rotation if the devices aren’t paired.&amp;lt;br&amp;gt;
So where we’ve ended up is that all the communication happens over the internet connection, but the phone sends a nonce in a BLE advert and the other end of the channel has to prove receipt. That’s the least amount of Bluetooth we could use while still requiring physical proximity. Needing bilateral internet connectivity is unfortunate though. So you can also connect the phone with a USB cable while the security key operation is running. (But very sadly not on Windows; The USB stack there just isn’t designed in the right way for it.) We might also add L2CAP as an option in the future.&amp;lt;br&amp;gt;
This isn’t enabled on Linux at the moment. Historically trying to do the BLE GATT connection would often fail with bluez, and so the phone as a security key infrastructure was disabled on Linux. Now that the desktop only needs to receive a BLE advert it looks like it could work, but we haven’t flipped that switch yet.&amp;lt;br&amp;gt;
As I mentioned above, we are interested in whether the underlying infrastructure is plausible. Aggregated anonymous statistics are useful for many things but in this case they suggest that BLE isn’t always working as well as it should, but don’t tell us why not. So if you are especially keen about security keys and want to try this out, I’d be interested in your experiences. I can&amp;#39;t promise to respond but I will read everything if you send me an email (agl at chromium dot org) or tweet at me ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/agl__&amp;#34;&amp;gt;agl__&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Some troubleshooting hints if you&amp;#39;re having issues because this will be much faster than asking me!&amp;lt;br&amp;gt;
If no phones appear as options : you&amp;#39;re using Windows, macOS, or Chrome OS, yes? And it&amp;#39;s an Android phone? And the machine has working Bluetooth? And Chrome is up to date everywhere? If you navigate to chrome://sync-internals, is the “Transport state” at the top-left reporting “Active”? If not, enable Sync. On the phone, does Settings say that Sync is on at the top? If not, enable it. Is the account listed in Settings on the phone the same as the “Username” in chrome://sync-internals on the desktop? If all that&amp;#39;s good then probably you just need to wait because it can take a couple of days for the registration to propagate. Probably in the “Device Info” section of the “Sync Node Browser” in chrome://sync-internals your phone is listed, but there&amp;#39;s no&amp;lt;br&amp;gt;
paask_fields&amp;lt;br&amp;gt;
section yet. If you want to short-circuit that, you can install Chrome Canary on the phone and enable syncing there. That should register quite quickly.&amp;lt;br&amp;gt;
You can select the phone on the desktop, but nothing happens : the phone should be getting a cloud message poke that triggers a notification. Does the phone have internet access? Did you completely disable notifications from Chrome? &amp;lt;code&amp;gt;adb logcat | grep -i cable&amp;lt;/code&amp;gt; would be interesting if you&amp;#39;re setup for that. Otherwise, if this is a common issue, I might have to add some logging and ask for the tunnel URL from chrome://device-log.&amp;lt;br&amp;gt;
You get the notification and tap it, but something else goes wrong : if an error code or error message is displayed then I want to know what it is! If it&amp;#39;s hanging then the message at the bottom of the screen changes for each step of the process so that&amp;#39;s what&amp;#39;ll be useful. Most problems seem to be BLE: is the phone close to the desktop? What other BLE is happening on the devices?&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211021-161606/</link>
      <pubDate>Thu, 21 Oct 2021 16:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211021-161606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Relaying DCOM Authentication&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by James Forshaw, Project Zero&amp;lt;br&amp;gt;
In my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html&amp;#34;&amp;gt;previous blog post&amp;lt;/a&amp;gt; I discussed the possibility of relaying Kerberos authentication from a DCOM connection. I was originally going to provide a more in-depth explanation of how that works, but as it&amp;amp;#39;s quite involved I thought it was worthy of its own blog post. This is primarily a technique to get relay authentication from another user on the same machine and forward that to a network service such as LDAP. You could use this to escalate privileges on a host using a technique similar to a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html#case-study-2-windows-1020162019-lpe&amp;#34;&amp;gt;blog post&amp;lt;/a&amp;gt; from Shenanigans Labs but removing the requirement for the WebDAV service. Let&amp;amp;#39;s get straight to it.&amp;lt;br&amp;gt;
Background&amp;lt;br&amp;gt;
The technique to locally relay authentication for DCOM was something I originally reported back in 2015 ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=325&amp;#34;&amp;gt;issue 325&amp;lt;/a&amp;gt; ). This issue was fixed as CVE-2015-2370, however the underlying authentication relay using DCOM remained. This was repurposed and expanded upon by various others for local and remote privilege escalation in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/&amp;#34;&amp;gt;RottenPotato&amp;lt;/a&amp;gt; series of exploits, the latest in that line being &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/antonioCoco/RemotePotato0&amp;#34;&amp;gt;RemotePotato&amp;lt;/a&amp;gt; which is currently unpatched as of October 2021.&amp;lt;br&amp;gt;
The key feature that the exploit abused is standard COM marshaling. Specifically when a COM object is marshaled so that it can be used by a different process or host, the COM runtime generates an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/fe6c5e46-adf8-4e34-a8de-3f756c875f31&amp;#34;&amp;gt;OBJREF structure&amp;lt;/a&amp;gt; , most commonly the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/51312511-36e1-4ab6-993c-523643b11a29&amp;#34;&amp;gt;OBJREF_STANDARD&amp;lt;/a&amp;gt; form. This structure contains all the information necessary to establish a connection between a COM client and the original object in the COM server.&amp;lt;br&amp;gt;
Connecting to the original object from the OBJREF is a two part process:&amp;lt;br&amp;gt;
The client extracts the Object Exporter ID (OXID) from the structure and contacts the OXID resolver service specified by the RPC binding information in the OBJREF.&amp;lt;br&amp;gt;
The client uses the OXID resolver service to find the RPC binding information of the COM server which hosts the object and establishes a connection to the RPC endpoint to access the object&amp;amp;#39;s interfaces.&amp;lt;br&amp;gt;
Both of these steps require establishing an MSRPC connection to an endpoint. Commonly this is either locally over ALPC, or remotely via TCP. If a TCP connection is used then the client will also authenticate to the RPC server using NTLM or Kerberos based on the security bindings in the OBJREF.&amp;lt;br&amp;gt;
The first key insight I had for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=325&amp;#34;&amp;gt;issue 325&amp;lt;/a&amp;gt; is that you can construct an OBJREF which will always establish a connection to the OXID resolver service over TCP, even if the service was on the local machine. To do this you specify the hostname as an IP address and an arbitrary TCP port for the client to connect to. This allows you to listen locally and when the RPC connection is made the authentication can be relayed or repurposed.&amp;lt;br&amp;gt;
This isn&amp;amp;#39;t yet a privilege escalation, since you need to convince a privileged user to unmarshal the OBJREF. This was the second key insight: you could get a privileged service to unmarshal an arbitrary OBJREF easily using the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/objbase/nf-objbase-cogetinstancefromistorage&amp;#34;&amp;gt;CoGetInstanceFromIStorage&amp;lt;/a&amp;gt; API and activating a privileged COM service. This marshals a COM object, creates the privileged COM server and then unmarshals the object in the server&amp;amp;#39;s security context. This results in an RPC call to the fake OXID resolver authenticated using a privileged user&amp;amp;#39;s credentials. From there the authentication could be relayed to the local system for privilege escalation.&amp;lt;br&amp;gt;
Being able to redirect the OXID resolver RPC connection locally to a different TCP port was not by design and Microsoft eventually fixed this in Windows 10 1809/Server 2019. The underlying issue prior to Windows 10 1809 was the string containing the host returned as part of the OBJREF was directly concatenated into an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/rpc/string-binding&amp;#34;&amp;gt;RPC string binding&amp;lt;/a&amp;gt; . Normally the RPC string binding should have been in the form of:&amp;lt;br&amp;gt;
ncacn_ip_tcp:ADDRESS[135]&amp;lt;br&amp;gt;
Where ncacn_ip_tcp is the protocol sequence for RPC over TCP, ADDRESS is the target address which would come from the string binding, and [135] is the well-known TCP port for the OXID resolver appended by RPCSS. However, as the ADDRESS value is inserted manually into the binding then the OBJREF could specify its own port, resulting in the string binding:&amp;lt;br&amp;gt;
ncacn_ip_tcp:ADDRESS[9999][135]&amp;lt;br&amp;gt;
The RPC runtime would just pick the first port in the binding string to connect to, in this case 9999, and would ignore the second port 135. This behavior was fixed by calling the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/rpcdce/nf-rpcdce-rpcstringbindingcomposew&amp;#34;&amp;gt;RpcStringBindingCompose&amp;lt;/a&amp;gt; API which will correctly escape the additional port number which ensures it&amp;amp;#39;s ignored when making the RPC connection.&amp;lt;br&amp;gt;
This is where the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sentinelone.com/labs/relaying-potatoes-another-unexpected-privilege-escalation-vulnerability-in-windows-rpc-protocol/&amp;#34;&amp;gt;RemotePotato exploit&amp;lt;/a&amp;gt; , developed by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/splinter_code&amp;#34;&amp;gt;Antonio Cocomazzi&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/decoder_it&amp;#34;&amp;gt;Andrea Pierini&amp;lt;/a&amp;gt; , comes into the picture. While it was no longer possible to redirect the OXID resolving to a local TCP server, you could redirect the initial connection to an external server. A call is made to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/65292e10-ef0c-43ee-bce7-788e271cc794&amp;#34;&amp;gt;IObjectExporter::ResolveOxid2&amp;lt;/a&amp;gt; method which can return an arbitrary RPC binding string for a fake COM object.&amp;lt;br&amp;gt;
Unlike the OXID resolver binding string, the one for the COM object is allowed to contain an arbitrary TCP port. By returning a binding string for the original host on an arbitrary TCP port, the second part of the connection process can be relayed rather than the first. The relayed authentication can then be sent to a domain server, such as LDAP or SMB, as long as they don&amp;amp;#39;t enforce signing.&amp;lt;br&amp;gt;
This exploit has the clear disadvantage of requiring an external machine to act as the target of the initial OXID resolving. While investigating the Kerberos authentication relay attacks for DCOM, could I find a way to do everything on the same machine?&amp;lt;br&amp;gt;
Remote ➜ Local Potato&amp;lt;br&amp;gt;
If we&amp;amp;#39;re relaying the authentication for the second RPC connection, could we get the local OXID resolver to do the work for us and resolve to a local COM server on a randomly selected port? One of my goals is to write the least amount of code, which is why we&amp;amp;#39;ll do everything in C# and .NET.&amp;lt;br&amp;gt;
byte [] ba = GetMarshalledObject(new object());&amp;lt;br&amp;gt;
var std = COMObjRefStandard.FromArray(ba);&amp;lt;br&amp;gt;
Console.WriteLine( &amp;amp;#34;IPID: {0}&amp;amp;#34; , std.Ipid);&amp;lt;br&amp;gt;
Console.WriteLine( &amp;amp;#34;OXID: {0:X08}&amp;amp;#34; , std.Oxid);&amp;lt;br&amp;gt;
Console.WriteLine( &amp;amp;#34;OID : {0:X08}&amp;amp;#34; , std.Oid);&amp;lt;br&amp;gt;
std.StringBindings.Clear();&amp;lt;br&amp;gt;
std.StringBindings.Add(RpcTowerId.Tcp, &amp;amp;#34;127.0.0.1&amp;amp;#34; );&amp;lt;br&amp;gt;
Console.WriteLine( $&amp;amp;#34;objref: {0} :&amp;amp;#34; , Convert.ToBase64String(std.ToArray());&amp;lt;br&amp;gt;
This code creates a basic .NET object and COM marshals it to a standard OBJREF. I&amp;amp;#39;ve left out the code for the marshalling and parsing of the OBJREF, but much of that is already present in the linked &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=325&amp;#34;&amp;gt;issue 325&amp;lt;/a&amp;gt; . We then modify the list of string bindings to only include a TCP binding for 127.0.0.1, forcing the OXID resolver to use TCP. If you specify a computer&amp;amp;#39;s hostname then the OXID resolver will use ALPC instead. Note that the string bindings in the OBJREF are only for binding to the OXID resolver, not the COM server itself.&amp;lt;br&amp;gt;
We can then convert the modified OBJREF into an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/objbase/nf-objbase-createobjrefmoniker&amp;#34;&amp;gt;objref moniker&amp;lt;/a&amp;gt; . This format is useful as it allows us to trivially unmarshal the object in another process by calling the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/dotnet/api/system.runtime.interopservices.marshal.bindtomoniker&amp;#34;&amp;gt;Marshal::BindToMoniker&amp;lt;/a&amp;gt; API in .NET and passing the moniker string. For example to bind to the COM object in PowerShell you can run the following command:&amp;lt;br&amp;gt;
[ Runtime.InteropServices.Marshal ]:: BindToMoniker( &amp;amp;#34;objref:TUVP...:&amp;amp;#34; )&amp;lt;br&amp;gt;
Immediately after binding to the moniker a firewall dialog is likely to appear as shown:&amp;lt;br&amp;gt;
This is requesting the user to allow our COM server process access to listen on all network interfaces for incoming connections. This prompt only appears when the client tries to resolve the OXID as DCOM supports dynamic RPC endpoints. Initially when the COM server starts it only listens on ALPC, but the RPCSS service can ask the server to bind to additional endpoints.&amp;lt;br&amp;gt;
This request is made through an internal RPC interface that every COM server implements for use by the RPCSS service. One of the functions on this interface is UseProtSeq , which requests that the COM server enables a TCP endpoint. When the COM server receives the UseProtSeq call it tries to bind a TCP server to all interfaces, which subsequently triggers the Windows Defender Firewall to prompt the user for access.&amp;lt;br&amp;gt;
Enabling the firewall permission requires administrator privileges. However, as we only need to listen for connections via localhost we shouldn&amp;amp;#39;t need to modify the firewall so the dialog can be dismissed safely. However, going back to the COM client we&amp;amp;#39;ll see an error reported.&amp;lt;br&amp;gt;
Exception calling &amp;amp;#34;BindToMoniker&amp;amp;#34; with &amp;amp;#34;1&amp;amp;#34; argument(s):&amp;lt;br&amp;gt;
&amp;amp;#34;The RPC server is unavailable. (Exception from HRESULT: 0x800706BA)&amp;amp;#34;&amp;lt;br&amp;gt;
If we allow our COM server executable through the firewall, the client is able to connect over TCP successfully. Clearly the firewall is affecting the behavior of the COM client in some way even though it shouldn&amp;amp;#39;t. Tracing through the unmarshalling process in the COM client, the error is being returned from RPCSS when trying to resolve the OXID&amp;amp;#39;s binding information. This would imply that no connection attempt is made, and RPCSS is detecting that the COM server wouldn&amp;amp;#39;t be allowed through the firewall and refusing to return any binding information for TCP.&amp;lt;br&amp;gt;
Further digging into RPCSS led me to the following function:&amp;lt;br&amp;gt;
BOOL IsPortOpen ( LPWSTR ImageFileName , int PortNumber ) {&amp;lt;br&amp;gt;
INetFwMgr * mgr ;&amp;lt;br&amp;gt;
CoCreateInstance ( CLSID_FwMgr , NULL , CLSCTX_INPROC_SERVER ,&amp;lt;br&amp;gt;
IID_PPV_ARGS (&amp;amp;amp; mgr ));&amp;lt;br&amp;gt;
VARIANT Allowed ;&amp;lt;br&amp;gt;
VARIANT Restricted ;&amp;lt;br&amp;gt;
mgr -&amp;amp;gt; IsPortAllowed ( ImageFileName , NET_FW_IP_VERSION_ANY ,&amp;lt;br&amp;gt;
PortNumber , NULL , NET_FW_IP_PROTOCOL_TCP ,&amp;lt;br&amp;gt;
&amp;amp;amp; Allowed , &amp;amp;amp; Restricted );&amp;lt;br&amp;gt;
if ( VT_BOOL != Allowed . vt )&amp;lt;br&amp;gt;
return FALSE ;&amp;lt;br&amp;gt;
return Allowed . boolVal == VARIANT_TRUE ;&amp;lt;br&amp;gt;
}&amp;lt;br&amp;gt;
This function uses the HNetCfg.FwMgr COM object, and calls &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/netfw/nf-netfw-inetfwmgr-isportallowed&amp;#34;&amp;gt;INetFwMgr::IsPortAllowed&amp;lt;/a&amp;gt; to determine if the process is allowed to listen on the specified TCP port. This function is called for every TCP binding when enumerating the COM server&amp;amp;#39;s bindings to return to the client. RPCSS passes the full path to the …</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211021-161528/</link>
      <pubDate>Thu, 21 Oct 2021 16:15:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211021-161528/</guid>
      <description>Last night Alexandre Muñiz gave a Celebration of Mind talk titled “How to Roll Two Dice.”
If you want to roll 2d6, you can do it either the boring way (by rolling two ordinary d6s)
or the interesting way — by rolling two distinct d6s, one labeled 1-2-2-3-3-4 and the other
labeled 1-3-4-5-6-8. These &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Sicherman_dice&amp;#34;&amp;gt;Sicherman dice&amp;lt;/a&amp;gt; (invented by George Sicherman and first reported by Martin Gardner in 1978) produce the
same distribution of 36 possible results as the ordinary 2d6:&amp;lt;br&amp;gt;
Back to Basics at CppCon 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#conferences&amp;#34;&amp;gt;conferences&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cppcon&amp;#34;&amp;gt;cppcon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
CppCon 2021 starts in just a few days! As in 2019 and 2020, CppCon 2021 will have a “Back to Basics”
track. The Back to Basics track’s mission (in phrasing newly refined for 2021) is: Top trainers clearly explain all the essential topics of modern C&#43;&#43;.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211021-160906/</link>
      <pubDate>Thu, 21 Oct 2021 16:09:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211021-160906/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/the-power-mba-customer-story/&amp;#34;&amp;gt;Gonzalo created a payment gateway to integrate more than 20 payment providers, sending the orders to MongoDB—but he still faced one problem: “I wasn’t able to show visualization of revenue to our team.” For that, he turned to Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211021-042150/</link>
      <pubDate>Thu, 21 Oct 2021 04:21:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211021-042150/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/18/competitive-programming-in-haskell-bfs-part-2-alternative-apis/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211021-002103/</link>
      <pubDate>Thu, 21 Oct 2021 00:21:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211021-002103/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/20/science/webb-telescope-astronomy-homophobia.html&amp;#34;&amp;gt;Out There The Webb Telescope’s Latest Stumbling Block: Its Name The long-awaited successor to the Hubble Space Telescope is scheduled to launch in December. But the NASA official for whom it is named has been accused of homophobia. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211021-000923/</link>
      <pubDate>Thu, 21 Oct 2021 00:09:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211021-000923/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-a-graphql-admin-panel/&amp;#34;&amp;gt;This post will show you how to create an admin panel with GraphQL endpoints using Retool—in less than 10 minutes. With our pre-built components, we&amp;#39;ll both build an admin panel UI with less code, and explain how your CRUD queries work with the UI.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211020-202026/</link>
      <pubDate>Wed, 20 Oct 2021 20:20:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211020-202026/</guid>
      <description>Welcome to our Hacks: Decoded Interview series! We spoke with Thomas Park over email about coding, his favourite apps and his past life at Mozilla. Thomas is the founder of Codepip, a platform he created for coding games that helps people learn HTML, CSS, JavaScript, etc. The most popular game is Flexbox Froggy.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211020-201559/</link>
      <pubDate>Wed, 20 Oct 2021 20:15:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211020-201559/</guid>
      <description>&amp;lt;p&amp;gt;Here’s a puzzle for you: How do you write a class without a copy constructor?&amp;lt;br&amp;gt;
Many thanks to Matheus Izvekov for the implementation, and to Stephan Bergmann for reporting
these issues!&amp;lt;br&amp;gt;
template&amp;amp;lt;class C&amp;amp;gt;
struct Wrap {
Wrap(C&amp;amp;amp;);
operator C::iterator() const;
};&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;template&amp;amp;lt;class C&amp;amp;gt;
void f(C&amp;amp;amp;, typename C::const_iterator);&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;int main() {
std::list&amp;amp;lt;int&amp;amp;gt; v;
f(v, Wrap(v));
}&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211020-162022/</link>
      <pubDate>Wed, 20 Oct 2021 16:20:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211020-162022/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/hacks-decoded-thomas-park-founder-of-codepip/&amp;#34;&amp;gt;Hacks Decoded: Thomas Park, Founder of Codepip →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/hacks-decoded-thomas-park-founder-of-codepip/&amp;#34;&amp;gt;Hacks Decoded: Thomas Park, Founder of Codepip&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Welcome to our Hacks: Decoded Interview series! We spoke with Thomas Park over email about coding, his favourite apps and his past life at Mozilla. Thomas is the founder of Codepip, a platform he created for coding games that help people learn HTML, CSS, JavaScript, etc. The most popular game is Flexbox Froggy.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211020-121917/</link>
      <pubDate>Wed, 20 Oct 2021 12:19:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211020-121917/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/20/technology/mark-zuckerberg-facebook-lawsuit.html&amp;#34;&amp;gt;Mark Zuckerberg will be added to a Facebook privacy lawsuit. The District of Columbia case, which grew out of the Cambridge Analytica scandal, could expose the chief executive to financial and other penalties. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211020-041611/</link>
      <pubDate>Wed, 20 Oct 2021 04:16:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211020-041611/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html&amp;#34;&amp;gt;How a simple Linux kernel memory corruption bug ca&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211020-001806/</link>
      <pubDate>Wed, 20 Oct 2021 00:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211020-001806/</guid>
      <description>The U.S. House committee probing the Jan. 6 Capitol attack voted unanimously to approve a contempt report against Steve Bannon&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211019-201524/</link>
      <pubDate>Tue, 19 Oct 2021 20:15:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211019-201524/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-style&amp;#34;&amp;gt;c&#43;&#43;-style&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The other day I received a pre-release review copy of Fedor Pikus’s new book, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/3AZ35pz&amp;#34;&amp;gt;The Art of Writing Efficient Programs&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.packtpub.com/product/the-art-of-writing-efficient-programs/9781800208117&amp;#34;&amp;gt;Packt Publishing&amp;lt;/a&amp;gt; , 2021).
Here’s my review of it. TLDR: it’s very good! I don’t say that about just
any book; and for a review copy from Packt, this book definitely exceeded my
expectations.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211019-161603/</link>
      <pubDate>Tue, 19 Oct 2021 16:16:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211019-161603/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html&amp;#34;&amp;gt;How a simple Linux kernel memory corruption bug can lead to complete system compromise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
An analysis of current and potential kernel security mitigations&amp;lt;br&amp;gt;
Posted by Jann Horn, Project Zero&amp;lt;br&amp;gt;
This blog post describes a straightforward Linux kernel locking bug and how I exploited it against Debian Buster&amp;amp;#39;s 4.19.0-13-amd64 kernel. Based on that, it explores options for security mitigations that could prevent or hinder exploitation of issues similar to this one.&amp;lt;br&amp;gt;
I hope that stepping through such an exploit and sharing this compiled knowledge with the wider security community can help with reasoning about the relative utility of various mitigation approaches.&amp;lt;br&amp;gt;
A lot of the individual exploitation techniques and mitigation options that I am describing here aren&amp;amp;#39;t novel. However, I believe that there is value in writing them up together to show how various mitigations interact with a fairly normal use-after-free exploit.&amp;lt;br&amp;gt;
Our bugtracker entry for this bug, along with the proof of concept, is at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2125&amp;#34;&amp;gt;https://bugs.chromium.org/p/project-zero/issues/detail?id=2125&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Code snippets in this blog post that are relevant to the exploit are taken from the upstream 4.19.160 release, since that is what the targeted Debian kernel is based on; some other code snippets are from mainline Linux.&amp;lt;br&amp;gt;
(In case you&amp;amp;#39;re wondering why the bug and the targeted Debian kernel are from end of last year: I already wrote most of this blogpost around April, but only recently finished it)&amp;lt;br&amp;gt;
I would like to thank &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/lunixbochs&amp;#34;&amp;gt;Ryan Hileman&amp;lt;/a&amp;gt; for a discussion we had a while back about how static analysis might fit into static prevention of security bugs (but note that Ryan hasn&amp;amp;#39;t reviewed this post and doesn&amp;amp;#39;t necessarily agree with any of my opinions). I also want to thank &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/kees_cook&amp;#34;&amp;gt;Kees Cook&amp;lt;/a&amp;gt; for providing feedback on an earlier version of this post (again, without implying that he necessarily agrees with everything), and my Project Zero colleagues for reviewing this post and frequent discussions about exploit mitigations.&amp;lt;br&amp;gt;
Background for the bug&amp;lt;br&amp;gt;
On Linux, terminal devices (such as a serial console or a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Virtual_console&amp;#34;&amp;gt;virtual console&amp;lt;/a&amp;gt; ) are represented by a&amp;lt;br&amp;gt;
struct tty_struct&amp;lt;br&amp;gt;
. Among other things, this structure contains fields used for the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gnu.org/software/libc/manual/html_node/Job-Control.html&amp;#34;&amp;gt;job control&amp;lt;/a&amp;gt; features of terminals, which are usually modified using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man4/tty_ioctl.4.html&amp;#34;&amp;gt;a set of ioctls&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
struct tty_struct {
[...]
        spinlock_t ctrl_lock;
[...]
        struct pid *pgrp;               /* Protected by ctrl lock */
        struct pid *session;
[...]
        struct tty_struct *link;
[...]
}[...];&amp;lt;br&amp;gt;
The&amp;lt;br&amp;gt;
pgrp&amp;lt;br&amp;gt;
field points to the foreground process group of the terminal (normally modified from userspace via the&amp;lt;br&amp;gt;
TIOCSPGRP&amp;lt;br&amp;gt;
ioctl); the&amp;lt;br&amp;gt;
session&amp;lt;br&amp;gt;
field points to the session associated with the terminal. Both of these fields do not point directly to a process/task, but rather to a&amp;lt;br&amp;gt;
struct pid&amp;lt;br&amp;gt;
.&amp;lt;br&amp;gt;
ties a specific incarnation of a numeric ID to a set of processes that use that ID as their PID (also known in userspace as TID), TGID (also known in userspace as PID), PGID, or SID. You can kind of think of it as a weak reference to a process, although that&amp;amp;#39;s not entirely accurate. (There&amp;amp;#39;s some extra nuance around&amp;lt;br&amp;gt;
when&amp;lt;br&amp;gt;
execve()&amp;lt;br&amp;gt;
is called by a non-leader thread, but that&amp;amp;#39;s irrelevant here.)&amp;lt;br&amp;gt;
All processes that are running inside a terminal and are subject to its job control refer to that terminal as their &amp;amp;#34;controlling terminal&amp;amp;#34; (stored in&amp;lt;br&amp;gt;
-&amp;amp;gt;signal-&amp;amp;gt;tty&amp;lt;br&amp;gt;
of the process).&amp;lt;br&amp;gt;
A special type of terminal device are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man7/pty.7.html&amp;#34;&amp;gt;pseudoterminals&amp;lt;/a&amp;gt; , which are used when you, for example, open a terminal application in a graphical environment or connect to a remote machine via SSH. While other terminal devices are connected to some sort of hardware, both ends of a pseudoterminal are controlled by userspace, and pseudoterminals can be freely created by (unprivileged) userspace. Every time &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man4/pts.4.html&amp;#34;&amp;gt;/dev/ptmx&amp;lt;/a&amp;gt; (short for &amp;amp;#34;pseudoterminal multiplexor&amp;amp;#34;) is opened, the resulting file descriptor represents the device side (referred to in documentation and kernel sources as &amp;amp;#34; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/linux/man-pages/man7/pty.7.html&amp;#34;&amp;gt;the pseudoterminal master&amp;lt;/a&amp;gt; &amp;amp;#34;) of a new pseudoterminal . You can read from it to get the data that should be printed on the emulated screen, and write to it to emulate keyboard inputs. The corresponding terminal device (to which you&amp;amp;#39;d usually connect a shell) is automatically created by the kernel under&amp;lt;br&amp;gt;
/dev/pts/&amp;amp;lt;number&amp;amp;gt;&amp;lt;br&amp;gt;
One thing that makes pseudoterminals particularly strange is that both ends of the pseudoterminal have their own&amp;lt;br&amp;gt;
, which point to each other using the&amp;lt;br&amp;gt;
link&amp;lt;br&amp;gt;
member, even though the device side of the pseudoterminal does not have terminal features like job control - so many of its members are unused.&amp;lt;br&amp;gt;
Many of the ioctls for terminal management can be used on both ends of the pseudoterminal; but no matter on which end you call them, they affect the same state, sometimes with minor differences in behavior. For example, in the ioctl handler for&amp;lt;br&amp;gt;
TIOCGPGRP&amp;lt;br&amp;gt;
:&amp;lt;br&amp;gt;
/**
 *      tiocgpgrp               -       get process group
 *      @tty: tty passed by user
 *      @real_tty: tty side of the tty passed by the user if a pty else the tty
 *      @p: returned pid
 *
 *      Obtain the process group of the tty. If there is no process group
 *      return an error.
 *
 *      Locking: none. Reference to current-&amp;amp;gt;signal-&amp;amp;gt;tty is safe.
 */
static int tiocgpgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
{
        struct pid *pid;
        int ret;
        /*
         * (tty == real_tty) is a cheap way of
         * testing if the tty is NOT a master pty.
         */
        if (tty == real_tty &amp;amp;amp;&amp;amp;amp; current-&amp;amp;gt;signal-&amp;amp;gt;tty != real_tty)
                return -ENOTTY;
        pid = tty_get_pgrp(real_tty);
        ret =  put_user(pid_vnr(pid), p);
        put_pid(pid);
        return ret;
}&amp;lt;br&amp;gt;
As documented in the comment above, these handlers receive a pointer&amp;lt;br&amp;gt;
real_tty&amp;lt;br&amp;gt;
that points to the normal terminal device; an additional pointer&amp;lt;br&amp;gt;
tty&amp;lt;br&amp;gt;
is passed in that can be used to figure out on which end of the terminal the ioctl was originally called. As this example illustrates, the&amp;lt;br&amp;gt;
pointer is normally only used for things like pointer comparisons. In this case, it is used to prevent&amp;lt;br&amp;gt;
from working when called on the terminal side by a process which does not have this terminal as its controlling terminal.&amp;lt;br&amp;gt;
Note: If you want to know more about how terminals and job control are intended to work, the book &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://man7.org/tlpi/&amp;#34;&amp;gt;&amp;amp;#34;The Linux Programming Interface&amp;amp;#34;&amp;lt;/a&amp;gt; provides a nice introduction to how these older parts of the userspace API are supposed to work. It doesn&amp;amp;#39;t describe any of the kernel internals though, since it&amp;amp;#39;s written as a reference for userspace programming. And it&amp;amp;#39;s from 2010, so it doesn&amp;amp;#39;t have anything in it about new APIs that have showed up over the last decade.&amp;lt;br&amp;gt;
The bug&amp;lt;br&amp;gt;
The bug was in the ioctl handler&amp;lt;br&amp;gt;
tiocspgrp&amp;lt;br&amp;gt;
/**
 *      tiocspgrp               -       attempt to set process group
 *      @tty: tty passed by user
 *      @real_tty: tty side device matching tty passed by user
 *      @p: pid pointer
 *
 *      Set the process group of the tty to the session passed. Only
 *      permitted where the tty session is our session.
 *
 *      Locking: RCU, ctrl lock
 */
static int tiocspgrp(struct tty_struct *tty, struct tty_struct *real_tty, pid_t __user *p)
{
        struct pid *pgrp;
        pid_t pgrp_nr;
[...]
        if (get_user(pgrp_nr, p))
                return -EFAULT;
[...]
        pgrp = find_vpid(pgrp_nr);
[...]
        spin_lock_irq(&amp;amp;amp;tty-&amp;amp;gt;ctrl_lock);
        put_pid(real_tty-&amp;amp;gt;pgrp);
        real_tty-&amp;amp;gt;pgrp = get_pid(pgrp);
        spin_unlock_irq(&amp;amp;amp;tty-&amp;amp;gt;ctrl_lock);
[...]
}&amp;lt;br&amp;gt;
member of the terminal side (&amp;lt;br&amp;gt;
) is being modified, and the reference counts of the old and new process group are adjusted accordingly using&amp;lt;br&amp;gt;
put_pid&amp;lt;br&amp;gt;
and&amp;lt;br&amp;gt;
get_pid&amp;lt;br&amp;gt;
; but the lock is taken on&amp;lt;br&amp;gt;
, which can be either end of the pseudoterminal pair, depending on which file descriptor we pass to&amp;lt;br&amp;gt;
ioctl()&amp;lt;br&amp;gt;
. So by simultaneously calling the&amp;lt;br&amp;gt;
ioctl on both sides of the pseudoterminal, we can cause data races between concurrent accesses to the&amp;lt;br&amp;gt;
member. This can cause reference counts to become skewed through the following races:&amp;lt;br&amp;gt;
ioctl(fd1, TIOCSPGRP, pid_A)        ioctl(fd2, TIOCSPGRP, pid_B)
    spin_lock_irq(...)                  spin_lock_irq(...)
    put_pid(old_pid)
                                        put_pid(old_pid)
    real_tty-&amp;amp;gt;pgrp = get_pid(A)
                                        real_tty-&amp;amp;gt;pgrp = get_pid(B)
    spin_unlock_irq(...)                spin_unlock_irq(...)&amp;lt;br&amp;gt;
ioctl(fd1, TIOCSPGRP, pid_A)        ioctl(fd2, TIOCSPGRP, pid_B)
    spin_lock_irq(...)                  spin_lock_irq(...)
    put_pid(old_pid)
                                        put_pid(old_pid)
                                        real_tty-&amp;amp;gt;pgrp = get_pid(B)
    real_tty-&amp;amp;gt;pgrp = get_pid(A)
    spin_unlock_irq(...)                spin_unlock_irq(...)&amp;lt;br&amp;gt;
In both cases, the refcount of the old&amp;lt;br&amp;gt;
is decremented by 1 too much, and either A&amp;amp;#39;s or B&amp;amp;#39;s is incremented by 1 too much.&amp;lt;br&amp;gt;
Once you understand the issue, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/linus/54ffccbf053b&amp;#34;&amp;gt;the fix&amp;lt;/a&amp;gt; seems relatively obvious:&amp;lt;br&amp;gt;
if (session_of_pgrp(pgrp) != task_session(current))
        goto out_unlock;
    retval = 0;
-   spin_lock_irq(&amp;amp;amp;tty-&amp;amp;gt;ctrl_lock);
&#43;   spin_lock_irq(&amp;amp;amp;real_tty-&amp;amp;gt;ctrl_lock);
    put_pid(real_tty-&amp;amp;gt;pgrp);
    real_tty-&amp;amp;gt;pgrp = get_pid(pgrp);
-   spin_unlock_irq(&amp;amp;amp;tty-&amp;amp;gt;ctrl_lock);
&#43;   spin_unlock_irq(&amp;amp;amp;real_tty-&amp;amp;gt;ctrl_lock);
 out_unlock:
    rcu_read_unlock();
    return retval;&amp;lt;br&amp;gt;
Attack stages&amp;lt;br&amp;gt;
In this section, I will first walk through how my exploit works; afterwards I will discuss different defensive techniques that target these attack stages.&amp;lt;br&amp;gt;
Attack stage: Freeing the object with multiple dangling references&amp;lt;br&amp;gt;
This bug allows us to probabilistically skew the refcount of a&amp;lt;br&amp;gt;
down, depending on which way the race happens: We can run colliding&amp;lt;br&amp;gt;
calls from two threads repeatedly, and from time to time that will mess up the refcount. But we don&amp;amp;#39;t immediately know how many times the refcount skew has actually happened.&amp;lt;br&amp;gt;
What …</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211019-121847/</link>
      <pubDate>Tue, 19 Oct 2021 12:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211019-121847/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/china-cyber-telcos/china-linked-hacking-group-accessing-calling-records-worldwide-crowdstrike-says-idUSKBN2H914I&amp;#34;&amp;gt;China-linked hacking group accessing calling records worldwide, CrowdStrike says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     A hacking group with suspected ties to China burrowed into mobile telephone networks around the world and used specialized tools to grab calling records and text messages from telecommunication carriers, a U.S. cybersecurity company said on Tuesday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20211019-081640/</link>
      <pubDate>Tue, 19 Oct 2021 08:16:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20211019-081640/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com&amp;#34;&amp;gt;Follow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211019-002239/</link>
      <pubDate>Tue, 19 Oct 2021 00:22:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211019-002239/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/18/competitive-programming-in-haskell-bfs-part-2-alternative-apis/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 2 (alternative APIs)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211018-202117/</link>
      <pubDate>Mon, 18 Oct 2021 20:21:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211018-202117/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/18/competitive-programming-in-haskell-bfs-part-2-alternative-apis/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 2 (alternative APIs)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;my last post&amp;lt;/a&amp;gt; , I showed how we can solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; (and hopefully other BFS problems as well) using a certain API for BFS, which returns two functions: one,&amp;lt;br&amp;gt;
level :: v -&amp;amp;gt; Maybe Int&amp;lt;br&amp;gt;
, gives the level ( i.e. length of a shortest path to) of each vertex, and&amp;lt;br&amp;gt;
parent :: v -&amp;amp;gt; Maybe v&amp;lt;br&amp;gt;
gives the parent of each vertex in the BFS forest. Before showing an implementation, I wanted to talk a bit more about this API and why I chose it.&amp;lt;br&amp;gt;
In particular, Andrey Mokhov &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/#comment-40054&amp;#34;&amp;gt;left a comment&amp;lt;/a&amp;gt; on my previous post with some alternative APIs:&amp;lt;br&amp;gt;
bfsForest :: Ord a =&amp;amp;gt; [ a ] -&amp;amp;gt; AdjacencyMap a -&amp;amp;gt; Forest a bfs :: Ord a =&amp;amp;gt; [ a ] -&amp;amp;gt; AdjacencyMap a -&amp;amp;gt; [ [ a ] ]&amp;lt;br&amp;gt;
Of course, as Andrey notes,&amp;lt;br&amp;gt;
AdjacencyMap&amp;lt;br&amp;gt;
is actually a reified graph data structure, which we don’t want here, but that’s not essential; presumably the&amp;lt;br&amp;gt;
arguments in Andrey’s functions could easily be replaced by an implicit graph description instead. (Note that an API requiring an implicit representation is strictly more powerful, since if you have an explicit representation you can always just pass in a function which does lookups into your explicit representation.) However, Andrey raises a good point. Both these APIs return information which is not immediately available from my API.&amp;lt;br&amp;gt;
bfsForest&amp;lt;br&amp;gt;
returns an actual forest we can traverse, giving the children of each node. My API only returns a&amp;lt;br&amp;gt;
function which gives the parent of each node. These contain equivalent information, however, and we can convert back and forth efficiently (where by “efficiently” in this context I mean “in time or better”) as long as we have a list of all vertices. To convert from a&amp;lt;br&amp;gt;
Forest&amp;lt;br&amp;gt;
to a parent function, just traverse the forest and remember all the parent-child pairs we see, building e.g. a&amp;lt;br&amp;gt;
that can be used for lookup. To convert back, first iterate over the list of all vertices, find the parent of each, and build an inverse mapping from parents to sets of children. If we want to proceed to building an actual&amp;lt;br&amp;gt;
data structure, we can unfold one via repeated lookups into our child mapping.&amp;lt;br&amp;gt;
However, I would argue that in typical applications, having the&amp;lt;br&amp;gt;
function is more useful than having a&amp;lt;br&amp;gt;
. For example, the&amp;lt;br&amp;gt;
function allows us to efficiently answer common, classic queries such as “Is vertex&amp;lt;br&amp;gt;
reachable from vertex&amp;lt;br&amp;gt;
?” and “What is a shortest path from&amp;lt;br&amp;gt;
?” Answering these questions with a&amp;lt;br&amp;gt;
would require traversing the entire&amp;lt;br&amp;gt;
to look for the target vertex&amp;lt;br&amp;gt;
returns a list of levels: that is, the first list is the starting vertices, the next list is all vertices one step away from any starting vertex, the next list is all vertices two steps away, and so on. Again, given a list of all vertices, we can recover a list of levels from the&amp;lt;br&amp;gt;
function: just traverse the list of all vertices, looking up the level of each and adding it to an appropriate mapping from levels to sets of vertices. Converting in the other direction is easy as well.&amp;lt;br&amp;gt;
A level list lets us efficiently answer a queries such as “how many vertices are exactly 5 steps away from&amp;lt;br&amp;gt;
”?, whereas with the&amp;lt;br&amp;gt;
function we can efficiently answer queries such as “What is the length of a shortest path from&amp;lt;br&amp;gt;
?” In practice, the latter form of query seems more common.&amp;lt;br&amp;gt;
In the final version of this BFS API, I will probably include some functions to recover forests and level sets as described above. Some benchmarking will be needed to see whether it’s more efficient to recover them after the fact or to actually keep track of them along the way.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211018-201815/</link>
      <pubDate>Mon, 18 Oct 2021 20:18:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211018-201815/</guid>
      <description>Biden administration asks Supreme Court to block Texas law banning abortions after six weeks &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/biden-administration-asks-us-supreme-court-block-texas-abortion-law-2021-10-18/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211018-162036/</link>
      <pubDate>Mon, 18 Oct 2021 16:20:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211018-162036/</guid>
      <description>October 17, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/10/17/Reliability.html&amp;#34;&amp;gt;Software developers have stopped caring about reliability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211018-161536/</link>
      <pubDate>Mon, 18 Oct 2021 16:15:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211018-161536/</guid>
      <description>means&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#c&#43;&#43;-learner-track&amp;#34;&amp;gt;c&#43;&#43;-learner-track&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In my C&#43;&#43; training classes, I often explain the meaning of&amp;lt;br&amp;gt;
as&amp;lt;br&amp;gt;
The library author is saying, “I know what you’re trying to do,
and what you’re trying to do is wrong.” …&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#celebration-of-mind&amp;#34;&amp;gt;celebration-of-mind&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#conferences&amp;#34;&amp;gt;conferences&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Next week, October 18 through 24, the Gathering 4 Gardner is hosting a week-long
Celebration of Mind, featuring three brief presentations per day, every day. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gathering4gardner.org/g4gs-celebration-of-mind-2021-10/&amp;#34;&amp;gt;The speaker lineup has just been announced&amp;lt;/a&amp;gt; —
and with a nicer HTML layout than &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gathering4gardner.org/g4gs-celebration-of-mind-april-2021/&amp;#34;&amp;gt;last time&amp;lt;/a&amp;gt; ,
too! The new layout makes this very short summary lineup less necessary than last time,
but heck, it’s content.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211016-122012/</link>
      <pubDate>Sat, 16 Oct 2021 12:20:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211016-122012/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/16/technology/instagram-teens.html&amp;#34;&amp;gt;Instagram Struggles With Fears of Losing Its ‘Pipeline’: Young Users The app, hailed as Facebook’s growth engine, has privately wrestled with retaining and engaging teenagers, according to internal documents. By Sheera Frenkel, Ryan Mac and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211016-121759/</link>
      <pubDate>Sat, 16 Oct 2021 12:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211016-121759/</guid>
      <description>U.S. FDA advisers vote to recommend J&amp;amp;amp;J COVID-19 vaccine booster for people 18 and older at least two months after first dose &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-fda-advisers-vote-favor-booster-jj-covid-19-vaccine-2021-10-15/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20211016-000752/</link>
      <pubDate>Sat, 16 Oct 2021 00:07:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20211016-000752/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://g1isgone.github.io/&amp;#34;&amp;gt;Ji Won Chung&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20211015-201427/</link>
      <pubDate>Fri, 15 Oct 2021 20:14:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20211015-201427/</guid>
      <description>Last summer an(other) unarmed black man was killed by police in Minneapolis, Minnesota. The subsequent 8 minute and 46 second video clip swept across social media and raised widespread condemnation. Hours of discourse and weeks of protests followed. …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211015-041747/</link>
      <pubDate>Fri, 15 Oct 2021 04:17:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211015-041747/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02807-w&amp;#34;&amp;gt;First mission to Jupiter’s asteroids could reveal Solar System origins&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
NASA’s Lucy spacecraft will loop past the never-before-explored ‘Trojan’ asteroids during a 12-year journey.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20211015-040832/</link>
      <pubDate>Fri, 15 Oct 2021 04:08:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20211015-040832/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/UXFactor_CSCW21.pdf&amp;#34;&amp;gt;The UX Factor: Using Comparative Peer Review to Evaluate Designs through User Preferences&amp;lt;/a&amp;gt; Sarah Bawabe, Laura Wilson, Tongyu Zhou, Ezra Marks, Jeff Huang CSCW 2021    (Honorable Mention Award, Impact Recognition Award) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://uxfactor.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211015-001901/</link>
      <pubDate>Fri, 15 Oct 2021 00:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211015-001901/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-water/u-s-authorities-disclose-ransomware-attacks-against-water-facilities-idUSKBN2H42KY&amp;#34;&amp;gt;U.S. authorities disclose ransomware attacks against water facilities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     U.S. authorities said on Thursday that four ransomware attacks had penetrated water and wastewater facilities in the past year, and they warned similar plants to check for signs of intrusions and take other precautions.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211015-001813/</link>
      <pubDate>Fri, 15 Oct 2021 00:18:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211015-001813/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-blowhard-curve-when-to-lead-thoughts&amp;#34;&amp;gt;The Blowhard Curve: When To Lead Thoughts Or Leave Them.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-blowhard-curve-when-to-lead-thoughts&amp;#34;&amp;gt;Find yourself and your organization on the curve.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211014-202112/</link>
      <pubDate>Thu, 14 Oct 2021 20:21:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211014-202112/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/maximum/&amp;#34;&amp;gt;maximum&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/subsequence/&amp;#34;&amp;gt;subsequence&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/sum/&amp;#34;&amp;gt;sum&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/09/competitive-programming-in-haskell-kadanes-algorithm/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211014-201830/</link>
      <pubDate>Thu, 14 Oct 2021 20:18:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211014-201830/</guid>
      <description>U.S. FDA advisers vote in favor of Moderna COVID vaccine boosters for those 65 and older and at high risk of severe illness &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/healthcare-pharmaceuticals/us-fda-advisers-weigh-case-covid-19-vaccine-booster-shots-2021-10-14/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211014-200857/</link>
      <pubDate>Thu, 14 Oct 2021 20:08:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211014-200857/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-input-ui-component-library/&amp;#34;&amp;gt;Today, we’re excited to roll out 35&#43; UI components rebuilt and redesigned from the ground up, amounting to one of the most comprehensive and configurable input libraries available.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211014-200636/</link>
      <pubDate>Thu, 14 Oct 2021 20:06:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211014-200636/</guid>
      <description>On Wednesday, the St. Louis Post-Dispatch ran a story about how its staff discovered and reported a security vulnerability in a Missouri state education website that exposed the Social Security numbers of 100,000 elementary and secondary teachers. In a press conference this morning, Missouri Gov. Mike Parson (R) said fixing the flaw could cost the state $50 million, and vowed his administration would seek to prosecute and investigate the “hackers” and anyone who aided the publication in its “attempt to embarrass the state and sell headlines for their news outlet.”&amp;lt;br&amp;gt;
Missouri Gov. Mike Parson (R), vowing to prosecute the St. Louis Post-Dispatch for reporting a security vulnerability that exposed teacher SSNs.&amp;lt;br&amp;gt;
The Post-Dispatch &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.stltoday.com/news/local/education/missouri-teachers-social-security-numbers-at-risk-on-state-agencys-website/article_f3339700-ece0-54a1-9a45-f300321b7c82.html&amp;#34;&amp;gt;says it discovered the vulnerability&amp;lt;/a&amp;gt; in a web application that allowed the public to search teacher certifications and credentials, and that more than 100,000 SSNs were available. The Missouri state Department of Elementary and Secondary Education (DESE) reportedly removed the affected pages from its website Tuesday after being notified of the problem by the publication (before the story on the flaw was published).&amp;lt;br&amp;gt;
The newspaper said it found that teachers’ Social Security numbers were contained in the HTML source code of the pages involved. In other words, the information was available to anyone with a web browser who happened to also examine the site’s public code using Developer Tools or simply right-clicking on the page and viewing the source code.&amp;lt;br&amp;gt;
The Post-Dispatch reported that it wasn’t immediately clear how long the Social Security numbers and other sensitive information had been vulnerable on the DESE website, nor was it known if anyone had exploited the flaw.&amp;lt;br&amp;gt;
But in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com&amp;#34;&amp;gt;a press conference Thursday morning&amp;lt;/a&amp;gt; , Gov. Parson said he would seek to prosecute and investigate the reporter and the region’s largest newspaper for “unlawfully” accessing teacher data.&amp;lt;br&amp;gt;
“This administration is standing up against any and all perpetrators who attempt to steal personal information and harm Missourians,” Parson said. “It is unlawful to access encoded data and systems in order to examine other peoples’ personal information. We are coordinating state resources to respond and utilize all legal methods available. My administration has notified the Cole County prosecutor of this matter, the Missouri State Highway Patrol’s Digital Forensics Unit will also be conducting an investigation of all of those involved. This incident alone may cost Missouri taxpayers as much as $50 million.”&amp;lt;br&amp;gt;
While threatening to prosecute the reporters to the fullest extent of the law, Parson sought to downplay the severity of the security weakness, saying the reporter only unmasked three Social Security numbers, and that “there was no option to decode Social Security numbers for all educators in the system all at once.”&amp;lt;br&amp;gt;
“The state is committed to bringing to justice anyone who hacked our systems or anyone who aided them to do so,” Parson continued. “A hacker is someone who gains unauthorized access to information or content. This individual did not have permission to do what they did. They had no authorization to convert or decode, so this was clearly a hack.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/#more-57293&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/&amp;#34;&amp;gt;Missouri Governor Vows to Prosecute St. Louis Post-Dispatch for Reporting Security Vulnerability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211014-162150/</link>
      <pubDate>Thu, 14 Oct 2021 16:21:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211014-162150/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/&amp;#34;&amp;gt;Competitive programming in Haskell: BFS, part 1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/09/competitive-programming-in-haskell-kadanes-algorithm/&amp;#34;&amp;gt;a previous post&amp;lt;/a&amp;gt; , I challenged you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/modulosolitaire&amp;#34;&amp;gt;Modulo Solitaire&amp;lt;/a&amp;gt; . In this problem, we are given a starting number and are trying to reach in as few moves as possible. At each move, we may pick one of up to 10 different rules that say we can transform into .&amp;lt;br&amp;gt;
In one sense, this is a straightforward search problem. Conceptually, the numbers through form the vertices of a graph, with a directed edge from to whenever there is some allowed such that ; we want to do a breadth first search in this graph to find the length of a shortest path from to . However, can be up to and there can be up to rules, giving a total of up to edges. In the case that is unreachable, we may have to explore every single edge. So we are going to need a pretty fast implementation; we’ll come back to that later.&amp;lt;br&amp;gt;
Haskell actually has a nice advantage here. This is exactly the kind of problem in which we want to represent the graph implicitly . There is no reason to actually reify the graph in memory as a data structure; it would only waste memory and time. Instead, we can specify the graph implicitly using a function that gives the neighbors of each vertex, which means BFS itself will be a higher-order function. Higher-order functions are very awkward to represent in a language like Java or C&#43;&#43;, so when I solve problems like this in Java, I tend to just write the whole BFS from scratch every single time, and I doubt I’m the only one. However, in Haskell we can easily make an abstract interface to BFS which takes a function as input specifying an implicit graph, allowing us to nicely separate out the graph search logic from the task of specifying the graph itself.&amp;lt;br&amp;gt;
What would be my ideal API for BFS in Haskell? I think it might look something like this (but I’m happy to hear suggestions as to how it could be made more useful or general):&amp;lt;br&amp;gt;
data BFSResult v = BFSR { level :: v -&amp;amp;gt; Maybe Int , parent :: v -&amp;amp;gt; Maybe v } bfs :: ( Ord v , Hashable v ) =&amp;amp;gt; [ v ] -&amp;amp;gt; -- Starting vertices ( v -&amp;amp;gt; [ v ] ) -&amp;amp;gt; -- Neighbors ( v -&amp;amp;gt; Bool ) -&amp;amp;gt; -- Goal predicate BFSResult v&amp;lt;br&amp;gt;
bfs&amp;lt;br&amp;gt;
takes a list of vertices to search from (which could be a singleton if there is a single specific starting vertex), a function specifying the out-neighbors of each vertex, and a predicate specifying which vertices are “goal” vertices (so we can stop early if we reach one), and returns a&amp;lt;br&amp;gt;
BFSResult&amp;lt;br&amp;gt;
record, which tells us the level at which each vertex was encountered, if at all (i.e. how many steps were required to reach it), and the parent of each vertex in the search. If we just want to know whether a vertex was reachable at all, we can see if&amp;lt;br&amp;gt;
level&amp;lt;br&amp;gt;
returns&amp;lt;br&amp;gt;
Just&amp;lt;br&amp;gt;
; if we want to know the shortest path to a vertex, we can just iterate&amp;lt;br&amp;gt;
parent&amp;lt;br&amp;gt;
. Vertices must be&amp;lt;br&amp;gt;
Hashable&amp;lt;br&amp;gt;
to facilitate storing them in data structures.&amp;lt;br&amp;gt;
Using this API, the solution is pretty short.&amp;lt;br&amp;gt;
main = C.interact $ runScanner tc &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; format data Move = Move { a :: ! Int , b :: ! Int } deriving ( Eq , Show ) data TC = TC { m :: Int , s0 :: Int , moves :: [ Move ] } deriving ( Eq , Show ) tc :: Scanner TC tc = do m &amp;amp;lt;- int n &amp;amp;lt;- int TC m &amp;amp;lt;$&amp;amp;gt; int &amp;amp;lt;*&amp;amp;gt; n &amp;amp;gt;&amp;amp;lt; ( Move &amp;amp;lt;$&amp;amp;gt; int &amp;amp;lt;*&amp;amp;gt; int ) format :: Maybe Int -&amp;amp;gt; ByteString format = maybe &amp;amp;#34;-1&amp;amp;#34; showB solve :: TC -&amp;amp;gt; Maybe Int solve TC { .. } = level res 0 where res = bfs [ s0 ] ( \ v -&amp;amp;gt; map ( step v ) moves ) ( == 0 ) step v ( Move a b ) = ( a * v &#43; b ) `mod` m&amp;lt;br&amp;gt;
We run a BFS from , stopping when we reach , and then look up the&amp;lt;br&amp;gt;
of 0 to see the minimum number of steps needed to reach it.&amp;lt;br&amp;gt;
In part 2, I’ll talk about how to implement this API. There are many viable implementation strategies, but the trick is getting it to run fast enough.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/bfs/&amp;#34;&amp;gt;BFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/search/&amp;#34;&amp;gt;search&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/14/competitive-programming-in-haskell-bfs-part-1/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/graph/&amp;#34;&amp;gt;graph&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211014-001251/</link>
      <pubDate>Thu, 14 Oct 2021 00:12:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211014-001251/</guid>
      <description>I&amp;#39;m discussing “One On One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Today, Oct 13, right now, in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0PGgsNoO9f&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0PGgsNoO9f&amp;#34;&amp;gt;https://t.co/0PGgsNoO9f&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211013-202010/</link>
      <pubDate>Wed, 13 Oct 2021 20:20:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211013-202010/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/13/technology/facebook-workplace-transparency-leaks.html&amp;#34;&amp;gt;Facebook clamps down on its internal message boards. The social network, which has been under increased scrutiny after a former product manager turned into a whistle-blower, is trying to prevent leaks. By Ryan Mac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211013-200649/</link>
      <pubDate>Wed, 13 Oct 2021 20:06:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211013-200649/</guid>
      <description>A recent phishing campaign targeting Coinbase users shows thieves are getting smarter about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211013-161721/</link>
      <pubDate>Wed, 13 Oct 2021 16:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211013-161721/</guid>
      <description>Live: Is your car running on empty? Ask our reporters why a tenth of petrol stations in London and southeast England are dry &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reddit.com/r/ukpolitics/comments/q7anq7/live_from_3pm_bst_were_reuters_journalists/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211013-160636/</link>
      <pubDate>Wed, 13 Oct 2021 16:06:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211013-160636/</guid>
      <description>A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete the login process. It also shows that phishers are attempting to sign up for new Coinbase accounts by the millions as part of an effort to identify email addresses that are already associated with active accounts.&amp;lt;br&amp;gt;
A Google-translated version of the now-defunct Coinbase phishing site, coinbase.com.password-reset[.]com&amp;lt;br&amp;gt;
Coinbase is the world’s second-largest cryptocurrency exchange, with roughly 68 million users from over 100 countries. The now-defunct phishing domain at issue — coinbase.com.password-reset[.]com — was targeting Italian Coinbase users (the site’s default language was Italian). And it was fairly successful, according to Alex Holden , founder of Milwaukee-based cybersecurity firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.holdsecurity.com&amp;#34;&amp;gt;Hold Security&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Holden’s team managed to peer inside some poorly hidden file directories associated with that phishing site, including its administration page. That panel, pictured in the redacted screenshot below, indicated the phishing attacks netted at least 870 sets of credentials before the site was taken offline.&amp;lt;br&amp;gt;
The Coinbase phishing panel.&amp;lt;br&amp;gt;
Holden said each time a new victim submitted credentials at the Coinbase phishing site, the administrative panel would make a loud “ding” — presumably to alert whoever was at the keyboard on the other end of this phishing scam that they had a live one on the hook.&amp;lt;br&amp;gt;
In each case, the phishers manually would push a button that caused the phishing site to ask visitors for more information, such as the one-time password from their mobile app.&amp;lt;br&amp;gt;
“These guys have real-time capabilities of soliciting any input from the victim they need to get into their Coinbase account,” Holden said.&amp;lt;br&amp;gt;
Pressing the “Send Info” button prompted visitors to supply additional personal information, including their name, date of birth, and street address. Armed with the target’s mobile number, they could also click “Send verification SMS” with a text message prompting them to text back a one-time code.&amp;lt;br&amp;gt;
SIFTING COINBASE FOR ACTIVE USERS&amp;lt;br&amp;gt;
Holden said the phishing group appears to have identified Italian Coinbase users by attempting to sign up new accounts under the email addresses of more than 2.5 million Italians. His team also managed to recover the username and password data that victims submitted to the site, and virtually all of the submitted email addresses ended in “.it”.&amp;lt;br&amp;gt;
But the phishers in this case likely weren’t interested in registering any accounts. Rather, the bad guys understood that any attempts to sign up using an email address tied to an existing Coinbase account would fail. After doing that several million times, the phishers would then take the email addresses that failed new account signups and target them with Coinbase-themed phishing emails.&amp;lt;br&amp;gt;
Holden’s data shows this phishing gang conducted hundreds of thousands of halfhearted account signup attempts daily. For example, on Oct. 10 the scammers checked more than 216,000 email addresses against Coinbase’s systems. The following day, they attempted to register 174,000 new Coinbase accounts. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/how-coinbase-phishers-steal-one-time-passwords/#more-57245&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/how-coinbase-phishers-steal-one-time-passwords/&amp;#34;&amp;gt;How Coinbase Phishers Steal One-Time Passwords&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211013-001757/</link>
      <pubDate>Wed, 13 Oct 2021 00:17:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211013-001757/</guid>
      <description>U.S. House approves Senate-passed bill to temporarily hike debt limit, delaying the risk of default until early December &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-house-expected-pass-bill-hike-debt-ceiling-avert-default-2021-10-12/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211013-000659/</link>
      <pubDate>Wed, 13 Oct 2021 00:06:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211013-000659/</guid>
      <description>Firstly, Apple has released iOS 15.0.2 and iPadOS 15.0.2 to fix a zero-day vulnerability (CVE-2021-30883) that is being leveraged in active attacks targeting iPhone and iPad users. Lawrence Abrams of Bleeping Computer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/emergency-apple-ios-1502-update-fixes-zero-day-used-in-attacks/&amp;#34;&amp;gt;writes&amp;lt;/a&amp;gt; that the flaw could be used to steal data or install malware, and that soon after Apple patched the bug security researcher &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/AmarSaar&amp;#34;&amp;gt;Saar Amar&amp;lt;/a&amp;gt; published a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://saaramar.github.io/IOMFB_integer_overflow_poc/&amp;#34;&amp;gt;technical writeup and proof-of-concept exploit&amp;lt;/a&amp;gt; derived from reverse engineering Apple’s patch.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211012-200634/</link>
      <pubDate>Tue, 12 Oct 2021 20:06:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211012-200634/</guid>
      <description>Microsoft today issued updates to plug more than 70 security holes in its Windows operating systems and other software, including one vulnerability that is already being exploited. This month’s Patch Tuesday also includes security fixes for the newly released Windows 11 operating system. Separately, Apple has released updates for iOS and iPadOS to address a flaw that is being actively attacked.&amp;lt;br&amp;gt;
Firstly, Apple has released iOS 15.0.2 and iPadOS 15.0.2 to fix a zero-day vulnerability (CVE-2021-30883) that is being leveraged in active attacks targeting iPhone and iPad users. Lawrence Abrams of Bleeping Computer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/emergency-apple-ios-1502-update-fixes-zero-day-used-in-attacks/&amp;#34;&amp;gt;writes&amp;lt;/a&amp;gt; that the flaw could be used to steal data or install malware, and that soon after Apple patched the bug security researcher &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/AmarSaar&amp;#34;&amp;gt;Saar Amar&amp;lt;/a&amp;gt; published a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://saaramar.github.io/IOMFB_integer_overflow_poc/&amp;#34;&amp;gt;technical writeup and proof-of-concept exploit&amp;lt;/a&amp;gt; that was derived from reverse engineering Apple’s patch.&amp;lt;br&amp;gt;
Abrams said the list of impacted Apple devices is quite extensive, affecting older and newer models. If you own an iPad or iPhone — or any other Apple device — please &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.apple.com/en-ca/HT204204&amp;#34;&amp;gt;make sure it’s up to date with the latest security patches&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Three of the weaknesses Microsoft addressed today tackle vulnerabilities rated “ critical ,” meaning that malware or miscreants could exploit them to gain complete, remote control over vulnerable systems — with little or no help from targets.&amp;lt;br&amp;gt;
One of the critical bugs concerns &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40486&amp;#34;&amp;gt;Microsoft Word&amp;lt;/a&amp;gt; , and two others are remote code execution flaws in Windows Hyper-V , the virtualization component built into Windows. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38672&amp;#34;&amp;gt;CVE-2021-38672&amp;lt;/a&amp;gt; affects Windows 11 and Windows Server 2022; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40461&amp;#34;&amp;gt;CVE-2021-40461&amp;lt;/a&amp;gt; impacts both Windows 11 and Windows 10 systems, as well as Server versions.&amp;lt;br&amp;gt;
But as usual, some of the more concerning security weaknesses addressed this month earned Microsoft’s slightly less dire “ important ” designation, which applies to a vulnerability “whose exploitation could result in compromise of the confidentiality, integrity, or availability of user data, or of the integrity or availability of processing resources.”&amp;lt;br&amp;gt;
The flaw that’s under active assault — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40449&amp;#34;&amp;gt;CVE-2021-40449&amp;lt;/a&amp;gt; — is an important “ elevation of privilege ” vulnerability, meaning it can be leveraged in combination with another vulnerability to let attackers run code of their choice as administrator on a vulnerable system.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36970&amp;#34;&amp;gt;CVE-2021-36970&amp;lt;/a&amp;gt; is an important spoofing vulnerability in Microsoft’s Windows Print Spooler. The flaw was discovered by the same researchers credited with the discovery of one of two vulnerabilities that became known as PrintNightmare — the widespread exploitation of a critical Print Spooler flaw that forced Microsoft &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/microsoft-issues-emergency-patch-for-windows-flaw/&amp;#34;&amp;gt;to issue an emergency security update back in July&amp;lt;/a&amp;gt; . Microsoft assesses CVE-2021-36970 as “exploitation more likely.”&amp;lt;br&amp;gt;
“While no details have been shared publicly about the flaw, this is definitely one to watch for, as we saw a constant stream of Print Spooler-related vulnerabilities patched over the summer while ransomware groups began incorporating PrintNightmare into their affiliate playbook,” said Satnam Narang , staff research engineer at Tenable . “We strongly encourage organizations to apply these patches as soon as possible.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/patch-tuesday-october-2021-edition/#more-57264&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/patch-tuesday-october-2021-edition/&amp;#34;&amp;gt;Patch Tuesday, October 2021 Edition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211012-041239/</link>
      <pubDate>Tue, 12 Oct 2021 04:12:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211012-041239/</guid>
      <description>Please join @bhorowitz and me on Wed 5PM Pacific on @Clubhouse. Reply to this tweet with questions for us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/x4RHjSjrP5&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/x4RHjSjrP5&amp;#34;&amp;gt;https://t.co/x4RHjSjrP5&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I&amp;#39;m discussing “One On One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Wednesday, Oct 13 at 5:00 PM PDT in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0PGgsNoO9f&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0PGgsNoO9f&amp;#34;&amp;gt;https://t.co/0PGgsNoO9f&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211011-121849/</link>
      <pubDate>Mon, 11 Oct 2021 12:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211011-121849/</guid>
      <description>Nobel economics prize goes to David Card, Joshua Angrist and Guido Imbens &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/card-angrist-imbens-win-2021-nobel-economics-prize-2021-10-11/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211011-080629/</link>
      <pubDate>Mon, 11 Oct 2021 08:06:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211011-080629/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/10/10/glitch-git-import.html&amp;#34;&amp;gt;The elevated daemon that imported Git projects for you and how it went wrong&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211011-041818/</link>
      <pubDate>Mon, 11 Oct 2021 04:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211011-041818/</guid>
      <description>The U.S. says its first face-to-face talks with Taliban officials were &amp;#39;candid and professional&amp;#39; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/taliban-delegation-ends-discussions-with-us-delegation-doha-2021-10-10/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20211011-001556/</link>
      <pubDate>Mon, 11 Oct 2021 00:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20211011-001556/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/02/Amazon-Catharsis&amp;#34;&amp;gt;Catharsis&amp;lt;/a&amp;gt; · It was just a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/29/technology/amazon-fired-workers-settlement.html&amp;#34;&amp;gt;minor story in the business     section&amp;lt;/a&amp;gt; , nothing front-page.     But when I heard (earlier in the day, from an insider), the news was cathartic; I had to stand up and take a walk. Summary:     Amazon was about to find itself in court with the US      National Labor Relations Board over the firing of Emily Cunningham and Maren Costa; the event that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2020/04/29/Leaving-Amazon&amp;#34;&amp;gt;caused me to walk away&amp;lt;/a&amp;gt; from the best job I ever had and a whole lot     of money.  On September 29 th , Amazon avoided that trial     by signing a humiliating out-of-court settlement. Which is to say, that particular firing spree was not only unethical and     stupid, it was probably illegal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/10/02/Amazon-Catharsis&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211010-202211/</link>
      <pubDate>Sun, 10 Oct 2021 20:22:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211010-202211/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/10/technology/facebook-whistleblower-employees.html&amp;#34;&amp;gt;After Whistle-Blower Goes Public, Facebook Tries Calming Employees Employees are divided over Frances Haugen, a former product manager who testified that the company was putting profit before safety. By Mike Isaac, Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-201944/</link>
      <pubDate>Sun, 10 Oct 2021 20:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-201944/</guid>
      <description>Islamic State and al Qaeda-linked groups target African village leaders with assassinations &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/africa-islamists-sahel-leaders/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-162324/</link>
      <pubDate>Sun, 10 Oct 2021 16:23:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-162324/</guid>
      <description>One America News Network: Meet the tech entrepreneur who founded Trump&amp;#39;s go-to news channel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/usa-oneamerica-founder/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-002247/</link>
      <pubDate>Sun, 10 Oct 2021 00:22:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211010-002247/</guid>
      <description>&amp;#39;Containergeddon&amp;#39;: A supply chain crisis is driving big retail stores like Walmart to hire their own ships to move products &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/autos-transportation/containergeddon-supply-crisis-drives-walmart-rivals-hire-their-own-ships-2021-10-07/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-202215/</link>
      <pubDate>Sat, 09 Oct 2021 20:22:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-202215/</guid>
      <description>Austrian Chancellor Sebastian Kurz will step down after being placed under a corruption investigation &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/austrias-kurz-says-stepping-down-chancellor-2021-10-09/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-162343/</link>
      <pubDate>Sat, 09 Oct 2021 16:23:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-162343/</guid>
      <description>One America News, the network at the center of a bitter national divide over politics and truth, was nurtured by AT&amp;amp;amp;T &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/usa-oneamerica-att/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211009-162254/</link>
      <pubDate>Sat, 09 Oct 2021 16:22:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211009-162254/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/09/technology/facebook-big-tobacco-regulation.html&amp;#34;&amp;gt;Lawmakers See Path to Rein In Tech, but It Isn’t Smooth If what faces Big Tech is anything like what happened to Big Tobacco, the road ahead is likely to be a yearslong battle over proposed rules and regulations. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211009-122045/</link>
      <pubDate>Sat, 09 Oct 2021 12:20:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211009-122045/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/09/technology/facebook-big-tobacco-regulation.html&amp;#34;&amp;gt;Lawmakers See Path to Rein in Tech, but It Isn’t Smooth If what faces Big Tech is anything like what happened to Big Tobacco, the road ahead is likely to be a yearslong battle over proposed rules and regulations. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-042322/</link>
      <pubDate>Sat, 09 Oct 2021 04:23:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211009-042322/</guid>
      <description>Texas wins bid to reinstate abortion law challenged by Biden administration &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/texas-wins-bid-reinstate-abortion-law-challenged-by-biden-administration-2021-10-09/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211009-001119/</link>
      <pubDate>Sat, 09 Oct 2021 00:11:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211009-001119/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-a-firebase-admin-panei-in-4-steps/&amp;#34;&amp;gt;Build an admin panel to manage Firestore documents in under 10 minutes: build out the UI, create CRUD queries, and link the queries to the UI.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211008-202719/</link>
      <pubDate>Fri, 08 Oct 2021 20:27:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211008-202719/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/08/technology/facebook-whatsapp-instagram-down.html&amp;#34;&amp;gt;Facebook and its apps suffer another outage. All of Facebook’s main products — Instagram, WhatsApp, Messenger and the “big blue app” of Facebook — were inaccessible to at least some users around 3 p.m. Eastern time. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211008-202606/</link>
      <pubDate>Fri, 08 Oct 2021 20:26:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211008-202606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/lots-to-see-in-firefox-93/&amp;#34;&amp;gt;Lots to see in Firefox 93! →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/lots-to-see-in-firefox-93/&amp;#34;&amp;gt;Lots to see in Firefox 93!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Firefox 93 comes with lots of lovely updates including AVIF image format support, filling of XFA-based forms in its PDF viewer and protection against insecure downloads by blocking downloads relying on insecure connections.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-202427/</link>
      <pubDate>Fri, 08 Oct 2021 20:24:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-202427/</guid>
      <description>The White House blocked an attempt by Trump to withhold documents from Congress related to the Jan. 6 attack on the Capitol &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/white-house-blocks-trumps-attempt-withhold-documents-related-jan-6-attack-nbc-2021-10-08/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211008-202040/</link>
      <pubDate>Fri, 08 Oct 2021 20:20:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211008-202040/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#digital-antiquaria&amp;#34;&amp;gt;digital-antiquaria&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#web&amp;#34;&amp;gt;web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I was recently thinking about one of the DOS shareware games
of my youth: Evasive Maneuvers (Colin Buckley and Chris Blackwell, 1994).
It’s a really polished and addictive VGA side-scroller in which you
pilot a little Imperial-Shuttle-ish spacecraft through obstacle-strewn
levels, trying to keep up with the implacable scrolling of the screen
(á là Flappy Bird (2013)) while shooting and dropping bombs to eliminate
hazards and to keep your ship fueled by exploding rooftop fuel tanks.
It’s a clone/homage to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/3Vc-RIkpk40&amp;#34;&amp;gt;Scramble&amp;lt;/a&amp;gt; (Konami, 1981),
which I’ve personally never played but which has clearly spawned a lot of imitators.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-162356/</link>
      <pubDate>Fri, 08 Oct 2021 16:23:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-162356/</guid>
      <description>U.S. economy adds 194,000 jobs in September, well below expectations; unemployment rate 4.8% &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-job-growth-slows-sharply-september-unemployment-rate-falls-48-2021-10-08/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211008-081413/</link>
      <pubDate>Fri, 08 Oct 2021 08:14:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211008-081413/</guid>
      <description>&amp;lt;p&amp;gt;Join us right now! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/GKjlrDyHwi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/GKjlrDyHwi&amp;#34;&amp;gt;https://t.co/GKjlrDyHwi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
“ GTS: Dapper   Brud CEOs on DAOs/community content” with @sriramk, @whatdotcd, @rohamg, @aarthir, @pmarca, @cdixon, and Good Time. Today, Oct 7 at 10:00 PM PDT in @clubhouse! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/hLus0Fv0sT&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/hLus0Fv0sT&amp;#34;&amp;gt;https://t.co/hLus0Fv0sT&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Web2 boss hates web3? We have hundreds of open job positions.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Please email: &amp;lt;a href=&amp;#34;mailto:web3-jobs@a16z.com&amp;#34;&amp;gt;web3-jobs@a16z.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-002208/</link>
      <pubDate>Fri, 08 Oct 2021 00:22:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211008-002208/</guid>
      <description>U.S. Senate votes to raise debt ceiling, averting catastrophic default &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-senate-votes-raise-debt-ceiling-averting-catastrophic-default-2021-10-08/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
SAN FRANCISCO (Reuters) -The suspected Russian hackers who used SolarWinds and Microsoft  software to burrow into U.S. federal agencies emerged with information about counter-intelligence investigations, policy on sanctioning Russian individuals and the country’s response to COVID-19, people involved in the investigation told Reuters.&amp;lt;br&amp;gt;
SAN FRANCISCO, Oct 7 The suspected Russian
hackers who used SolarWinds and Microsoft  software to burrow
into U.S. federal agencies emerged with information about
counter-intelligence investigations, policy on sanctioning
Russian individuals and the country’s response to COVID-19,
people involved in the investigation told Reuters.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211008-002058/</link>
      <pubDate>Fri, 08 Oct 2021 00:20:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211008-002058/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-realistically-happens-next-to&amp;#34;&amp;gt;What Realistically Happens Next To Facebook&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-realistically-happens-next-to&amp;#34;&amp;gt;The market, advertisers, and Congress likely won’t challenge Facebook. Some other things might.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-after-the-facebook-files&amp;#34;&amp;gt;Facebook After The Facebook Files&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-after-the-facebook-files&amp;#34;&amp;gt;Facebook’s existential crisis is that it needs to hook a new generation of kids. “They&amp;#39;re trying to do everything possible to understand why people are…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211007-201740/</link>
      <pubDate>Thu, 07 Oct 2021 20:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211007-201740/</guid>
      <description>static operator()&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pearls&amp;#34;&amp;gt;pearls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#preprocessor&amp;#34;&amp;gt;preprocessor&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#proposal&amp;#34;&amp;gt;proposal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2021/p1169r2.html&amp;#34;&amp;gt;P1169 “ static operator() ”&amp;lt;/a&amp;gt; (Barry Revzin and Casey Carter, August 2021) proposes that we should be able to define&amp;lt;br&amp;gt;
operator()&amp;lt;br&amp;gt;
as a static member function. This is a very good idea.
As of this writing, it also looks likely to get into C&#43;&#43;2b. So instead of e.g.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211007-162536/</link>
      <pubDate>Thu, 07 Oct 2021 16:25:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211007-162536/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/implementing-form-filling-and-accessibility-in-the-firefox-pdf-viewer/&amp;#34;&amp;gt;Implementing form filling and accessibility in the Firefox PDF viewer →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/implementing-form-filling-and-accessibility-in-the-firefox-pdf-viewer/&amp;#34;&amp;gt;Implementing form filling and accessibility in the Firefox PDF viewer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Last year, during lockdown, many discovered the importance of PDF forms when having to deal remotely with administrations and large organizations like banks. Firefox supported displaying PDF forms, but it didn’t support filling them: users had to print them, fill them by hand, and scan them back to digital form. We decided it was time to reinvest in the PDF viewer (PDF.js) and support filling PDF forms within Firefox to make our users&amp;amp;#39; lives easier.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211007-162411/</link>
      <pubDate>Thu, 07 Oct 2021 16:24:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211007-162411/</guid>
      <description>U.S. lawmakers agree to extend the country&amp;#39;s debt ceiling by $480 billion through early December &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-senate-democrats-republicans-haggle-over-short-term-debt-fix-2021-10-07/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211007-145403/</link>
      <pubDate>Thu, 07 Oct 2021 14:54:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211007-145403/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/interactive/2021/10/06/technology/facebook-hearing-frances-haugen-takeaways.html&amp;#34;&amp;gt;Takeaways From Tuesday’s Facebook Hearing What we learned from Facebook whistleblower Frances Haugen’s Congressional testimony By Sheera Frenkel, Cecilia Kang, Mike Isaac and Kevin Roose&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211007-145318/</link>
      <pubDate>Thu, 07 Oct 2021 14:53:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211007-145318/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/control-your-data-for-good-with-rally/&amp;#34;&amp;gt;Control your data for good with Rally →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/control-your-data-for-good-with-rally/&amp;#34;&amp;gt;Control your data for good with Rally&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
In a world where data and AI are reshaping society, people currently have no tangible way to put their data to work for the causes they believe in. To address this, we built the Rally platform, a first-of-its-kind tool that enables you to contribute your data to specific studies and exercise consent at a granular level. Mozilla Rally puts you in control of your data while building a better Internet and a better society.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211007-145156/</link>
      <pubDate>Thu, 07 Oct 2021 14:51:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211007-145156/</guid>
      <description>Pfizer, BioNTech ask U.S. regulators to approve COVID-19 vaccine for kids &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/pfizer-biontech-ask-us-regulators-ok-covid-19-vaccine-kids-2021-10-07/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-solarwinds/hackers-in-solarwinds-breach-stole-data-on-u-s-sanctions-policy-intelligence-probes-sources-idUSKBN2GX1DV&amp;#34;&amp;gt;Hackers in SolarWinds breach stole data on U.S. sanctions policy, intelligence probes -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     The suspected Russian hackers who used SolarWinds and Microsoft  software to burrow into U.S. federal agencies emerged with information about counter-intelligence investigations, policy on sanctioning Russian individuals and the country’s response to COVID-19, people involved in the investigation told Reuters.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211007-145120/</link>
      <pubDate>Thu, 07 Oct 2021 14:51:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211007-145120/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/interactive/2021/10/06/technology/facebook-hearing-frances-haugen-takeaways.html&amp;#34;&amp;gt;Takeaways From Tuesday’s Facebook Hearing What we learned from Facebook whistleblower Frances Haugen’s Congressional testimony By Sheera Frenkel, Cecilia Kang, Mike Isaac and Kevin Roose&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&amp;&gt; /dev/null</title>
      <link>https://www.whatsupup.com/blog/airbrush/misogynic/20211007-144754/</link>
      <pubDate>Thu, 07 Oct 2021 14:47:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/airbrush/misogynic/20211007-144754/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2021/10/ti-calculator-innovation/&amp;#34;&amp;gt;The Insane Innovation of TI Calculator Hobbyists&amp;lt;/a&amp;gt; Oct 06, 2021 Never underestimate the determination of a kid who is time-rich and cash-poor&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211007-144525/</link>
      <pubDate>Thu, 07 Oct 2021 14:45:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211007-144525/</guid>
      <description>&amp;lt;p&amp;gt;Golden &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Golden&amp;#34;&amp;gt;@Golden&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today we’re super stoked to launch Golden Open. We have opened Golden up so that users can: Lodge canonical data requests Access the Query Tool Construct entity-powered Lists &amp;amp;amp; Pipelines Open Lists publicly Import CSVs to Lists&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/XNAfs8fItB&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/XNAfs8fItB&amp;#34;&amp;gt;https://t.co/XNAfs8fItB&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jude Gomila &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/judegomila&amp;#34;&amp;gt;@judegomila&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
9/ So let us know what you think about this entire suite of research tools for Free, Pro and Enterprise and he ability to get the data you want when it comes to entities and topics.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;We believe these changes accelerate Golden’s core mission to map and open up human knowledge.&amp;lt;br&amp;gt;
8/ Previously only Enterprise had access to many of these features so we are excited to see what you do with it. It is a win-win for everyone to open this up.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Enterprise have highest priority, SLAs, higher export limits, API and other features.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Pro accounts are new.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20211007-143803/</link>
      <pubDate>Thu, 07 Oct 2021 14:38:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20211007-143803/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/10/06/glitch-userid.html&amp;#34;&amp;gt;User identity leak on Glitch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20211006-121754/</link>
      <pubDate>Wed, 06 Oct 2021 12:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20211006-121754/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/coolest-projects-international-2018/&amp;#34;&amp;gt;Coolest Projects International 2018&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Eben was wowed by the young makers and their projects at this year&amp;amp;#39;s global showcase&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/welcome-lance/&amp;#34;&amp;gt;Welcome Lance!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
As you&amp;amp;#39;ve probably noticed, Raspberry Pi is a rather unusual organisation.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211006-081751/</link>
      <pubDate>Wed, 06 Oct 2021 08:17:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211006-081751/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/06/technology/biden-jonathan-kanter-big-tech.html&amp;#34;&amp;gt;A Star Corporate Lawyer Now Set to Take On Corporate America How Jonathan Kanter, the Biden administration’s choice to be the Justice Department’s antitrust chief, became a progressive foe of Big Tech. By Steve Lohr and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211006-002150/</link>
      <pubDate>Wed, 06 Oct 2021 00:21:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211006-002150/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/05/technology/facebook-whistle-blower-hearing.html&amp;#34;&amp;gt;Facebook Whistle-Blower Urges Lawmakers to Regulate the Company Frances Haugen, who left the social network in May and leaked internal documents, gave senators rare insight into its inner workings. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211006-001858/</link>
      <pubDate>Wed, 06 Oct 2021 00:18:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211006-001858/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/05/technology/facebook-whistle-blower-hearing.html&amp;#34;&amp;gt;Facebook Whistle-Blower Urges Lawmakers to Regulate the Company Frances Haugen, who left the social network in May and leaked internal documents, gave senators rare insight into its inner workings. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211005-202133/</link>
      <pubDate>Tue, 05 Oct 2021 20:21:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211005-202133/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/10/05/technology/facebook-whistleblower-frances-haugen/anger-and-relief-facebook-employees-react-to-whistle-blower-testimony&amp;#34;&amp;gt;Anger and relief: Facebook employees react to whistle-blower testimony. This was featured in live coverage. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211005-202050/</link>
      <pubDate>Tue, 05 Oct 2021 20:20:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211005-202050/</guid>
      <description>October 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/10/05/Terminal-emulation-legacy.gmi&amp;#34;&amp;gt;The distant legacy of terminal emulators&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211005-202047/</link>
      <pubDate>Tue, 05 Oct 2021 20:20:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211005-202047/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/tab-unloading-in-firefox-93/&amp;#34;&amp;gt;Tab Unloading in Firefox 93 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/tab-unloading-in-firefox-93/&amp;#34;&amp;gt;Tab Unloading in Firefox 93&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Starting with Firefox 93, Firefox will monitor available system memory and, should it ever become so critically low that a crash is imminent, Firefox will respond by unloading memory-heavy but not actively used tabs. This feature is currently enabled on Windows and will be deployed later for macOS and Linux as well.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211005-201907/</link>
      <pubDate>Tue, 05 Oct 2021 20:19:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211005-201907/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/10/05/technology/facebook-whistleblower-frances-haugen/lawmakers-have-come-a-long-way-from-asking-questions-about-how-facebook-makes-money&amp;#34;&amp;gt;Lawmakers have come a long way from asking questions about how Facebook makes money. This was featured in live coverage. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211005-201726/</link>
      <pubDate>Tue, 05 Oct 2021 20:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211005-201726/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/10/google-protects-your-accounts-even-when.html&amp;#34;&amp;gt;Google Protects Your Accounts – Even When You No Longer Use Them&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Sam Heft-Luthy, Product Manager, Privacy &amp;amp;amp; Data Protection Office What happens to our digital accounts when we stop using them? It’s a question we should all ask ourselves, because when we are no longer keeping tabs on what’s happening with old accounts, they can become targets for cybercrime. In fact, quite a few recent high-profile breaches targeted inactive accounts. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.crn.com/news/security/colonial-pipeline-hacked-via-inactive-account-without-mfa&amp;#34;&amp;gt;Colonial Pipeline&amp;lt;/a&amp;gt; ransomware attack came through an inactive account that didn’t use multifactor authentication, according to a consultant who investigated the incident. And in the case of the recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://techcrunch.com/2021/08/18/t-mobile-says-at-least-47m-current-and-former-customers-affected-by-data-breach/&amp;#34;&amp;gt;T-Mobile breach&amp;lt;/a&amp;gt; this summer, information from inactive prepaid accounts was accessed through old billing files. Inactive accounts can pose a serious security risk. For Google users, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/accounts/answer/3036546?hl=en&amp;#34;&amp;gt;Inactive Account Manager&amp;lt;/a&amp;gt; helps with that problem. You can decide when Google should consider your account inactive and whether Google should delete your data or share it with a trusted contact.&amp;lt;br&amp;gt;
Here’s How it Works&amp;lt;br&amp;gt;
Once you &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://myaccount.google.com/inactive&amp;#34;&amp;gt;sign up&amp;lt;/a&amp;gt; for Inactive Account Manager, available in My Account settings, you are asked to decide three things:&amp;lt;br&amp;gt;
When the account should be considered inactive: You can choose 3, 6, 12 or 18 months of inactivity before Google takes action on your account. Google will notify you a month before the designated time via a message sent to your phone and an email sent to the address you provide.&amp;lt;br&amp;gt;
Who to notify and what to share: You can choose up to 10 people for Google to notify once your Google Account becomes inactive (they won’t be notified during setup). You can also give them access to some of your data. If you choose to share data with your trusted contacts, the email will include a list of the selected data you wanted to share with them, and a link they can follow to download that data. This can include things like photos, contacts, emails, documents and other data that you specifically choose to share with your trusted contact. You can also choose to set up a Gmail AutoReply, with a custom subject and message explaining that you’ve ceased using the account.&amp;lt;br&amp;gt;
If your inactive Google Account should be deleted: After your account becomes inactive, Google can delete all its content or send it to your designated contacts. If you’ve decided to allow someone to download your content, they’ll be able to do so for 3 months before it gets deleted. If you choose to delete your Google Account, this will include your publicly shared data (for example, your YouTube videos, or blogs on Blogger). You can review the data associated with your account on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://myaccount.google.com/dashboard&amp;#34;&amp;gt;Google Dashboard&amp;lt;/a&amp;gt; . If you use Gmail with your account, you&amp;amp;#39;ll no longer be able to access that email once your account becomes inactive. You&amp;amp;#39;ll also be unable to reuse that Gmail username.&amp;lt;br&amp;gt;
Setting up an Inactive Account plan is a simple step you can take to protect your data, secure your account in case it becomes inactive, and ensure that your digital legacy is shared with your trusted contacts in case you become unable to access your account. Our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://myaccount.google.com/intro/privacycheckup?hl=en&amp;#34;&amp;gt;Privacy Checkup&amp;lt;/a&amp;gt; now reminds you to set up a plan for your account, and we’ll send you an occasional reminder about your plan via email. At Google, we are constantly working to keep you safer online. This October, as we celebrate Cybersecurity Awareness Month, we want to remind our users of the security and privacy controls they have at their fingertips. For more ways to enhance your security check out our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://safety.google/security/security-tips/&amp;#34;&amp;gt;top five safety tips&amp;lt;/a&amp;gt; and visit our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://safety.google/?utm_medium=blogpost&amp;amp;utm_source=google&amp;amp;utm_campaign=sid2021&amp;#34;&amp;gt;Safety Center&amp;lt;/a&amp;gt; to learn all the ways Google helps keep you safer online, every day.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20211005-162040/</link>
      <pubDate>Tue, 05 Oct 2021 16:20:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20211005-162040/</guid>
      <description>October 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/10/05/Reflection.html&amp;#34;&amp;gt;How reflection works in ****&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211005-161850/</link>
      <pubDate>Tue, 05 Oct 2021 16:18:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211005-161850/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/10/05/technology/facebook-whistleblower-frances-haugen/lawmakers-say-something-needs-to-be-done-about-facebook-but-what&amp;#34;&amp;gt;Lawmakers say something needs to be done about Facebook. But what? This was featured in live coverage. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/10/05/technology/facebook-whistleblower-frances-haugen/how-did-we-get-here&amp;#34;&amp;gt;How did we get here? This was featured in live coverage. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211005-160709/</link>
      <pubDate>Tue, 05 Oct 2021 16:07:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211005-160709/</guid>
      <description>Several different domain registration companies today listed the domain Facebook.com as up for sale. This happened thanks to automated systems that look for registered domains which appear to be expired, abandoned or recently vacated. There was never any reason to believe Facebook.com would actually be sold as a result, but it’s fun to consider how many billions of dollars it could fetch on the open market.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20211005-122245/</link>
      <pubDate>Tue, 05 Oct 2021 12:22:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20211005-122245/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133769_2022-lucid-air-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Lucid Air entices with the numbers, charms with the driving experience&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; October 5, 2021&amp;lt;br&amp;gt;
As some traditional luxury automakers release electric vehicles amid promises that range, charging, and performance will all improve in a few years, Lucid is launching its brand and already beating&amp;amp;hellip;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133459_audi-grandsphere-concept-ev-rethinks-sedans-from-the-inside-out&amp;#34;&amp;gt;Audi Grandsphere concept EV rethinks sedans from the inside out&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Audi Grandsphere imagines future interiors from the brand with a first-class experience enabled by autonomous driving.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128770_audi-q4-sportback-e-tron-electric-crossover-concept-meb-goes-matchmaking&amp;#34;&amp;gt;Audi Q4 Sportback E-Tron electric crossover concept: MEB goes matchmaking&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; July 7, 2020&amp;lt;br&amp;gt;
As Audi rolls out electric vehicles to cover much of its model line and fill the gaps between its existing models, it’s preparing to offer just as much flexibility in body styles as...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126828_cruise-origin-previews-a-future-that-takes-the-driver-out-of-electric-ride-hailing&amp;#34;&amp;gt;Cruise Origin previews a future that takes the driver out of electric ride hailing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
San Francisco-based Cruise has revealed the electric vehicle that completely removes the driver from a connected, shared experience.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124634_2020-porsche-cayenne-turbo-s-e-hybrid-preview-drive&amp;#34;&amp;gt;Preview drive: 2020 Porsche Cayenne Turbo S E-Hybrid is a stealth fighter for the family&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; August 21, 2019&amp;lt;br&amp;gt;
The Porsche Cayenne I’d cozied into had bright-green brake calipers, hard-to-miss green e-hybrid badges along both sides, and a charging-port door just ahead of the driver’s door. I made...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123694_first-drive-review-2020-ford-explorer-st-dances-with-the-family-and-its-a-ball&amp;#34;&amp;gt;First drive review: 2020 Ford Explorer ST dances with the family, and it&amp;amp;#39;s a ball&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The 2020 Ford Explorer lineup has been completely redesigned and gains a 400-hp, performance-oriented ST model. We tested it out.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104663_2018-volvo-v90-first-drive-review&amp;#34;&amp;gt;2018 Volvo V90 first drive review&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; June 28, 2016&amp;lt;br&amp;gt;
Wagons have been staged for a comeback for more than a decade. Yet time after time, seemingly splendid, sporty wagons have fizzled in the American market.&amp;lt;br&amp;gt;
Is Volvo being hopelessly optimistic in...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104437_2017-volvo-s90-first-drive-review&amp;#34;&amp;gt;2017 Volvo S90 first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
With Volvo’s most recent products, including the 2017 Volvo S90 sedan and upcoming 2018 V90 wagon, the Swedish automaker is wholly embracing its Scandinavian roots. From the upright concave grille, the prominent brand ironmark, and the elongated hood in front, to the name proudly spelled out...&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211005-121834/</link>
      <pubDate>Tue, 05 Oct 2021 12:18:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211005-121834/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/05/technology/frances-haugen-hearing-time-video-stream.html&amp;#34;&amp;gt;What to watch: Whistle-blower to detail need to regulate Facebook. Frances Haugen, a former product manager for Facebook, will argue to protect consumers from a profits-over-safety culture. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20211005-080838/</link>
      <pubDate>Tue, 05 Oct 2021 08:08:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20211005-080838/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/state-of-internal-tools-2021/&amp;#34;&amp;gt;Developers spend 34% of their time building internal, employee-facing apps. Why? We surveyed 650 developers and builders to find out.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-raises-50-million-led-by-sequoia/&amp;#34;&amp;gt;Since Retool launched two years ago on HN, tens of thousands of companies have come to rely on Retool. It&amp;amp;#39;s how Allbirds measures the efficacy of their marketing campaigns; how Brex builds applications&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20211005-080741/</link>
      <pubDate>Tue, 05 Oct 2021 08:07:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20211005-080741/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/UXFactor_CSCW21.pdf&amp;#34;&amp;gt;The UX Factor: Using Comparative Peer Review to Evaluate Designs through User Preferences&amp;lt;/a&amp;gt; Sarah Bawabe, Laura Wilson, Tongyu Zhou, Ezra Marks, Jeff Huang CSCW 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://uxfactor.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/TabularDataset_CSCW21.pdf&amp;#34;&amp;gt;Case Studies on the Motivation and Performance of Contributors Who Verify and Maintain In-Flux Tabular Datasets&amp;lt;/a&amp;gt; Shaun Wallace, Alexandra Papoutsaki, Neilly H. Tan, Hua Guo, Jeff Huang CSCW 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211005-042103/</link>
      <pubDate>Tue, 05 Oct 2021 04:21:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211005-042103/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/10/04/espanol/facebook-whatsapp-funciona.html&amp;#34;&amp;gt;Facebook se restablece tras un apagón de impacto global Con la caída de servicios digitales hubo una pausa en la vida cotidiana de millones, las empresas quedaron sin comunicación con sus clientes y algunos empleados de Facebook no pudieron entrar a las oficinas. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20211005-041645/</link>
      <pubDate>Tue, 05 Oct 2021 04:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20211005-041645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/09/fuzzing-closed-source-javascript.html&amp;#34;&amp;gt;Fuzzing Closed-Source JavaScript Engines with Cove&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html&amp;#34;&amp;gt;Understanding Network Access in Windows AppContainers&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html&amp;#34;&amp;gt;An EPYC escape: Case-study of a KVM breakout&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/04/designing-sockfuzzer-network-syscall.html&amp;#34;&amp;gt;Designing sockfuzzer, a network syscall fuzzer for&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/04/policy-and-disclosure-2021-edition.html&amp;#34;&amp;gt;Policy and Disclosure: 2021 Edition&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/04/who-contains-containers.html&amp;#34;&amp;gt;Who Contains the Containers?&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html&amp;#34;&amp;gt;In-the-Wild Series: October 2020 0-day discovery&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/02/deja-vu-lnerability.html&amp;#34;&amp;gt;Déjà vu-lnerability&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html&amp;#34;&amp;gt;A Look at iMessage in iOS 14&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/windows-exploitation-tricks-trapping.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Trapping Virtual Memo&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html&amp;#34;&amp;gt;The State of State Machines&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/hunting-for-bugs-in-windows-mini-filter.html&amp;#34;&amp;gt;Hunting for Bugs in Windows Mini-Filter Drivers&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html&amp;#34;&amp;gt;In-the-Wild Series: Android Post-Exploitation&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html&amp;#34;&amp;gt;In-the-Wild Series: Windows Exploits&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html&amp;#34;&amp;gt;In-the-Wild Series: Android Exploits&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html&amp;#34;&amp;gt;In-the-Wild Series: Chrome Infinity Bug&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html&amp;#34;&amp;gt;In-the-Wild Series: Chrome Exploits&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html&amp;#34;&amp;gt;Introducing the In-the-Wild Series&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/12/an-ios-hacker-tries-android.html&amp;#34;&amp;gt;An iOS hacker tries Android&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html&amp;#34;&amp;gt;An iOS zero-click radio proximity exploit odyssey&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/11/oops-i-missed-it-again.html&amp;#34;&amp;gt;Oops, I missed it again!&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html&amp;#34;&amp;gt;Enter the Vault: Authentication Issues in HashiCor&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/10/announcing-fuzzilli-research-grant.html&amp;#34;&amp;gt;Announcing the Fuzzilli Research Grant Program&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/09/attacking-qualcomm-adreno-gpu.html&amp;#34;&amp;gt;Attacking the Qualcomm Adreno GPU&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html&amp;#34;&amp;gt;JITSploitation I: A JIT Bug&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html&amp;#34;&amp;gt;JITSploitation II: Getting Read/Write&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html&amp;#34;&amp;gt;JITSploitation III: Subverting Control Flow&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/08/mms-exploit-part-5-defeating-aslr-getting-rce.html&amp;#34;&amp;gt;MMS Exploit Part 5: Defeating Android ASLR, Gettin&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/08/exploiting-android-messengers-part-3.html&amp;#34;&amp;gt;Exploiting Android Messengers with WebRTC: Part 3&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/08/mms-exploit-part-4-completing-aslr-oracle.html&amp;#34;&amp;gt;MMS Exploit Part 4: MMS Primer, Completing the ASL&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/the-core-of-apple-is-ppl-breaking-xnu.html&amp;#34;&amp;gt;The core of Apple is PPL: Breaking the XNU kernel&amp;amp;amp;#39;&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/one-byte-to-rule-them-all.html&amp;#34;&amp;gt;One Byte to rule them all&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/root-cause-analyses-for-0-day-in-wild.html&amp;#34;&amp;gt;Root Cause Analyses for 0-day In-the-Wild Exploits&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/detection-deficit-year-in-review-of-0.html&amp;#34;&amp;gt;Detection Deficit: A Year in Review of 0-days Used&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-3-constructing-primitives.html&amp;#34;&amp;gt;MMS Exploit Part 3: Constructing the Memory Corrup&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-2-effective-fuzzing-qmage.html&amp;#34;&amp;gt;MMS Exploit Part 2: Effective Fuzzing of the Qmage&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html&amp;#34;&amp;gt;MMS Exploit Part 1: Introduction to the Samsung Qm&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/07/how-to-unc0ver-0-day-in-4-hours-or-less.html&amp;#34;&amp;gt;How to unc0ver a 0-day in 4 hours or less&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/06/ff-sandbox-escape-cve-2020-12388.html&amp;#34;&amp;gt;FF Sandbox Escape (CVE-2020-12388)&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/06/a-survey-of-recent-ios-kernel-exploits.html&amp;#34;&amp;gt;A survey of recent iOS kernel exploits&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/04/fuzzing-imageio.html&amp;#34;&amp;gt;Fuzzing ImageIO&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/04/you-wont-believe-what-this-one-line.html&amp;#34;&amp;gt;You Won&amp;amp;amp;#39;t Believe what this One Line Change Did to&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/04/tfw-you-get-really-excited-you-patch.html&amp;#34;&amp;gt;TFW you-get-really-excited-you-patch-diffed-a-0day&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/02/escaping-chrome-sandbox-with-ridl.html&amp;#34;&amp;gt;Escaping the Chrome Sandbox with RIDL&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/02/mitigations-are-attack-surface-too.html&amp;#34;&amp;gt;Mitigations are attack surface, too&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/02/several-months-in-life-of-part2.html&amp;#34;&amp;gt;A day^W^W Several months in the life of Project Ze&amp;amp;hellip;&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html&amp;#34;&amp;gt;Part II: Returning to Adobe Reader symbols on macOS&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html&amp;#34;&amp;gt;Remote iPhone Exploitation Part 3: From Memory Cor&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html&amp;#34;&amp;gt;Remote iPhone Exploitation Part 2: Bringing Light &amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html&amp;#34;&amp;gt;Remote iPhone Exploitation Part 1: Poking Memory v&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/12/calling-local-windows-rpc-servers-from.html&amp;#34;&amp;gt;Calling Local Windows RPC Servers from .NET&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/12/sockpuppet-walkthrough-of-kernel.html&amp;#34;&amp;gt;SockPuppet: A Walkthrough of a Kernel Exploit for &amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html&amp;#34;&amp;gt;Bad Binder: Android In-The-Wild Exploit&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/10/ktrw-journey-to-build-debuggable-iphone.html&amp;#34;&amp;gt;KTRW: The journey to build a debuggable iPhone&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html&amp;#34;&amp;gt;The story of Adobe Reader symbols&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/09/windows-exploitation-tricks-spoofing.html&amp;#34;&amp;gt;Windows‌ ‌Exploitation‌ ‌Tricks:‌ ‌Spoofing‌ ‌Name&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html&amp;#34;&amp;gt;A very deep dive into iOS Exploit chains found in &amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html&amp;#34;&amp;gt;In-the-wild iOS Exploit Chain 1&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html&amp;#34;&amp;gt;Implant Teardown&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html&amp;#34;&amp;gt;JSC Exploits&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html&amp;#34;&amp;gt;The Many Possibilities of CVE-2019-8646&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html&amp;#34;&amp;gt;Down the Rabbit-Hole&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html&amp;#34;&amp;gt;The Fully Remote Attack Surface of the iPhone&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Abusing the User-Mode&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/04/virtually-unlimited-memory-escaping.html&amp;#34;&amp;gt;Virtually Unlimited Memory: Escaping the Chrome Sa&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/04/splitting-atoms-in-xnu.html&amp;#34;&amp;gt;Splitting atoms in XNU&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/03/windows-kernel-logic-bug-class-access.html&amp;#34;&amp;gt;Windows Kernel Logic Bug Class: Access Mode Mismat&amp;amp;hellip;&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/03/android-messaging-few-bugs-short-of.html&amp;#34;&amp;gt;Android Messaging: A Few Bugs Short of a Chain&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/02/the-curious-case-of-convexity-confusion.html&amp;#34;&amp;gt;The Curious Case of Convexity Confusion&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html&amp;#34;&amp;gt;Examining Pointer Authentication on the iPhone XS&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/01/voucherswap-exploiting-mig-reference.html&amp;#34;&amp;gt;voucher_swap: Exploiting MIG reference counting in&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/01/taking-page-from-kernels-book-tlb-issue.html&amp;#34;&amp;gt;Taking a page from the kernel&amp;amp;amp;#39;s book: A TLB issue &amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/on-vbscript.html&amp;#34;&amp;gt;On VBScript&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/searching-statically-linked-vulnerable.html&amp;#34;&amp;gt;Searching statically-linked vulnerable library fun&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-5.html&amp;#34;&amp;gt;Adventures in Video Conferencing Part 5: Where Do &amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-4.html&amp;#34;&amp;gt;Adventures in Video Conferencing Part 4: What Didn&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html&amp;#34;&amp;gt;Adventures in Video Conferencing Part 3: The Even &amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-2.html&amp;#34;&amp;gt;Adventures in Video Conferencing Part 2: Fun with &amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-1.html&amp;#34;&amp;gt;Adventures in Video Conferencing Part 1: The Wild &amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-protected.html&amp;#34;&amp;gt;Injecting Code into Windows Protected Processes us&amp;amp;hellip;&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/10/heap-feng-shader-exploiting-swiftshader.html&amp;#34;&amp;gt;Heap Feng Shader: Exploiting SwiftShader in Chrome&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/10/deja-xnu.html&amp;#34;&amp;gt;Deja-XNU&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/10/365-days-later-finding-and-exploiting.html&amp;#34;&amp;gt;365 Days Later: Finding and Exploiting Safari Bugs&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/09/a-cache-invalidation-bug-in-linux.html&amp;#34;&amp;gt;A cache invalidation bug in Linux memory management&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/09/oatmeal-on-universal-cereal-bus.html&amp;#34;&amp;gt;OATmeal on the Universal Cereal Bus: Exploiting An&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/08/the-problems-and-promise-of-webassembly.html&amp;#34;&amp;gt;The Problems and Promise of WebAssembly&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/08/windows-exploitation-tricks-exploiting.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Exploiting Arbitrary &amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/08/adventures-in-vulnerability-reporting.html&amp;#34;&amp;gt;Adventures in vulnerability reporting&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/07/drawing-outside-box-precision-issues-in.html&amp;#34;&amp;gt;Drawing Outside the Box: Precision Issues in Graph&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/06/detecting-kernel-memory-disclosure.html&amp;#34;&amp;gt;Detecting Kernel Memory Disclosure – Whitepaper&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html&amp;#34;&amp;gt;Reading privileged memory with a side-channel&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/12/apacolypse-now-exploiting-windows-10-in_18.html&amp;#34;&amp;gt;aPAColypse now: Exploiting Windows 10 in a Local N&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/10/over-air-vol-2-pt-3-exploiting-wi-fi.html&amp;#34;&amp;gt;Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/10/using-binary-diffing-to-discover.html&amp;#34;&amp;gt;Using Binary Diffing to Discover Windows Kernel Me&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/09/the-great-dom-fuzz-off-of-2017.html&amp;#34;&amp;gt;The Great DOM Fuzz-off of 2017&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/08/bypassing-virtualbox-process-hardening.html&amp;#34;&amp;gt;Bypassing VirtualBox Process Hardening on Windows&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/08/windows-exploitation-tricks-arbitrary.html&amp;#34;&amp;gt;Windows Exploitation Tricks: Arbitrary Directory C&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html&amp;#34;&amp;gt;Trust Issues: Exploiting TrustZone TEEs&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/04/exploiting-net-managed-dcom.html&amp;#34;&amp;gt;Exploiting .NET Managed DCOM&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/04/exception-oriented-exploitation-on-ios.html&amp;#34;&amp;gt;Exception-oriented exploitation on iOS&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html&amp;#34;&amp;gt;Over The Air: Exploiting Broadcom’s Wi-Fi Stack (P&amp;amp;hellip;&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/04/notes-on-windows-uniscribe-fuzzing.html&amp;#34;&amp;gt;Notes on Windows Uniscribe Fuzzing&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html&amp;#34;&amp;gt;Pandavirtualization: Exploiting the Xen hypervisor&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/03/project-zero-prize-conclusion.html&amp;#34;&amp;gt;Project Zero Prize Conclusion&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/02/attacking-windows-nvidia-driver.html&amp;#34;&amp;gt;Attacking the Windows NVIDIA Driver&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/02/lifting-hyper-visor-bypassing-samsungs.html&amp;#34;&amp;gt;Lifting the (Hyper) Visor: Bypassing Samsung’s Rea&amp;amp;hellip;&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/12/chrome-os-exploit-one-byte-overflow-and.html&amp;#34;&amp;gt;Chrome OS exploit: one byte overflow and symlinks&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html&amp;#34;&amp;gt;BitUnmap: Attacking Android Ashmem&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/11/breaking-chain.html&amp;#34;&amp;gt;Breaking the Chain&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/10/taskt-considered-harmful.html&amp;#34;&amp;gt;task_t considered harmful&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/09/announcing-project-zero-prize.html&amp;#34;&amp;gt;Announcing the Project Zero Prize&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/09/return-to-libstagefright-exploiting.html&amp;#34;&amp;gt;Return to libstagefright: exploiting libutils on A&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/08/a-shadow-of-our-former-self.html&amp;#34;&amp;gt;A Shadow of our Former Self&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/07/a-year-of-windows-kernel-font-fuzzing-2.html&amp;#34;&amp;gt;A year of Windows kernel font fuzzing #2: the tech&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html&amp;#34;&amp;gt;How to Compromise the Enterprise Endpoint&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/06/a-year-of-windows-kernel-font-fuzzing-1_27.html&amp;#34;&amp;gt;A year of Windows kernel font fuzzing #1: the results&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/06/exploiting-recursion-in-linux-kernel_20.html&amp;#34;&amp;gt;Exploiting Recursion in the Linux Kernel&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/03/life-after-isolated-heap.html&amp;#34;&amp;gt;Life After the Isolated Heap&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/03/race-you-to-kernel.html&amp;#34;&amp;gt;Race you to the kernel!&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/03/exploiting-leaked-thread-handle.html&amp;#34;&amp;gt;Exploiting a Leaked Thread Handle&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/02/the-definitive-guide-on-win32-to-nt.html&amp;#34;&amp;gt;The Definitive Guide on Win32 to NT Path Conversion&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/02/racing-midi-messages-in-chrome.html&amp;#34;&amp;gt;Racing MIDI messages in Chrome&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2016/01/raising-dead.html&amp;#34;&amp;gt;Raising the Dead&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/12/fireeye-exploitation-project-zeros.html&amp;#34;&amp;gt;FireEye Exploitation: Project Zero’s Vulnerability&amp;amp;hellip;&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/12/between-rock-and-hard-link.html&amp;#34;&amp;gt;Between a Rock and a Hard Link&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/11/windows-sandbox-attack-surface-analysis.html&amp;#34;&amp;gt;Windows Sandbox Attack Surface Analysis&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/11/hack-galaxy-hunting-bugs-in-samsung.html&amp;#34;&amp;gt;Hack The Galaxy: Hunting Bugs in the Samsung Galax&amp;amp;hellip;&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/10/windows-drivers-are-truely-tricky.html&amp;#34;&amp;gt;Windows Drivers are True’ly Tricky&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/09/revisiting-apple-ipc-1-distributed_28.html&amp;#34;&amp;gt;Revisiting Apple IPC: (1) Distributed Objects&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/09/kaspersky-mo-unpackers-mo-problems.html&amp;#34;&amp;gt;Kaspersky: Mo Unpackers, Mo Problems.&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/09/stagefrightened.html&amp;#34;&amp;gt;Stagefrightened?&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/09/enabling-qr-codes-in-internet-explorer.html&amp;#34;&amp;gt;Enabling QR codes in Internet Explorer, or a story&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/08/windows-10hh-symbolic-link-mitigations.html&amp;#34;&amp;gt;Windows 10^H^H Symbolic Link Mitigations&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/08/one-font-vulnerability-to-rule-them-all_21.html&amp;#34;&amp;gt;One font vulnerability to rule them all #4: Window&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/08/three-bypasses-and-fix-for-one-of.html&amp;#34;&amp;gt;Three bypasses and a fix for one of Flash&amp;amp;amp;#39;s Vector&amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/08/attacking-ecmascript-engines-with.html&amp;#34;&amp;gt;Attacking ECMAScript Engines with Redefinition&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/08/one-font-vulnerability-to-rule-them-all.html&amp;#34;&amp;gt;One font vulnerability to rule them all #2: Adobe &amp;amp;hellip;&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/07/one-font-vulnerability-to-rule-them-all.html&amp;#34;&amp;gt;One font vulnerability to rule them all #1: Introd&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/07/one-perfect-bug-exploiting-type_20.html&amp;#34;&amp;gt;One Perfect Bug: Exploiting Type Confusion in Flash&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/07/significant-flash-exploit-mitigations_16.html&amp;#34;&amp;gt;Significant Flash exploit mitigations are live in &amp;amp;hellip;&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/07/from-inter-to-intra-gaining-reliability_10.html&amp;#34;&amp;gt;From inter to intra: gaining reliability&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/07/when-int-is-new-short.html&amp;#34;&amp;gt;When ‘int’ is the new ‘short’&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/06/what-is-good-memory-corruption.html&amp;#34;&amp;gt;What is a &amp;amp;amp;quot;good&amp;amp;amp;quot; memory corruption vulnerability?&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/06/analysis-and-exploitation-of-eset.html&amp;#34;&amp;gt;Analysis and Exploitation of an ESET Vulnerability&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/06/owning-internet-printing-case-study-in.html&amp;#34;&amp;gt;Owning Internet Printing - A Case Study in Modern &amp;amp;hellip;&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/06/dude-wheres-my-heap.html&amp;#34;&amp;gt;Dude, where’s my heap?&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/04/a-tale-of-two-exploits.html&amp;#34;&amp;gt;A Tale of Two Exploits&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/03/taming-wild-copy-parallel-thread.html&amp;#34;&amp;gt;Taming the wild copy: Parallel Thread Corruption&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html&amp;#34;&amp;gt;Exploiting the DRAM rowhammer bug to gain kernel p&amp;amp;hellip;&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/02/feedback-and-data-driven-updates-to.html&amp;#34;&amp;gt;Feedback and data-driven updates to Google’s discl&amp;amp;hellip;&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/02/exploitingscve-2015-0318sinsflash.html&amp;#34;&amp;gt;(^Exploiting)\s*(CVE-2015-0318)\s*(in)\s*(Flash$)&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/02/a-tokens-tale_9.html&amp;#34;&amp;gt;A Token’s Tale&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/01/exploiting-nvmap-to-escape-chrome.html&amp;#34;&amp;gt;Exploiting NVMAP to escape the Chrome sandbox - CV&amp;amp;hellip;&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html&amp;#34;&amp;gt;Finding and exploiting ntpd vulnerabilities&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/12/internet-explorer-epm-sandbox-escape.html&amp;#34;&amp;gt;Internet Explorer EPM Sandbox Escape CVE-2014-6350&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/11/pwn4fun-spring-2014-safari-part-ii.html&amp;#34;&amp;gt;pwn4fun Spring 2014 - Safari - Part II&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/11/project-zero-patch-tuesday-roundup.html&amp;#34;&amp;gt;Project Zero Patch Tuesday roundup, November 2014&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/10/did-man-with-no-name-feel-insecure.html&amp;#34;&amp;gt;Did the “Man With No Name” Feel Insecure?&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/10/more-mac-os-x-and-iphone-sandbox.html&amp;#34;&amp;gt;More Mac OS X and iPhone sandbox escapes and kerne&amp;amp;hellip;&amp;lt;/a&amp;gt; (Oct)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/09/exploiting-cve-2014-0556-in-flash.html&amp;#34;&amp;gt;Exploiting CVE-2014-0556 in Flash&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html&amp;#34;&amp;gt;The poisoned NUL byte, 2014 edition&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/08/what-does-pointer-look-like-anyway.html&amp;#34;&amp;gt;What does a pointer look like, anyway?&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/07/mac-os-x-and-iphone-sandbox-escapes.html&amp;#34;&amp;gt;Mac OS X and iPhone sandbox escapes&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/07/pwn4fun-spring-2014-safari-part-i_24.html&amp;#34;&amp;gt;pwn4fun Spring 2014 - Safari - Part I&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/07/announcing-project-zero.html&amp;#34;&amp;gt;Announcing Project Zero&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211005-040724/</link>
      <pubDate>Tue, 05 Oct 2021 04:07:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211005-040724/</guid>
      <description>Update, 7:46 p.m. ET: Facebook says its domains are slowly coming back online for most users. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Facebook/status/1445155265360416773&amp;#34;&amp;gt;a tweet&amp;lt;/a&amp;gt; , the company thanked users for their patience, but it still hasn’t offered any explanation for the outage.&amp;lt;br&amp;gt;
Update, 8:05 p.m. ET: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news.ycombinator.com/item?id=28750930&amp;#34;&amp;gt;This fascinating thread on Hacker News&amp;lt;/a&amp;gt; delves into some of the not-so-obvious side effects of today’s outages: Many organizations saw network disruptions and slowness thanks to billions of devices constantly asking for the current coordinates of Facebook.com, Instagram.com and WhatsApp.com. Bill Woodcock , executive director of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ww.pch.net&amp;#34;&amp;gt;Packet Clearing House&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/woodyatpch/status/1445176218236579843&amp;#34;&amp;gt;said&amp;lt;/a&amp;gt; his organization saw a 40 percent increase globally in wayward DNS traffic throughout the outage.&amp;lt;br&amp;gt;
Update, 8:32 p.m. ET: Cloudflare has published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cloudflare.com/october-2021-facebook-outage/&amp;#34;&amp;gt;a detailed and somewhat technical writeup&amp;lt;/a&amp;gt; on the BGP changes that caused today’s outage. Still no word from Facebook on what happened.&amp;lt;br&amp;gt;
Update, 11:32 p.m. ET: Facebook published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://engineering.fb.com/2021/10/04/networking-traffic/outage/&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; saying the outage was the result of a faulty configuration change:&amp;lt;br&amp;gt;
“Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication,” Facebook’s Santosh Janardhan wrote. “This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.”&amp;lt;br&amp;gt;
“We want to make clear at this time we believe the root cause of this outage was a faulty configuration change,” Janardhan continued. “We also have no evidence that user data was compromised as a result of this downtime.”&amp;lt;br&amp;gt;
Several different domain registration companies today listed the domain Facebook.com as up for sale. This happened thanks to automated systems that look for registered domains which appear to be expired, abandoned or recently vacated. There’s was never any reason to believe Facebook.com would actually be sold as a result, but it’s fun to consider how many billions of dollars it could fetch on the open market.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20211005-002231/</link>
      <pubDate>Tue, 05 Oct 2021 00:22:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20211005-002231/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/01/swarm-a-lot-can-happen-in-a-week/&amp;#34;&amp;gt;Swarm: a lot can happen in a week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
It’s been about a week since I put out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/&amp;#34;&amp;gt;an announcement and call for collaboration&amp;lt;/a&amp;gt; on a new game, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm&amp;#34;&amp;gt;Swarm&amp;lt;/a&amp;gt; . Since then, the response has been fantastic: lots of people have tried it out, a few have even streamed themselves playing it on Twitch, and there has been lots of development activity.&amp;lt;br&amp;gt;
39 new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/issues&amp;#34;&amp;gt;issues opened&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
27 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/pulls?q=is%3Apr&#43;is%3Aclosed&amp;#34;&amp;gt;pull requests merged&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Lots of great discussion on GitHub issues as well as on IRC&amp;lt;br&amp;gt;
There’s still a long, long way to go before the game comes anywhere close to the vision for it, but we’ve made great progress! Some notable new features added since the initial announcement include:&amp;lt;br&amp;gt;
New&amp;lt;br&amp;gt;
scan&amp;lt;br&amp;gt;
upload&amp;lt;br&amp;gt;
install&amp;lt;br&amp;gt;
commands&amp;lt;br&amp;gt;
Semicolons are no longer required beetween consecutive&amp;lt;br&amp;gt;
def&amp;lt;br&amp;gt;
Basic help panel, and panel shortcut keys&amp;lt;br&amp;gt;
Dramatically reduced CPU usage when idle&amp;lt;br&amp;gt;
An overhaul of parsing and pretty-printing of constants (makes adding new constants easier, and an important prerequisite for saving definitions and games)&amp;lt;br&amp;gt;
Better handling of water (you can make curry now)!&amp;lt;br&amp;gt;
A couple more exciting things in progress that should land very soon:&amp;lt;br&amp;gt;
ASCII art recipes&amp;lt;br&amp;gt;
Basic editor integration via LSP, so you can write Swarm programs in your favorite editor with automatically highlighted syntax and type errors.&amp;lt;br&amp;gt;
And of course there are many other exciting things planned or in the works. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/&amp;#34;&amp;gt;Come join us&amp;lt;/a&amp;gt; !&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/teaching/&amp;#34;&amp;gt;teaching&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/hindley-milner/&amp;#34;&amp;gt;Hindley-Milner&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/inference/&amp;#34;&amp;gt;inference&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/types/&amp;#34;&amp;gt;types&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/unification/&amp;#34;&amp;gt;unification&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/08/implementing-hindley-milner-with-the-unification-fd-library/#comments&amp;#34;&amp;gt;3 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/10/01/swarm-a-lot-can-happen-in-a-week/&amp;#34;&amp;gt;Swarm: a lot can happen in a week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211005-002143/</link>
      <pubDate>Tue, 05 Oct 2021 00:21:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211005-002143/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/10/04/business/news-business-stock-market/facebook-back-online&amp;#34;&amp;gt;Facebook begins coming back online after a lengthy outage. A spokesman cautioned that it would take some time for all of the apps, including Instagram and WhatsApp, to stabilize. By Sheera Frenkel and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/04/technology/facebook-down.html&amp;#34;&amp;gt;Gone in Minutes, Out for Hours: Outage Shakes Facebook When apps used by billions of people worldwide blinked out, lives were disrupted, businesses were cut off from customers — and some Facebook employees were locked out of their offices. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/02/technology/whistle-blower-facebook-memo.html&amp;#34;&amp;gt;Whistle-Blower to Accuse Facebook of Contributing to Jan. 6 Riot, Memo Says In an internal memo meant to pre-empt a “60 Minutes” interview, Facebook defended itself and said that social media was not a primary cause of polarization. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20211005-002053/</link>
      <pubDate>Tue, 05 Oct 2021 00:20:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20211005-002053/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/04/science/hawking-nobel-black-hole.html&amp;#34;&amp;gt;Out There Did Death Cheat Stephen Hawking of a Nobel Prize? A recent study of black holes confirmed a fundamental prediction that the theoretical physicist made nearly five decades ago. But the ultimate award is beyond his reach. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211005-001923/</link>
      <pubDate>Tue, 05 Oct 2021 00:19:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211005-001923/</guid>
      <description>A bill introduced by U.S. Senator Ossoff seeks to expand protections for election workers, citing two Reuters investigations &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/new-us-legislation-seeks-expand-protections-election-workers-2021-10-04/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20211005-001857/</link>
      <pubDate>Tue, 05 Oct 2021 00:18:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20211005-001857/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/04/technology/facebook-ftc-antitrust-suit.html&amp;#34;&amp;gt;Facebook urges court to dismiss latest F.T.C. antitrust suit. “This court gave the agency a second chance to make a valid claim,” Facebook said in its filing. “But the same deficiency that was fatal to the F.T.C.’s initial complaint remains.” By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/03/technology/whistle-blower-facebook-frances-haugen.html&amp;#34;&amp;gt;Whistle-Blower Says Facebook ‘Chooses Profits Over Safety’ Frances Haugen, a Facebook product manager who left the company in May, revealed that she had provided internal documents to journalists and others. By Ryan Mac and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211005-001826/</link>
      <pubDate>Tue, 05 Oct 2021 00:18:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211005-001826/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-after-the-facebook-files&amp;#34;&amp;gt;Facebook After The Facebook Files&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebook-after-the-facebook-files&amp;#34;&amp;gt;Facebook’s existential crisis is that it needs to hook a new generation of kids. “They&amp;#39;re trying to do everything possible to understand why people are leaving,” said one former engineer.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20211005-001625/</link>
      <pubDate>Tue, 05 Oct 2021 00:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20211005-001625/</guid>
      <description>should have a converting constructor from&amp;lt;br&amp;gt;
initializer_list&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#parameter-only-types&amp;#34;&amp;gt;parameter-only-types&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#proposal&amp;#34;&amp;gt;proposal&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#wg21&amp;#34;&amp;gt;wg21&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
C&#43;&#43;17 introduced&amp;lt;br&amp;gt;
std::string_view&amp;lt;br&amp;gt;
as a “parameter-only” drop-in replacement
for&amp;lt;br&amp;gt;
const std::string&amp;amp;amp;&amp;lt;br&amp;gt;
. This allows us to make clean refactorings such as:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211005-000733/</link>
      <pubDate>Tue, 05 Oct 2021 00:07:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211005-000733/</guid>
      <description>Facebook and its sister properties Instagram and WhatsApp are suffering from ongoing, global outages. We don’t yet know why this happened, but the how is clear: Earlier this morning, something inside Facebook caused the company to revoke key digital records that tell computers and other Internet-enabled devices how to find these destinations online.&amp;lt;br&amp;gt;
Kentik’s view of the Facebook, Instagram and WhatsApp outage.&amp;lt;br&amp;gt;
Doug Madory is director of internet analysis at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kentik.com/analysis/facebook-suffers-global-outage/&amp;#34;&amp;gt;Kentik&amp;lt;/a&amp;gt; , a San Francisco-based network monitoring company. Madory said at approximately 11:39 a.m. ET today (15:39 UTC), someone at Facebook caused an update to be made to the company’s Border Gateway Protocol (BGP) records. BGP is a mechanism by which Internet service providers of the world share information about which providers are responsible for routing Internet traffic to which specific groups of Internet addresses.&amp;lt;br&amp;gt;
In simpler terms, sometime this morning Facebook took away the map telling the world’s computers how to find its various online properties. As a result, when one types Facebook.com into a web browser, the browser has no idea where to find Facebook.com, and so returns an error page.&amp;lt;br&amp;gt;
In addition to stranding billions of users, the Facebook outage also has stranded its employees from communicating with one another using their internal Facebook tools. That’s because Facebook’s email and tools are all managed in house and via the same domains that are now stranded.&amp;lt;br&amp;gt;
“Not only are Facebook’s services and apps down for the public, its internal tools and communications platforms, including Workplace, are out as well,” New York Times tech reporter Ryan Mac &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/RMac18/status/1445069187664293895&amp;#34;&amp;gt;tweeted&amp;lt;/a&amp;gt; . “No one can do any work. Several people I’ve talked to said this is the equivalent of a ‘snow day’ at the company.”&amp;lt;br&amp;gt;
The outages come just hours after CBS’s 60 Minutes aired &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cbsnews.com/news/facebook-whistleblower-frances-haugen-misinformation-public-60-minutes-2021-10-03/&amp;#34;&amp;gt;a much-anticipated interview&amp;lt;/a&amp;gt; with Frances Haugen , the Facebook whistleblower who recently leaked a number of internal Facebook investigations showing the company knew its products were causing mass harm, and that it prioritized profits over taking bolder steps to curtail abuse on its platform — including disinformation and hate speech.&amp;lt;br&amp;gt;
We don’t know how or why the outages persist at Facebook and its other properties, but the changes had to have come from inside the company, as Facebook manages those records internally. Whether the changes were made maliciously or by accident is anyone’s guess at this point.&amp;lt;br&amp;gt;
Madory said it could be that someone at Facebook just screwed up.&amp;lt;br&amp;gt;
“In the past year or so, we’ve seen a lot of these big outages where they had some sort of update to their global network configuration that went awry,” Madory said. “We obviously can’t rule out someone hacking them, but they also could have done this to themselves.”&amp;lt;br&amp;gt;
Update, 4:37 p.m. ET: Sheera Frenkel with The New York Times &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/sheeraf/status/1445099150316503057&amp;#34;&amp;gt;tweeted&amp;lt;/a&amp;gt; that Facebook employees told her they were having trouble accessing Facebook buildings because their employee badges no longer worked. That could be one reason this outage has persisted so long: Facebook engineers may be having trouble physically accessing the computer servers needed to upload new BGP records to the global Internet.&amp;lt;br&amp;gt;
Update, 6:16 p.m. ET: A trusted source who spoke with a person on the recovery effort at Facebook was told the outage was caused by a routine BGP update gone wrong. The source explained that the errant update blocked Facebook employees — the majority of whom are working remotely — from reverting the changes. Meanwhile, those with physical access to Facebook’s buildings couldn’t access Facebook’s internal tools because those were all tied to the company’s stranded domains.&amp;lt;br&amp;gt;
In the meantime, several different domain registration companies listed the domain Facebook.com as up for sale. This happened thanks to automated systems that look for registered domains which appear to be expired, abandoned or recently vacated. There’s no reason to believe Facebook.com will actually be sold as a result, but it’s fun to consider how many billions of dollars it could fetch on the open market.&amp;lt;br&amp;gt;
This is a developing story and will likely be updated throughout the day.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/what-happened-to-facebook-instagram-whatsapp/&amp;#34;&amp;gt;What Happened to Facebook, Instagram, &amp;amp;amp; WhatsApp?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211003-081427/</link>
      <pubDate>Sun, 03 Oct 2021 08:14:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211003-081427/</guid>
      <description>From Cloud Wars (pricing, paradox, players) to Company Wars (public, private, M&amp;amp;amp;A, activist investors) &amp;amp;ndash; @pmarca @martin_casado @smc90 debate &amp;amp;amp; interview @MichaelDell on his upcoming new book &amp;amp;quot;Play Nice But Win&amp;amp;quot; and much more: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MI72LZaOsp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MI72LZaOsp&amp;#34;&amp;gt;https://t.co/MI72LZaOsp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20211003-042137/</link>
      <pubDate>Sun, 03 Oct 2021 04:21:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20211003-042137/</guid>
      <description>Texas law sparks hundreds of protests against abortion restrictions &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/abortion-rights-advocates-will-march-across-us-protest-restrictive-laws-2021-10-02/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20211003-041332/</link>
      <pubDate>Sun, 03 Oct 2021 04:13:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20211003-041332/</guid>
      <description>Slides for my All Things Open (ATO) talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ato-linux-performance-2018&amp;#34;&amp;gt;Linux Performance 2018&amp;lt;/a&amp;gt; (it was not videoed) ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ato-linux-performance-2018&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/ATO2018_Linux_Performance_2018.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2018).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20211003-002356/</link>
      <pubDate>Sun, 03 Oct 2021 00:23:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20211003-002356/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/02/technology/whistle-blower-facebook-memo.html&amp;#34;&amp;gt;Whistle-Blower to Accuse Facebook of Contributing to Jan. 6 Riot, Memo Says In an internal memo, Facebook defended itself and said that social media was not a primary cause of polarization. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/10/01/technology/facebook-instagram-teenagers.html&amp;#34;&amp;gt;Facebook Struggles to Quell Uproar Over Instagram’s Effect on Teens The social network has been all hands on deck as it grapples with revelations that it knew the harmful effects its Instagram photo-sharing app was having on teenagers. By Mike Isaac, Sheera Frenkel and Ryan Mac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20211003-001958/</link>
      <pubDate>Sun, 03 Oct 2021 00:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20211003-001958/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02678-1&amp;#34;&amp;gt;NASA won’t rename James Webb telescope — and astronomers are angry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The agency found no evidence that the flagship observatory’s namesake was involved in anti-LGBT&#43; activities, but some say that Webb bears responsibility.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211003-001420/</link>
      <pubDate>Sun, 03 Oct 2021 00:14:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211003-001420/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://future.a16z.com/podcasts/cloud-wars-company-wars-play-nice-but-win-michael-dell-book/&amp;#34;&amp;gt;a16z Podcast: Cloud Wars &amp;amp;amp; Company Wars&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/michael-dell/&amp;#34;&amp;gt;Michael Dell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/marc-andreessen/&amp;#34;&amp;gt;Marc Andreessen&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/martin-casado/&amp;#34;&amp;gt;Martin Casado&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/sonal-chokshi/&amp;#34;&amp;gt;Sonal Chokshi&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/machine-learning/&amp;#34;&amp;gt;AI, machine &amp;amp;amp; deep learning&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/cloud-computing/&amp;#34;&amp;gt;cloud computing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/enterprise-b2b-saas/&amp;#34;&amp;gt;enterprise &amp;amp;amp; SaaS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/open-source/&amp;#34;&amp;gt;open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/advice-and-how-to/big-company-innovation/&amp;#34;&amp;gt;big company innovation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/advice-and-how-to/disruption-theory-practice/&amp;#34;&amp;gt;disruption theory &amp;amp;amp; practice&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/advice-and-how-to/how-innovation-happens/&amp;#34;&amp;gt;how innovation happens&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/cloud-growing-pains/&amp;#34;&amp;gt;cloud growing pains&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/cloud-infrastructure/&amp;#34;&amp;gt;cloud infrastructure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/corporate-development/&amp;#34;&amp;gt;corporate development&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Michael Dell &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/MichaelDell&amp;#34;&amp;gt;@MichaelDell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Super thoughtful and fun conversation with @martin_casado @pmarca @smc90. How to #PlayNiceButWin. All things clouds, edge, PC, public to private to public, @TedLasso , transformation, and should you drop out of college? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/c0njTpeWp1&amp;#34;&amp;gt;https://t.co/c0njTpeWp1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
martin_casado &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/martin_casado&amp;#34;&amp;gt;@martin_casado&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
So much fun chatting with @MichaelDell, @smc90 and @pmarca . Michael is the infra OG, and in many ways the last standing of the great founders that have seen every transformation since the PC. 
&amp;lt;p&amp;gt;Cloud Wars &amp;amp;amp; Company Wars: Play Nice, But Win &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/z5OXXVYYYv&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/z5OXXVYYYv&amp;#34;&amp;gt;https://t.co/z5OXXVYYYv&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20211003-001315/</link>
      <pubDate>Sun, 03 Oct 2021 00:13:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20211003-001315/</guid>
      <description>For PerconaLive 2016, my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=CbmEDXq7es0&amp;#34;&amp;gt;Linux Systems Performance 2016&amp;lt;/a&amp;gt; summary of this topic in 50 minutes ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=CbmEDXq7es0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/linux-systems-performance-2016&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (50 mins).&amp;lt;br&amp;gt;
My JavaOne 2015 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=BHA65BqlqSk&amp;#34;&amp;gt;Java Mixed-Mode Flame Graphs&amp;lt;/a&amp;gt; introducing -XX:&#43;PreserveFramePointer; as it wasn&amp;#39;t officially recorded this is a capture from my laptop ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=BHA65BqlqSk&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/javaone-2015-java-mixedmode-flame-graphs&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (2015).&amp;lt;br&amp;gt;
My FreeBSD dev summit 2014 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=fMV1upo88Zw&amp;#34;&amp;gt;Flame Graphs on FreeBSD&amp;lt;/a&amp;gt; . Since this talk wasn&amp;#39;t videoed, I captured it using screenflow from my laptop. It&amp;#39;s better than nothing, and shows my live demos well. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.brendangregg.com/blog/2015-03-10/freebsd-flame-graphs.html&amp;#34;&amp;gt;postyoutube&amp;lt;/a&amp;gt; ) (53 mins).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20211001-225325/</link>
      <pubDate>Fri, 01 Oct 2021 22:53:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20211001-225325/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/mdn-web-docs-at-write-the-docs-prague-2021/&amp;#34;&amp;gt;MDN Web Docs at Write the Docs Prague 2021 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/10/mdn-web-docs-at-write-the-docs-prague-2021/&amp;#34;&amp;gt;MDN Web Docs at Write the Docs Prague 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The MDN Web Docs team is pleased to sponsor Write the Docs Prague 2021, which is being held remotely this year. We’re excited to join hundreds of documentarians to learn more about collaborating with writers, developers, and readers to make better documentation. We plan to take part in all that the conference has to offer, including the Writing Day, Job Fair, and the virtual hallway track.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20211001-222733/</link>
      <pubDate>Fri, 01 Oct 2021 22:27:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20211001-222733/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/10/introducing-secure-open-source-pilot.html&amp;#34;&amp;gt;Introducing the Secure Open Source Pilot Program&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Meder Kydyraliev and Kim Lewandowski, Google Open Source Security Team&amp;lt;br&amp;gt;
Over the past year we have made a number of investments to strengthen the security of critical open source projects, and recently announced our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/&amp;#34;&amp;gt;$10 billion commitment to cybersecurity defense&amp;lt;/a&amp;gt; including $100 million to support third-party foundations that manage open source security priorities and help fix vulnerabilities. Today, we are excited to announce our sponsorship for the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sos.dev/&amp;#34;&amp;gt;Secure Open Source (SOS) pilot program&amp;lt;/a&amp;gt; run by the Linux Foundation. This program financially rewards developers for enhancing the security of critical open source projects that we all depend on. We are starting with a $1 million investment and plan to expand the scope of the program based on community feedback.&amp;lt;br&amp;gt;
Why SOS?&amp;lt;br&amp;gt;
SOS rewards a very broad range of improvements that proactively harden critical open source projects and supporting infrastructure against application and supply chain attacks. To complement existing programs that reward vulnerability management, SOS’s scope is comparatively wider in the type of work it rewards, in order to support project developers.&amp;lt;br&amp;gt;
What projects are in scope?&amp;lt;br&amp;gt;
Since there is no one definition of what makes an open source project critical, our selection process will be holistic. During submission evaluation we will consider the guidelines established by the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/2021/06/25/EO%20Critical%20FINAL_1.pdf&amp;#34;&amp;gt;National Institute of Standards and Technology’s definition&amp;lt;/a&amp;gt; in response to the recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&amp;#34;&amp;gt;Executive Order on Cybersecurity&amp;lt;/a&amp;gt; along with criteria listed below:&amp;lt;br&amp;gt;
The impact of the project:&amp;lt;br&amp;gt;
How many and what types of users will be affected by the security improvements?&amp;lt;br&amp;gt;
Will the improvements have a significant impact on infrastructure and user security?&amp;lt;br&amp;gt;
If the project were compromised, how serious or wide-reaching would the implications be?&amp;lt;br&amp;gt;
The project’s rankings in existing open source criticality research:&amp;lt;br&amp;gt;
Is the project included in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.coreinfrastructure.org/programs/census-program-ii/&amp;#34;&amp;gt;Havard 2 Census Study&amp;lt;/a&amp;gt; of most-used packages, or does it have a score of 0.6 or above in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/criticality_score&amp;#34;&amp;gt;OpenSSF Critically Score&amp;lt;/a&amp;gt; project?&amp;lt;br&amp;gt;
What security improvements qualify?&amp;lt;br&amp;gt;
The program is initially focused on rewarding the following work:&amp;lt;br&amp;gt;
Software supply chain security improvements including hardening CI/CD pipelines and distribution infrastructure. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://slsa.dev/&amp;#34;&amp;gt;SLSA framework&amp;lt;/a&amp;gt; suggests specific requirements to consider, such as basic provenance generation and verification.&amp;lt;br&amp;gt;
Adoption of software artifact signing and verification. One option to consider is Sigstore&amp;amp;#39;s set of utilities (e.g. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/cosign&amp;#34;&amp;gt;cosign&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Project improvements that produce higher &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard&amp;#34;&amp;gt;OpenSSF Scorecard&amp;lt;/a&amp;gt; results. For example, a contributor can follow remediation suggestions for the following Scorecard checks:&amp;lt;br&amp;gt;
Code-Review&amp;lt;br&amp;gt;
Branch-Protection&amp;lt;br&amp;gt;
Pinned-Dependencies&amp;lt;br&amp;gt;
Dependency-Update-Tool&amp;lt;br&amp;gt;
Fuzzing&amp;lt;br&amp;gt;
Use of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/allstar&amp;#34;&amp;gt;OpenSSF Allstar&amp;lt;/a&amp;gt; and remediation of discovered issues.&amp;lt;br&amp;gt;
Earning a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bestpractices.coreinfrastructure.org/&amp;#34;&amp;gt;CII Best Practice Badge&amp;lt;/a&amp;gt; (which also improves the Scorecard results).&amp;lt;br&amp;gt;
We&amp;amp;#39;ll continue adding to the above list, so check our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sos.dev/#frequently-asked-questions&amp;#34;&amp;gt;FAQ&amp;lt;/a&amp;gt; for updates. You may also submit improvements not listed above, if you provide justification and evidence to help us understand the complexity and impact of the work. Only work completed after October 1, 2021 qualifies for SOS rewards. Upfront funding is available on a limited case by case basis for impactful improvements of moderate to high complexity over a longer time span. Such requests should explain why funding is required upfront and provide a detailed plan of how the improvements will be landed.&amp;lt;br&amp;gt;
How to participate&amp;lt;br&amp;gt;
Review our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sos.dev/#frequently-asked-questions&amp;#34;&amp;gt;FAQ&amp;lt;/a&amp;gt; and fill out &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/forms/d/e/1FAIpQLSdm8YFKTKHxcYiAyCH8Q9t5mor6jrucYKTp0J9pI60F4zvaqQ/viewform&amp;#34;&amp;gt;this form&amp;lt;/a&amp;gt; to submit your application. Please include as much data or supporting evidence as possible to help us evaluate the significance of the project and your improvements.&amp;lt;br&amp;gt;
Reward amounts&amp;lt;br&amp;gt;
Reward amounts are determined based on complexity and impact of work:&amp;lt;br&amp;gt;
$10,000 or more for complicated, high-impact and lasting improvements that almost certainly prevent major vulnerabilities in the affected code or supporting infrastructure.&amp;lt;br&amp;gt;
$5,000-$10,000 for moderately complex improvements that offer compelling security benefits.&amp;lt;br&amp;gt;
$1,000-$5,000 for submissions of modest complexity and impact.&amp;lt;br&amp;gt;
$505 for small improvements that nevertheless have merit from a security standpoint.&amp;lt;br&amp;gt;
Looking Ahead&amp;lt;br&amp;gt;
The SOS program is part of a broader effort to address a growing truth: the world relies on open source software, but widespread support and financial contributions are necessary to keep that software safe and secure. This $1 million investment is just the beginning—we envision the SOS pilot program as the starting point for future efforts that will hopefully bring together other large organizations and turn it into a sustainable, long-term initiative under the OpenSSF. We welcome &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:sos-rewards@googlegroups.com&amp;#34;&amp;gt;community feedback&amp;lt;/a&amp;gt; and interest from others who want to contribute to the SOS program. Together we can pool our support to give back to the open source community that makes the modern internet possible.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20211001-213005/</link>
      <pubDate>Fri, 01 Oct 2021 21:30:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20211001-213005/</guid>
      <description>The U.S. Federal Communications Commission (FCC) is asking for feedback on new proposed rules to crack down on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/category/sim-swapping/&amp;#34;&amp;gt;SIM swapping&amp;lt;/a&amp;gt; and number port-out fraud, increasingly prevalent scams in which identity thieves hijack a target’s mobile phone number and use that to wrest control over the victim’s online identity.&amp;lt;br&amp;gt;
In a long-overdue &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fcc.gov/document/fcc-combating-scams-used-commandeer-consumers-cell-phone-accounts&amp;#34;&amp;gt;notice issued Sept. 30&amp;lt;/a&amp;gt; , the FCC said it plans to move quickly on requiring the mobile companies to adopt more secure methods of authenticating customers before redirecting their phone number to a new device or carrier.&amp;lt;br&amp;gt;
“We have received numerous complaints from consumers who have suffered significant distress, inconvenience, and financial harm as a result of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/category/sim-swapping/&amp;#34;&amp;gt;SIM swapping&amp;lt;/a&amp;gt; and port-out fraud,” the FCC wrote. “Because of the serious harms associated with SIM swap fraud, we believe that a speedy implementation is appropriate.”&amp;lt;br&amp;gt;
The FCC said the proposal was in response to a flood of complaints to the agency and the U.S. Federal Trade Commission (FTC) about fraudulent SIM swapping and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2018/02/how-to-fight-mobile-number-port-out-scams/&amp;#34;&amp;gt;number port-out fraud&amp;lt;/a&amp;gt; . SIM swapping happens when the fraudsters trick or bribe an employee at a mobile phone store into transferring control of a target’s phone number to a device they control.&amp;lt;br&amp;gt;
From there, the attackers can reset the password for almost any online account tied to that mobile number, because most online services still allow people to reset their passwords simply by clicking a link sent via SMS to the phone number on file.&amp;lt;br&amp;gt;
Scammers commit number port-out fraud by posing as the target and requesting that their number be transferred to a different mobile provider (and to a device the attackers control).&amp;lt;br&amp;gt;
The FCC said the carriers have traditionally sought to address both forms of phone number fraud by requiring static data about the customer that is no longer secret and has been exposed in a variety of places already — such as date of birth and Social Security number. By way of example, the commission pointed to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/&amp;#34;&amp;gt;the recent breach at T-Mobile that exposed this data on 40 million current, past and prospective customers&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
What’s more, victims of SIM swapping and number port-out fraud are often the last to know about their victimization. The FCC said it plans to prohibit wireless carriers from allowing a SIM swap unless the carrier uses a secure method of authenticating its customer. Specifically, the commission proposes that carriers be required to verify a “pre-established password” with customers before making any changes to their accounts.&amp;lt;br&amp;gt;
According to the FCC, several examples of pre-established passwords include:&amp;lt;br&amp;gt;
-a one-time passcode sent via text message to the account phone number or a pre-registered backup number -a one-time passcode sent via email to the email address associated with the account -a passcode sent using a voice call to the account phone number or pre-registered back-up telephone number.&amp;lt;br&amp;gt;
The commission said it was also considering updating its rules to require wireless carriers to develop procedures for responding to failed authentication attempts and to notify customers immediately of any requests for SIM changes. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/#more-57174&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/&amp;#34;&amp;gt;FCC Proposal Targets SIM Swapping, Port-Out Fraud&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20211001-081221/</link>
      <pubDate>Fri, 01 Oct 2021 08:12:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20211001-081221/</guid>
      <description>Brian Armstrong &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/brian_armstrong&amp;#34;&amp;gt;@brian_armstrong&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
13/ I should add: a big thank you to the many employees who stepped in to fill the gaps that were left as our colleagues departed, working nights and weekends to ensure we continued to serve our customers. This was heroic and awesome to see.&amp;lt;br&amp;gt;
12/ It&amp;#39;s incredibly difficult to do, but if you stand up and say what you really think, it may turn out better than you thought. Saying this advice for myself as much as anyone else - there will be many more challenges ahead.&amp;lt;br&amp;gt;
11/ For leaders out there, think about any area where you aren&amp;#39;t being 100% authentic, and instead are trying to keep the peace, or say what you think people want to hear.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20211001-041905/</link>
      <pubDate>Fri, 01 Oct 2021 04:19:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20211001-041905/</guid>
      <description>Sarah Gailey is one of science fiction&amp;#39;s great new talents and their 2019 debut novel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2019/06/04/magic-r-us.html&amp;#34;&amp;gt;Magic for Liars&amp;lt;/a&amp;gt; was incredibly strong; now they&amp;#39;re back with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/37tiiSl&amp;#34;&amp;gt;Upright Women Wanted&amp;lt;/a&amp;gt; , a feminist, genderqueer science fiction western novel about gun-toting roving librarians who are secretly the heart of an antifascist resistance. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/02/04/unauthorized-materials.html#more-753714&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In 1979, construction concluded on the Awhatukee House of the Future, a $1.2m model home in the new Phoenix suburb of Ahwatukee Village, co-built with input from Frank Lloyd Wright&amp;#39;s Taliesin Associated Architects and equipped with 10 networked Motorola processors that retailed for $30,000. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/white-cyberelephant.html#more-765576&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Burbank librarian Sarah McKinley Oakes ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/?s=%22remains%20of%20la%22&amp;#34;&amp;gt;previously&amp;lt;/a&amp;gt; ) also nannies for a six year old whose parents are French Stewart — from Third Rock from the Sun — and the actor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Vanessa_Claire_Stewart&amp;#34;&amp;gt;Vanessa Claire Smith&amp;lt;/a&amp;gt; . Smith and Oakes have a friendly, normal relationship, but when it comes to French Stewart, things are awesomely weird. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/hotel-california.html#more-765572&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In 2019 the Pennsylvania Attorney General published a 900-page grand jury report on sexual predators in the Catholic Church and the coverups the church and its official had undertaken; at the time, the church promised to end the coverup and engage in truth and reconciliation with the parishoners who&amp;#39;d been preyed upon by clergy. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/credibly-accused.html#more-765526&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Network administration prof and infrastructure security architect Jan Schaumann has compiled a list of 88 &amp;amp;quot;ops lessons we all learn the hard way&amp;amp;quot; (e.g.: &amp;amp;quot;Any sufficiently successful product launch is indistinguishable from a DDoS; any sufficiently advanced user indistinguishable from an attacker.&amp;amp;quot;) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/etc-hosts-solves-nothing.html#more-765501&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20211001-041829/</link>
      <pubDate>Fri, 01 Oct 2021 04:18:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20211001-041829/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/elon-musks-philosophical-musings&amp;#34;&amp;gt;Elon Musk’s Philosophical Musings On Space (And Other Observations From Code Conference)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/elon-musks-philosophical-musings&amp;#34;&amp;gt;Musk on space and taxes, Satya Nadella on TikTok, Marc Benioff on the workplace, and more.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/completely-running-blind-apples-power&amp;#34;&amp;gt;“Completely Running Blind.” Apple’s Power Move To Kneecap Facebook Ads Is Working.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/completely-running-blind-apples-power&amp;#34;&amp;gt;Facebook can survive its scandals, but Apple’s anti-tracking initiative is doing meaningful damage to its business, according to the company and its ad…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>/var/blog | blogging data from aditya mukerjee</title>
      <link>https://www.whatsupup.com/blog/nuncle/haw/20211001-041707/</link>
      <pubDate>Fri, 01 Oct 2021 04:17:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nuncle/haw/20211001-041707/</guid>
      <description>args : [&amp;amp;quot;-h&amp;amp;quot;, “http://localhost:9090/metrics”, “-i”, “10s”, “-s”, “http://veneur-global:8127”]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210930-201751/</link>
      <pubDate>Thu, 30 Sep 2021 20:17:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210930-201751/</guid>
      <description>U.S. House votes to approve stopgap funding bill to avoid government shutdown Friday, sending bill to Biden &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-house-approves-bill-avert-government-shutdown-2021-09-30/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210930-201722/</link>
      <pubDate>Thu, 30 Sep 2021 20:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210930-201722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/30/technology/facebook-senate-hearing.html&amp;#34;&amp;gt;Facebook Grilled by Senators Over Its Effect on Children The company faces accusations that it hid research showing the mental and emotional harm that Instagram, its photo-sharing app, has on teenagers. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210930-201511/</link>
      <pubDate>Thu, 30 Sep 2021 20:15:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210930-201511/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#jokes&amp;#34;&amp;gt;jokes&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In my CppCon 2015 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=jfDRgnxDe7o&amp;#34;&amp;gt;“Futures from Scratch,”&amp;lt;/a&amp;gt; I mentioned in passing that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.cppreference.com/w/cpp/experimental/when_any&amp;#34;&amp;gt;std::experimental::when_any&amp;lt;/a&amp;gt; ,
when given an empty list of futures, returns a ready future,
instead of blocking forever (which would be the mathematically
correct result, I said). This morning a YouTube commenter said,
well, it isn’t that weird, because the condition “ any single future
is ready” is in some sense a “weaker” condition than “ all of the futures are ready.” This reminded me of a Wizard of Id comic from my youth:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog by Jared Nelsen</title>
      <link>https://www.whatsupup.com/blog/baldish/wince/20210930-200822/</link>
      <pubDate>Thu, 30 Sep 2021 20:08:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/baldish/wince/20210930-200822/</guid>
      <description>Software Engineer and Computer Scientist dedicated to creativity and excellence in computing&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210930-200630/</link>
      <pubDate>Thu, 30 Sep 2021 20:06:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210930-200630/</guid>
      <description>In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords. That service quickly went offline, but new research reveals a number of competitors have since launched bot-based services that make it relatively easy for crooks to phish OTPs from targets.&amp;lt;br&amp;gt;
An ad for the OTP interception service/bot “SMSRanger.”&amp;lt;br&amp;gt;
Many websites now require users to supply both a password and a numeric code/OTP token sent via text message, or one generated by mobile apps like Authy and Google Authenticator . The idea is that even if the user’s password gets stolen, the attacker still can’t access the user’s account without that second factor — i.e. without access to the victim’s mobile device or phone number.&amp;lt;br&amp;gt;
The OTP interception service &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/02/u-k-arrest-in-sms-bandits-phishing-service/&amp;#34;&amp;gt;featured earlier this year&amp;lt;/a&amp;gt; — Otp[.]agency — advertised a web-based bot designed to trick targets into giving up OTP tokens. This service (and all others mentioned in this story) assumes the customer already has the target’s login credentials through some means.&amp;lt;br&amp;gt;
OTP Agency customers would enter a target’s phone number and name, and then the service would initiate an automated phone call that alerts that person about unauthorized activity on their account. The call would prompt the target to enter an OTP token generated by their phone’s mobile app (“for authentication purposes”), and that code would then get relayed back to the bad guy customers’ panel at the OTP Agency website.&amp;lt;br&amp;gt;
OTP Agency &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/09/otp-bye.png&amp;#34;&amp;gt;took itself offline&amp;lt;/a&amp;gt; within hours of that story. But according to research from cyber intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel471.com&amp;#34;&amp;gt;Intel 471&amp;lt;/a&amp;gt; , multiple new OTP interception services have emerged to fill that void. And all of them operate via Telegram , a cloud-based instant messaging system.&amp;lt;br&amp;gt;
“Intel 471 has seen an uptick in services on the cybercrime underground that allow attackers to intercept one-time password (OTP) tokens,” the company wrote in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intel471.com/blog/otp-password-bots-telegram&amp;#34;&amp;gt;a blog post today&amp;lt;/a&amp;gt; . “Over the past few months, we’ve seen actors provide access to services that call victims, appear as a legitimate call from a specific bank and deceive victims into typing an OTP or other verification code into a mobile phone in order to capture and deliver the codes to the operator. Some services also target other popular social media platforms or financial services, providing email phishing and SIM swapping capabilities.”&amp;lt;br&amp;gt;
Intel471 says one new Telegram OTP bot called “ SMSRanger ” is popular because it’s remarkably easy to use, and probably because of the many testimonials posted by customers who seem happy with its frequent rate of success in extracting OTP tokens when the attacker already has the target’s “fullz,” personal information such as Social Security number and date of birth. From their analysis:&amp;lt;br&amp;gt;
“Those who pay for access can use the bot by entering commands similar to how bots are used on popular workforce collaboration tool Slack. A simple slash command allows a user to enable various ‘modes’ — scripts aimed as various services — that can target specific banks, as well as PayPal, Apple Pay, Google Pay, or a wireless carrier.&amp;lt;br&amp;gt;
Once a target’s phone number has been entered, the bot does the rest of the work, ultimately granting access to whatever account has been targeted. Users claim that SMSRanger has an efficacy rate of about 80% if the victim answered the call and the full information (fullz) the user provided was accurate and updated.”&amp;lt;br&amp;gt;
Another OTP interception service called SMS Buster requires a tad more effort from a customer, Intel 471 explains:&amp;lt;br&amp;gt;
“The bot provides options to disguise a call to make it appear as a legitimate contact from a specific bank while letting the attackers choose to dial from any phone number. From there, an attacker could follow a script to trick a victim into providing sensitive details such as an ATM personal identification number (PIN), card verification value (CVV) and OTP, which could then be sent to an individual’s Telegram account. The bot, which was used by attackers targeting Canadian victims, gives users the chance to launch attacks in French and English.”&amp;lt;br&amp;gt;
These services are springing up because they work and they’re profitable. And they’re profitable because far too many websites and services funnel users toward multi-factor authentication methods that can be intercepted, spoofed, or misdirected — like SMS-based one-time codes, or even app-generated OTP tokens. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/the-rise-of-one-time-password-interception-bots/#more-57147&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/the-rise-of-one-time-password-interception-bots/&amp;#34;&amp;gt;The Rise of One-Time Password Interception Bots&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210929-081805/</link>
      <pubDate>Wed, 29 Sep 2021 08:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210929-081805/</guid>
      <description>Former foreign minister Fumio Kishida to become Japan&amp;#39;s next prime minister after winning ruling party election &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/japans-ruling-party-votes-new-leader-who-will-almost-certainly-be-next-pm-2021-09-28/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210929-042155/</link>
      <pubDate>Wed, 29 Sep 2021 04:21:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210929-042155/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;How I accidentally built a Podcast API business Dec. 6, 2020 · In this article, I’ll share with you the journey of building this API business, the technology behind it, and hopefully you can learn one thing or two and build your own API business in the future. Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/what-is-listen-notes-why-does-listen-notes-need-45/&amp;#34;&amp;gt;What is Listen Notes? Why does Listen Notes need to make money? Oct. 2, 2020 · Essentially, Listen Notes is an independent podcast database that has three UIs (User Interface) to access the data. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-for-chrome-28/&amp;#34;&amp;gt;Listen Notes for Chrome Dec. 1, 2019 · We just launched a Chrome extension! You can search podcasts / episodes right from your Chrome browser without opening ListenNotes.com. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-explorer-get-similar-podcasts-40/&amp;#34;&amp;gt;Listen Explorer: Get similar podcasts Jan. 22, 2019 · The idea is simple: You pick a few podcasts, and you’ll get recommendations for similar podcasts. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-real-time-like-google-analytics-real-time-37/&amp;#34;&amp;gt;Listen Real-Time: Like Google Analytics Real-Time, but for podcast episodes Dec. 30, 2018 · Everyone’s saying “podcast discovery is broken”. Okay, here’s another way to discover podcasts — Check out what other people are listening to right now. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/just-listentm-a-simple-podcast-app-for-the-99-36/&amp;#34;&amp;gt;Just Listen™: A simple podcast app for the 99% Dec. 20, 2018 · A very simple &amp;amp;amp; very opinionated podcast app from Listen Notes: Just Listen™!! Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/postmortem-on-apr-22-2018-outage-30/&amp;#34;&amp;gt;Postmortem on Apr 22, 2018 outage April 26, 2018 · On Apr 22, 2018, Listen Notes website was down for ~4 hours and I lost 10 hours production data. This is the biggest outage since I launched Listen Notes as a side project last year. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/the-boring-technology-behind-a-one-person-23/&amp;#34;&amp;gt;The boring technology behind a one-person Internet company Jan. 24, 2018 · The tech stack of Listen Notes, the best podcast search engine and database. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/my-y-combinator-interview-experience-w18-22/&amp;#34;&amp;gt;My Y Combinator interview experience (W18) Jan. 12, 2018 · I want to be transparent on the process of building Listen Notes, as a product and as a company. If eventually I declare failure of this startup thing, these written documents may still benefit people who come from Google search :) Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-later-tm-is-like-instapaper-or-pocket-but-29/&amp;#34;&amp;gt;Listen Later ™ is like Instapaper or Pocket, but for podcasts! Dec. 19, 2017 · I just built a simple feature, called Listen Later. You can tell what it is from the name :) Yes, it’s like “Watch Later” on YouTube or “Read Later” on Pocket. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-do-people-use-listen-notes-26/&amp;#34;&amp;gt;How do people use Listen Notes? Nov. 12, 2017 · I’ve got a bunch of emails from Listen Notes users. Now I have a better understanding what people use Listen Notes for. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/migrating-listen-notes-servers-to-aws-25/&amp;#34;&amp;gt;Migrating Listen Notes servers to AWS Oct. 28, 2017 · Well, Listen Notes was a side project of mine. I run all my side projects on Digital Ocean, because it’s cheap &amp;amp;amp; convenient to set up. I decided to migrate the whole backend infrastructure to AWS. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/podcast-in-2017-is-just-like-web-in-1997-24/&amp;#34;&amp;gt;Podcast in 2017 is just like Web in 1997 Oct. 9, 2017 · Podcast in 2017 &amp;amp;amp; web in 1997 are similar in three aspects: number of users, ad spendings, and contents. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-use-listen-notes-from-chrome-address-bar-21/&amp;#34;&amp;gt;How to use Listen Notes from Chrome address bar? Oct. 3, 2017 · Click “Add” in the “Other search engines” section. Fill these three things. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Chris Zacharias</title>
      <link>https://www.whatsupup.com/blog/gigabit/polenta/20210929-042121/</link>
      <pubDate>Wed, 29 Sep 2021 04:21:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gigabit/polenta/20210929-042121/</guid>
      <description>Aug 26, 2015&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210929-042030/</link>
      <pubDate>Wed, 29 Sep 2021 04:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210929-042030/</guid>
      <description>Aug. 31, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210929-041944/</link>
      <pubDate>Wed, 29 Sep 2021 04:19:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210929-041944/</guid>
      <description>Aug. 3, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210929-041744/</link>
      <pubDate>Wed, 29 Sep 2021 04:17:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210929-041744/</guid>
      <description>Sep 23 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210929-041739/</link>
      <pubDate>Wed, 29 Sep 2021 04:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210929-041739/</guid>
      <description>Aug. 19, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210929-041634/</link>
      <pubDate>Wed, 29 Sep 2021 04:16:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210929-041634/</guid>
      <description>Scientists searching for extraterrestrial life should narrow their hunt to stars and planetary systems that have an occasional view of Earth as it passes in front of the Sun.&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 16 Mar 2021&amp;lt;br&amp;gt;
Comments &amp;amp;amp; Opinion 01 Feb 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210929-041550/</link>
      <pubDate>Wed, 29 Sep 2021 04:15:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210929-041550/</guid>
      <description>Eben Upton - 1st Jun 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-rp2040-on-sale/#comments&amp;#34;&amp;gt;28 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 2nd Nov 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-400-the-70-desktop-pc/#comments&amp;#34;&amp;gt;453 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&amp;&gt; /dev/null</title>
      <link>https://www.whatsupup.com/blog/airbrush/misogynic/20210929-041425/</link>
      <pubDate>Wed, 29 Sep 2021 04:14:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/airbrush/misogynic/20210929-041425/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/03/mastering-embedded-linux-part-4-adding-features/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 4: Adding Features&amp;lt;/a&amp;gt; Mar 11, 2020 How to make your embedded system do something useful&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/02/trying-the-allwinner-f1c200s/&amp;#34;&amp;gt;Trying the Allwinner F1C200s&amp;lt;/a&amp;gt; Feb 29, 2020 Continuing experiments with inexpensive Allwinner processors&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/01/the-wave-particle-duality-of-git-commits/&amp;#34;&amp;gt;The Wave/Particle Duality of Git Commits&amp;lt;/a&amp;gt; Jan 20, 2020 Yet another way to think of&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/01/mastering-embedded-linux-part-3-buildroot/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 3: Buildroot&amp;lt;/a&amp;gt; Jan 14, 2020 Compiling a Linux OS from source code with the Buildroot distribution&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/mastering-embedded-linux-part-2-hardware/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 2: Hardware&amp;lt;/a&amp;gt; Dec 28, 2019 Diving deeper into the hardware powering cheap embedded Linux systems&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/designing-my-linux-business-card/&amp;#34;&amp;gt;Designing My Linux-Powered Business Card&amp;lt;/a&amp;gt; Dec 23, 2019 Behind-the-scenes build log for my Linux-powered business card&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/my-business-card-runs-linux/&amp;#34;&amp;gt;My Business Card Runs Linux&amp;lt;/a&amp;gt; Dec 23, 2019 In which I build a Linux computer cheap enough to give away&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/08/mastering-embedded-linux-part-1-concepts/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 1: Concepts&amp;lt;/a&amp;gt; Aug 25, 2019 A high-level introduction to concepts in hacking cheap embedded Linux systems&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20210929-041339/</link>
      <pubDate>Wed, 29 Sep 2021 04:13:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20210929-041339/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/github-f-ck-your-name-change-de599033bbbe?source=user_profile---------0----------------------------&amp;#34;&amp;gt;Mar 16&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20210929-041131/</link>
      <pubDate>Wed, 29 Sep 2021 04:11:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20210929-041131/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jimio&amp;#34;&amp;gt;jimio&amp;lt;/a&amp;gt; on 10 Aug 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 04 Feb 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/greggcorp&amp;#34;&amp;gt;greggcorp&amp;lt;/a&amp;gt; on 26 Oct 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/peter-signal&amp;#34;&amp;gt;peter-signal&amp;lt;/a&amp;gt; on 20 Oct 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/imperiopolis&amp;#34;&amp;gt;imperiopolis&amp;lt;/a&amp;gt; on 09 Jun 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/alan-signal&amp;#34;&amp;gt;alan-signal&amp;lt;/a&amp;gt; on 13 Jan 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/scottnonnenberg&amp;#34;&amp;gt;scottnonnenberg&amp;lt;/a&amp;gt; on 31 Oct 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 07 Apr 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/riyapenn&amp;#34;&amp;gt;riyapenn&amp;lt;/a&amp;gt; on 18 Aug 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/greggawatt&amp;#34;&amp;gt;greggawatt&amp;lt;/a&amp;gt; on 31 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/lconnolly&amp;#34;&amp;gt;lconnolly&amp;lt;/a&amp;gt; on 30 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rhodey&amp;#34;&amp;gt;rhodey&amp;lt;/a&amp;gt; on 29 Jan 2015&amp;lt;br&amp;gt;
on 28 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/kmonkeyjam&amp;#34;&amp;gt;kmonkeyjam&amp;lt;/a&amp;gt; on 26 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/joyceyan&amp;#34;&amp;gt;joyceyan&amp;lt;/a&amp;gt; on 24 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jackflips&amp;#34;&amp;gt;jackflips&amp;lt;/a&amp;gt; on 23 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/uxyoko&amp;#34;&amp;gt;uxyoko&amp;lt;/a&amp;gt; on 22 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rileyjshaw&amp;#34;&amp;gt;rileyjshaw&amp;lt;/a&amp;gt; on 21 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jessysaurusrex&amp;#34;&amp;gt;jessysaurusrex&amp;lt;/a&amp;gt; on 20 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/trevp&amp;#34;&amp;gt;trevp&amp;lt;/a&amp;gt; on 18 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/abolishme&amp;#34;&amp;gt;abolishme&amp;lt;/a&amp;gt; on 17 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 16 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/TheBlueMatt&amp;#34;&amp;gt;TheBlueMatt&amp;lt;/a&amp;gt; on 15 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/elchao96&amp;#34;&amp;gt;elchao96&amp;lt;/a&amp;gt; on 14 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/turtlekiosk&amp;#34;&amp;gt;turtlekiosk&amp;lt;/a&amp;gt; on 13 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/meskio&amp;#34;&amp;gt;meskio&amp;lt;/a&amp;gt; on 12 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 10 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/mkhandekar&amp;#34;&amp;gt;mkhandekar&amp;lt;/a&amp;gt; on 09 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 08 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/mcginty&amp;#34;&amp;gt;mcginty&amp;lt;/a&amp;gt; on 07 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/meskio&amp;#34;&amp;gt;meskio&amp;lt;/a&amp;gt; on 22 Oct 2013&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/emblem&amp;#34;&amp;gt;emblem&amp;lt;/a&amp;gt; on 30 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/abolishme&amp;#34;&amp;gt;abolishme&amp;lt;/a&amp;gt; on 29 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rhodey&amp;#34;&amp;gt;rhodey&amp;lt;/a&amp;gt; on 26 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/isislovecruft&amp;#34;&amp;gt;isislovecruft&amp;lt;/a&amp;gt; on 25 Mar 2013&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20210929-041110/</link>
      <pubDate>Wed, 29 Sep 2021 04:11:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20210929-041110/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2021/08/26/qrencoding.html&amp;#34;&amp;gt;Efficient QR codes&amp;lt;/a&amp;gt; (26 Aug 2021)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2020/12/23/acvp.html&amp;#34;&amp;gt;ACVP&amp;lt;/a&amp;gt; (23 Dec 2020)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2020/09/06/20yearsago.html&amp;#34;&amp;gt;Letter to 20 years ago&amp;lt;/a&amp;gt; (06 Sep 2020)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2019/10/30/pqsivssl.html&amp;#34;&amp;gt;Real-world measurements of structured-lattices and supersingular isogenies in TLS&amp;lt;/a&amp;gt; (30 Oct 2019)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2019/08/10/ctap2features.html&amp;#34;&amp;gt;Username (and password) free login with security keys&amp;lt;/a&amp;gt; (10 Aug 2019)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210929-041101/</link>
      <pubDate>Wed, 29 Sep 2021 04:11:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210929-041101/</guid>
      <description>An article for ACMQ, also published by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://cacm.acm.org/magazines/2010/7/95062-visualizing-system-latency/fulltext&amp;#34;&amp;gt;CACM&amp;lt;/a&amp;gt; , on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://queue.acm.org/detail.cfm?id=1809426&amp;#34;&amp;gt;Visualizing System latency&amp;lt;/a&amp;gt; using latency heat maps (2010). This includes interesting latency heat maps I had found using Sun Storage Analytics, including the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-03-12/latency-art-rainbow-pterodactyl.html&amp;#34;&amp;gt;Rainbow Pterodactyl&amp;lt;/a&amp;gt; and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-06-12/latency-art-x-marks-the-spot.html&amp;#34;&amp;gt;Icy Lake&amp;lt;/a&amp;gt; . This was pioneering work, and it took several years for latency heat maps to appear in other performance analysis products.&amp;lt;br&amp;gt;
Posts showing new (and interesting) performance visualizations using Sun Storage Analytics, especially latency heat maps: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-03-12/latency-art-rainbow-pterodactyl.html&amp;#34;&amp;gt;Latency Art: Rainbow Pterodactyl&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-03-17/heat-map-analytics.html&amp;#34;&amp;gt;Heat Map Analytics&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-06-12/latency-art-x-marks-the-spot.html&amp;#34;&amp;gt;Latency Art: X marks the spot&amp;lt;/a&amp;gt; (2009).&amp;lt;br&amp;gt;
Visualizing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-02-06/dram-latency.html&amp;#34;&amp;gt;DRAM Latency&amp;lt;/a&amp;gt; using latency heat maps from Sun Storage Analytics (2009).&amp;lt;br&amp;gt;
Demonstrating the Kstat/DTrace-based Analytics tool from the Sun Storage 7000 product: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/2008-12-31/jbod-analytics-example.html&amp;#34;&amp;gt;JBOD Analytics Example&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-02-23/networking-analytics-example.html&amp;#34;&amp;gt;Networking Analytics Example&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-11-17/nfs-analytics-example.html&amp;#34;&amp;gt;NFS Analytics example&amp;lt;/a&amp;gt; (2008-9).&amp;lt;br&amp;gt;
Posts demonstrating the performance limits of the Sun Storage 7000 series of ZFS-based storage appliance I was working on, as well as our Analytics observability tool: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2008-12-02/a-quarter-million-nfs-iops.html&amp;#34;&amp;gt;A quarter million NFS IOPS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2008-12-15/up-to-2gbs-nfs.html&amp;#34;&amp;gt;Up to 2 Gbytes/sec NFS&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-01-09/1gbs-nfs-from-disk.html&amp;#34;&amp;gt;1 Gbyte/sec NFS, streaming from disk&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-01-09/my-sun-storage-7410-perf-limits.html&amp;#34;&amp;gt;My Sun Storage 7410 perf limits&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-03-03/cifs-at-1gbs.html&amp;#34;&amp;gt;CIFS at 1 Gbyte/sec&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-05-27/my-sun-storage-7310-perf-limits.html&amp;#34;&amp;gt;My Sun Storage 7310 perf limits&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-10-08/hybrid-storage-pool-top-speeds.html&amp;#34;&amp;gt;Hybrid Storage Pool: Top Speeds&amp;lt;/a&amp;gt; (2008-9).&amp;lt;br&amp;gt;
Slides for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/CEC2008_fishworks_overview.pdf&amp;#34;&amp;gt;Fishworks Overview&amp;lt;/a&amp;gt; (PDF) at CEC2008 with Cindi McGuire, where we introduced the first ZFS-based storage appliance, the Sun Storage 7000 series. Fishworks was the team that developed it. We worked at a private site, setup to mimic a San Francisco startup.&amp;lt;br&amp;gt;
The original &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2008-07-22/zfs-l2arc.html&amp;#34;&amp;gt;ZFS L2ARC&amp;lt;/a&amp;gt; post (2008) and later &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2009-01-30/l2arc-screenshots.html&amp;#34;&amp;gt;L2ARC Screenshots&amp;lt;/a&amp;gt; (2009). Since code changes were public each night, my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Solaris/l2arc_comment.txt&amp;#34;&amp;gt;block comment&amp;lt;/a&amp;gt; in usr/src/uts/common/fs/zfs/arc.c (added in Nov 2007) disguised the then-secret intent of this technology by listing &amp;amp;quot;short-stroked disks&amp;amp;quot; as the first intended device, instead of SSDs.&amp;lt;br&amp;gt;
I wrote the original &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.oracle.com/cd/E22471_01/pdf/820-4167.pdf&amp;#34;&amp;gt;Sun ZFS Storage 7000 admin guide&amp;lt;/a&amp;gt; and online help, and while doing so created the most advanced content system within Sun Microsystems: A content wiki that could auto-generate Sun-styled PDFs and other formats, allowing versions to be built in seconds instead of the usual 2-week process. This 2010 version has many updates from other staff (I&amp;#39;ve yet to find my original 2008 PDF) (2008).&amp;lt;br&amp;gt;
Slides for the OSCON 2007 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/OSCON2007_Observability_DTrace_Twitter.pdf&amp;#34;&amp;gt;Observability Matters: How DTrace Helped Twitter&amp;lt;/a&amp;gt; by Adam Leventhal and myself. At the time, Twitter was a one-year old startup running on Solaris with crippling performance issues, and Sun&amp;#39;s top engineering team (including Adam and myself) visited the SF headquarters to help. This summaries findings by the team (2007).&amp;lt;br&amp;gt;
My &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/zones.html&amp;#34;&amp;gt;Solaris 10 Zones&amp;lt;/a&amp;gt; page from 2005, where I developed models for configuring Zones with Resource Controls. This was pioneering work for the performance isolation of containers (nowadays the realm of Linux cgroups). I was not a Sun employee at the time. Sun later based their official docs on my work, without attribution (they were not allowed to include my home page URL in the official Sun references).&amp;lt;br&amp;gt;
My old and unmaintained Unix and Sun Solaris material is labeled as being in my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/crypt.html&amp;#34;&amp;gt;Crypt&amp;lt;/a&amp;gt; , and kept online for historical interest only. The Crypt containers a few extra things not listed above. (circa 2003-2005.)&amp;lt;br&amp;gt;
Last updated: 20-Sep-2021 Created: 2001 About this site, and email address: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/email.html&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; Copyright 2021 Brendan Gregg, all rights reserved&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210929-040806/</link>
      <pubDate>Wed, 29 Sep 2021 04:08:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210929-040806/</guid>
      <description>14 Sep 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210929-040636/</link>
      <pubDate>Wed, 29 Sep 2021 04:06:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210929-040636/</guid>
      <description>Despite admitting to FBI agents that he ran these booter services (and turning over plenty of incriminating evidence in the process), Gatrel opted to take his case to trial, defended the entire time by public defenders. Facing the prospect of a hefty sentence if found guilty at trial, Martinez pleaded guilty on Aug. 26 to one count of unauthorized impairment of a protected computer.&amp;lt;br&amp;gt;
In its Aug. 19 writeup, Cloudflare neglected to assign a name to the botnet behind the attack. But on Thursday DDoS protection firm Qrator Labs &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/&amp;#34;&amp;gt;identified the culprit&amp;lt;/a&amp;gt; — “Meris” — a new monster that first emerged at the end of June 2021.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210928-200615/</link>
      <pubDate>Tue, 28 Sep 2021 20:06:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210928-200615/</guid>
      <description>The new $30 AirTag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons to scan it with a mobile phone and discover its owner’s phone number if the AirTag has been set to lost mode. But according to new research, this same feature can be abused to redirect the Good Samaritan to an iCloud phishing page — or to any other malicious website.&amp;lt;br&amp;gt;
The AirTag’s “Lost Mode” lets users alert Apple when an AirTag is missing. Setting it to Lost Mode generates a unique URL at &amp;lt;a href=&amp;#34;https://found.apple.com&amp;#34;&amp;gt;https://found.apple.com&amp;lt;/a&amp;gt;, and allows the user to enter a personal message and contact phone number. Anyone who finds the AirTag and scans it with an Apple or Android phone will immediately see that unique Apple URL with the owner’s message.&amp;lt;br&amp;gt;
When scanned, an AirTag in Lost Mode will present a short message asking the finder to call the owner at at their specified phone number. This information pops up without asking the finder to log in or provide any personal information. But your average Good Samaritan might not know this.&amp;lt;br&amp;gt;
That’s important because Apple’s Lost Mode doesn’t currently stop users from injecting arbitrary computer code into its phone number field — such as code that causes the Good Samaritan’s device to visit a phony Apple iCloud login page.&amp;lt;br&amp;gt;
A sample “Lost Mode” message. Image: Medium @bobbyrsec&amp;lt;br&amp;gt;
The vulnerability was discovered and reported to Apple by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/in/bobby-rauch/&amp;#34;&amp;gt;Bobby Rauch&amp;lt;/a&amp;gt; , a security consultant and penetration tester based in Boston. Rauch told KrebsOnSecurity the AirTag weakness makes the devices cheap and possibly very effective physical trojan horses.&amp;lt;br&amp;gt;
“I can’t remember another instance where these sort of small consumer-grade tracking devices at a low cost like this could be weaponized,” Rauch said.&amp;lt;br&amp;gt;
Consider the scenario where an attacker drops a malware-laden USB flash drive in the parking lot of a company he wants to hack into. Odds are that sooner or later some employee is going to pick that sucker up and plug it into a computer — just to see what’s on it (the drive might even be labeled something tantalizing, like “Employee Salaries”).&amp;lt;br&amp;gt;
If this sounds like a script from a James Bond movie, you’re not far off the mark. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/&amp;#34;&amp;gt;A USB stick with malware&amp;lt;/a&amp;gt; is very likely how U.S. and Israeli cyber hackers got the infamous &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Stuxnet&amp;#34;&amp;gt;Stuxnet worm&amp;lt;/a&amp;gt; into the internal, air-gapped network that powered Iran’s nuclear enrichment facilities a decade ago. In 2008, a cyber attack &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/2008_cyberattack_on_United_States&amp;#34;&amp;gt;described&amp;lt;/a&amp;gt; at the time as “the worst breach of U.S. military computers in history” was traced back to a USB flash drive left in the parking lot of a U.S. Department of Defense facility.&amp;lt;br&amp;gt;
In the modern telling of this caper, a weaponized AirTag tracking device could be used to redirect the Good Samaritan to a phishing page, or to a website that tries to foist malicious software onto her device.&amp;lt;br&amp;gt;
Rauch contacted Apple about the bug on June 20, but for three months when he inquired about it the company would say only that it was still investigating. Last Thursday, the company sent Rauch a follow-up email stating they planned to address the weakness in an upcoming update, and in the meantime would he mind not talking about it publicly?&amp;lt;br&amp;gt;
Rauch said Apple never acknowledged basic questions he asked about the bug, such as if they had a timeline for fixing it, and if so whether they planned to credit him in the accompanying security advisory. Or whether his submission would qualify for Apple’s “bug bounty” program, which promises financial rewards of up to $1 million for security researchers who report security bugs in Apple products.&amp;lt;br&amp;gt;
Rauch said he’s reported many software vulnerabilities to other vendors over the years, and that Apple’s lack of communication prompted him &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/@bobbyrsec/6997da43a216&amp;#34;&amp;gt;to go public with his findings&amp;lt;/a&amp;gt; — even though Apple says staying quiet about a bug until it is fixed is how researchers qualify for recognition in security advisories.&amp;lt;br&amp;gt;
“I told them, ‘I’m willing to work with you if you can provide some details of when you plan on remediating this, and whether there would be any recognition or bug bounty payout’,” Rauch said, noting that he told Apple he planned to publish his findings within 90 days of notifying them. “Their response was basically, ‘We’d appreciate it if you didn’t leak this.&amp;#39;”&amp;lt;br&amp;gt;
Rauch’s experience echoes that of other researchers interviewed in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2021/09/09/apple-bug-bounty/&amp;#34;&amp;gt;a recent Washington Post article&amp;lt;/a&amp;gt; about how not fun it can be to report security vulnerabilities to Apple, a notoriously secretive company. The common complaints were that Apple is slow to fix bugs and doesn’t always pay or publicly recognize hackers for their reports, and that researchers often receive little or no feedback from the company. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/apple-airtag-bug-enables-good-samaritan-attack/#more-57118&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/apple-airtag-bug-enables-good-samaritan-attack/&amp;#34;&amp;gt;Apple AirTag Bug Enables ‘Good Samaritan’ Attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210928-161757/</link>
      <pubDate>Tue, 28 Sep 2021 16:17:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210928-161757/</guid>
      <description>Accused Atlanta-area spa shooter pleads not guilty to four counts of murder &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/accused-georgia-spa-shooter-face-judge-four-more-murder-charges-2021-09-28/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210928-161539/</link>
      <pubDate>Tue, 28 Sep 2021 16:15:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210928-161539/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/09/announcing-new-patch-reward-program-for.html&amp;#34;&amp;gt;Announcing New Patch Reward Program for Tsunami Security Scanner&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Guoli Ma, Sebastian Lekies &amp;amp;amp; Claudio Criscione, Google Vulnerability Management Team One year ago, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2020/06/tsunami-extensible-network-scanning.html&amp;#34;&amp;gt;published&amp;lt;/a&amp;gt; the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/tsunami-security-scanner&amp;#34;&amp;gt;Tsunami security scanner&amp;lt;/a&amp;gt; with the goal of detecting high severity, actively exploited vulnerabilities with high confidence. In the last several months, the Tsunami scanner team has been working closely with our vulnerability rewards program, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about&amp;#34;&amp;gt;Bug Hunters&amp;lt;/a&amp;gt; , to further improve Tsunami&amp;amp;#39;s security detection capabilities. Today, we are announcing a new experimental Patch Reward Program for the Tsunami project. Participants in the program will receive patch rewards for providing novel Tsunami detection plugins and web application fingerprints. We hope this program will allow us to quickly extend the detection capabilities of the scanner to better benefit our users and  uncover more vulnerabilities in their network infrastructure. For this launch, we will accept two types of contributions:&amp;lt;br&amp;gt;
Vulnerability detection plugins: In order to expand Tsunami scanner&amp;amp;#39;s detection capabilities, we encourage everyone who is interested in making contributions to this project to add new vulnerabilities detection plugins. All plugin contributions will be reviewed by our panel members in Google&amp;amp;#39;s Vulnerability Management team and the reward amount will be determined by the severity as well as the time sensitivity of the vulnerability.&amp;lt;br&amp;gt;
Web application fingerprints: Several months ago, we added new web application fingerprinting capabilities to Tsunami that detect popular off-the-shelf web applications. It achieves this goal by matching application fingerprints against a database of known web application fingerprints. More fingerprint data is needed for this approach to support more web applications. You will be rewarded with a flat amount for each application added to the database.&amp;lt;br&amp;gt;
As with other Security Reward Programs, rewards can be donated to charity—and we&amp;amp;#39;ll double your donation if you choose to do so. We&amp;amp;#39;ll run this program in iterations so that everyone interested has the opportunity to participate. To learn more about this program, please check out our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/about/rules/4928084514701312&amp;#34;&amp;gt;official rules and guidelines&amp;lt;/a&amp;gt; . And if you have any questions or suggestions for the program, feel free to contact us at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:tsunami-patch-rewards@google.com&amp;#34;&amp;gt;tsunami-patch-rewards@google.com&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>/var/blog | blogging data from aditya mukerjee</title>
      <link>https://www.whatsupup.com/blog/nuncle/haw/20210928-121339/</link>
      <pubDate>Tue, 28 Sep 2021 12:13:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nuncle/haw/20210928-121339/</guid>
      <description>&amp;lt;p&amp;gt;args : [&amp;amp;quot;-c&amp;amp;quot;, &amp;amp;quot;while true; do veneur-emit -hostport udp://localhost:8126 -name &amp;#39;my.test.timer&amp;#39; -timing &amp;#39;100ms&amp;#39;; sleep 10; done&amp;amp;quot;]&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;containerPort : 8126&amp;lt;br&amp;gt;
port : 8127&amp;lt;br&amp;gt;
value : &amp;amp;quot; 0.0.0.0:8127 &amp;amp;quot;&amp;lt;br&amp;gt;
value : &amp;amp;quot; http://veneur-global:8127 &amp;amp;quot;&amp;lt;br&amp;gt;
targetPort : 8126&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210928-121308/</link>
      <pubDate>Tue, 28 Sep 2021 12:13:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210928-121308/</guid>
      <description>My lovely wife and I have just moved house, and while boxing up the contents
of my desk I ran across physical paper copies of two weakly themed crosswords
I made in 2011. Might as well immortalize them in the digital realm…&amp;lt;br&amp;gt;
Field-testing P2266 “Simpler Implicit Move”&amp;lt;br&amp;gt;
A few months ago, Matheus Izvekov implemented my WG21 proposal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2021/p2266r1.html&amp;#34;&amp;gt;P2266 “Simpler Implicit Move”&amp;lt;/a&amp;gt; in Clang. As of Clang 13, it’s enabled by default under&amp;lt;br&amp;gt;
We’ve received some feedback from the field already (leading up to the Clang 13 release).
Here are the punch lines as far as I can recall. These examples will all appear in
P2266R2, whenever I get around to submitting it.&amp;lt;br&amp;gt;
;
see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the std::swap two-step?”&amp;lt;/a&amp;gt; (2020-07-11).
But look at all these wrong things you can try! …&amp;lt;br&amp;gt;
In my CppCon 2018 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=CXn02MPkn8Y&amp;#34;&amp;gt;“Concepts As She Is Spoke,”&amp;lt;/a&amp;gt; I presented some pitfalls in&amp;lt;br&amp;gt;
In Bjarne Stroustrup’s paper &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.stroustrup.com/good_concepts.pdf&amp;#34;&amp;gt;P0557R1 “Concepts: The Future of Generic Programming”&amp;lt;/a&amp;gt; (January 2017),
section 6 is titled “Concept Overloading,” which Stroustrup distinguishes from the
traditional approach “using helper functions and tag dispatch.”
More subtly, Stroustrup seems to distinguish between true “overloading” (asking the compiler
to resolve among multiple viable overloads) and other means of giving-two-things-the-same-name:&amp;lt;br&amp;gt;
A few weeks ago, I read René Daumal’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://archive.org/details/nightofseriousd000daum/&amp;#34;&amp;gt;A Night of Serious Drinking&amp;lt;/a&amp;gt; (published as La grande beuverie 1938; translated by David Coward and E.A. Lovatt 1979). I recommend it;
it’s a fun and erudite satire — sort of a less political Gulliver’s Travels or a less bitter &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Jurgen,_A_Comedy_of_Justice&amp;#34;&amp;gt;Jurgen&amp;lt;/a&amp;gt; . At times it made me think,
“This is clearly an allegory… but of what?” and at other times “Is he satirizing bad scientists, bad writers, bad artists? or all scientists, all writers, all artists?”&amp;lt;br&amp;gt;
C&#43;&#43; On Sea 2021 schedule announced&amp;lt;br&amp;gt;
The schedule for C&#43;&#43; on Sea 2021 has been announced! The “conference day”
involves two tracks of five talks each, plus a keynote by Barbara Geller
and Ansel Sermersheim.
The two “workshop days” offer… well, you should sign up for my own
two-day training class, at which point the other offerings are moot.
But, just for the record, the two available two-day classes are:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/05/19/after-you-no-after-you/&amp;#34;&amp;gt;“A metaprogramming puzzle: Overly interoperable libraries”&amp;lt;/a&amp;gt; (2021-05-19)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/05/22/after-you-part-two/&amp;#34;&amp;gt;“Overly interoperable libraries, part 2”&amp;lt;/a&amp;gt; (2021-05-22)&amp;lt;br&amp;gt;
I continue participating in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.meetup.com/theartofcomputerprogramming/&amp;#34;&amp;gt;Zartaj Majeed’s book club&amp;lt;/a&amp;gt; on Knuth’s The Art of Computer Programming , previously mentioned in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/12/13/bubblesort-rocksort-shakersort/&amp;#34;&amp;gt;“Bubblesort, rocksort, cocktail-shaker sort”&amp;lt;/a&amp;gt; (2020-12-13).
The past couple of weeks, we’ve been looking at section 5.2.3, “Sorting by selection,” in which the problem
of repeatedly selecting the max element leads Knuth to investigate priority queues.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20210928-082045/</link>
      <pubDate>Tue, 28 Sep 2021 08:20:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20210928-082045/</guid>
      <description>&amp;lt;p&amp;gt;415-436-9333 ext 175&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Section 230, a key law protecting free speech online since its passage in 1996, has been the subject of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/document/earn-it-act&amp;#34;&amp;gt;numerous&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2020/07/pact-act-not-solution-problem-harmful-online-content&amp;#34;&amp;gt;legislative&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2020/10/online-content-policy-modernization-act-unconstitutional-mess&amp;#34;&amp;gt;assaults&amp;lt;/a&amp;gt; over the past few years. The attacks have come from all sides. One of the latest, the SAFE Tech Act, seeks to address real problems...&amp;lt;br&amp;gt;
At noon on January 20, 2021, Joseph R. Biden, Jr. was sworn in as the 46th President of the United States, and he and his staff took over the business of running the country.The tradition of a peaceful transfer of power is as old as the United States itself. But...&amp;lt;br&amp;gt;
On March 15, 2020, Section 215 of the PATRIOT Act—a surveillance law &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2020/02/reform-or-expire&amp;#34;&amp;gt;with a rich history of government overreach and abuse&amp;lt;/a&amp;gt; —expired due to its sunset clause. Along with two other PATRIOT Act provisions, Section 215 lapsed after lawmakers failed to reach an agreement on a broader set of reforms...&amp;lt;br&amp;gt;
Recently, EFF joined the Center for Democracy and Technology (CDT) and 26 other organizations to send a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cdt.org/wp-content/uploads/2020/09/Civil-Society-Coalition-Letter-EARN-IT-Act-9.15.20.pdf&amp;#34;&amp;gt;letter&amp;lt;/a&amp;gt; to the Senate opposing the EARN IT Act (S. 3398), asking that the Senate oppose fast tracking the bill, and to vote NO on passage of the bill.As we have ...&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
On March 15, 2020, Section 215 of the PATRIOT Act—a surveillance law &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2020/02/reform-or-expire&amp;#34;&amp;gt;with a rich history of government overreach and abuse&amp;lt;/a&amp;gt; —expired. Along with two other PATRIOT Act provisions, Section 215 lapsed after lawmakers failed to reach an agreement on a broader set of reforms to the Foreign Intelligence Surveillance...&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20210928-082044/</link>
      <pubDate>Tue, 28 Sep 2021 08:20:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20210928-082044/</guid>
      <description>Recent attacks on encryption have diverged. On the one hand, we’ve seen Attorney General William Barr call for “lawful access” to encrypted communications, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Crypto_Wars&amp;#34;&amp;gt;using arguments that have barely changed since the 1990’s&amp;lt;/a&amp;gt; . But we’ve also seen &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/deeplinks/2019/09/carnegie-experts-should-know-defending-encryption-isnt-absolutist-position&amp;#34;&amp;gt;suggestions from a different set of actors for more purportedly “reasonable” interventions&amp;lt;/a&amp;gt; ,&amp;amp;hellip;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://certbot.eff.org/&amp;#34;&amp;gt;Certbot&amp;lt;/a&amp;gt; has a brand new website! Today we’ve launched a major update that will help Certbot’s users get started even more quickly and easily.Certbot is a free, open source software tool for enabling HTTPS on manually-administered websites, by automatically deploying Let’s Encrypt certificates. Since we introduced it in 2016,&amp;amp;hellip;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210928-081904/</link>
      <pubDate>Tue, 28 Sep 2021 08:19:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210928-081904/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133459_audi-grandsphere-concept-ev-rethinks-sedans-from-the-inside-out&amp;#34;&amp;gt;Audi Grandsphere concept EV rethinks sedans from the inside out&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; September 2, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; April 6, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129180_hyundai-creates-ioniq-ev-brand-crossover-sedan-and-suv-all-coming-by-2024&amp;#34;&amp;gt;Hyundai creates Ioniq EV brand: Crossover, sedan, and SUV all coming by 2024&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Audi Q4 E-Tron lineup will offer a choice between SUV and Sportback body styles when it goes on sale in 2021.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126828_cruise-origin-previews-a-future-that-takes-the-driver-out-of-electric-ride-hailing&amp;#34;&amp;gt;Cruise Origin previews a future that takes the driver out of electric ride hailing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; January 22, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126380_first-drive-review-2020-porsche-taycan-4s-drifts-into-a-thrilling-future&amp;#34;&amp;gt;First drive review: 2020 Porsche Taycan 4S drifts into a thrilling future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125406_first-drive-review-2020-audi-a8-plug-in-hybrid-reflects-new-priorities&amp;#34;&amp;gt;First drive review: 2020 Audi A8 plug-in hybrid reflects new priorities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124907_2020-porsche-taycan-electric-car-6-more-tech-tidbits&amp;#34;&amp;gt;2020 Porsche Taycan electric car: 6 more tech tidbits&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124888_2020-porsche-taycan-first-ride-review-high-voltage-power-line&amp;#34;&amp;gt;2020 Porsche Taycan first ride: High-voltage power line&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124634_2020-porsche-cayenne-turbo-s-e-hybrid-preview-drive&amp;#34;&amp;gt;Preview drive: 2020 Porsche Cayenne Turbo S E-Hybrid is a stealth fighter for the family&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123694_first-drive-review-2020-ford-explorer-st-dances-with-the-family-and-its-a-ball&amp;#34;&amp;gt;First drive review: 2020 Ford Explorer ST dances with the family, and it&amp;amp;#39;s a ball&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; June 20, 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1120361_2019-audi-e-tron-quattro-first-drive-review-a-new-normal-for-electric-luxury&amp;#34;&amp;gt;2019 Audi e-tron quattro first drive review: A new normal for electric luxury&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104662_4-features-in-the-2017-volvo-s90-v90-that-could-make-you-a-safer-driver&amp;#34;&amp;gt;4 features in the 2017 Volvo S90/V90 that could make you a safer driver&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Volvo’s all-new 2017 S90 sedan and upcoming 2018 V90 wagon, like the XC90 crossover introduced this past year, are packed with safety technology. If you’re familiar with Volvo’s reputation, that’s probably no surprise. Volvo has been at the forefront in occupant safety for...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104663_2018-volvo-v90-first-drive-review&amp;#34;&amp;gt;2018 Volvo V90 first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104437_2017-volvo-s90-first-drive-review&amp;#34;&amp;gt;2017 Volvo S90 first drive review&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; June 13, 2016&amp;lt;br&amp;gt;
With Volvo’s most recent products, including the 2017 Volvo S90 sedan and upcoming 2018 V90 wagon, the Swedish automaker is wholly embracing its Scandinavian roots.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103739_2016-bmw-x5-xdrive40e-first-drive-review&amp;#34;&amp;gt;2016 BMW X5 xDrive40e first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The 2016 BMW X5 xDrive40e—that’s the new plug-in hybrid version of the X5 sport-utility vehicle—is going to draw you in with its numbers: 0-60 mph in 6.5 seconds; 14 miles in all-electric mode; 24 mpg combined. The numbers add up to an alluring (and image-greening) idea: that you...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103579_2016-bmw-x1-first-drive-review&amp;#34;&amp;gt;2016 BMW X1 first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The new 2016 BMW X1 is, for the most part, a very good car. Yet there’s a big asterisk to this: It just doesn’t feel much like a BMW. In this age when executives and product planners wax poetic about preserving the “brand DNA”—seemingly to no end—this feels like...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103484_2017-mercedes-benz-slc-first-drive-review&amp;#34;&amp;gt;2017 Mercedes-Benz SLC first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Roadsters like the 2017 Mercedes-Benz SLC aren’t exactly in vogue right now. The Honda S2000 faded away a few years ago. BMW Z4 sales have fizzled to levels far below those of the more expensive 6-Series Convertible. Porsche’s pushed the Boxster upmarket. And the only bright spot on the...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103369_2017-mercedes-benz-s-class-cabriolet-first-drive-review&amp;#34;&amp;gt;2017 Mercedes-Benz S-Class Cabriolet first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Talk up the feel of the wind in your hair and the natural high of sunshine as you will; but in the world of convertibles, there are those that cruise the scene, and there are those that help make the scene. The 2017 S-Class Cabriolet lineup is without question in the latter group. It’s a true...&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210928-081903/</link>
      <pubDate>Tue, 28 Sep 2021 08:19:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210928-081903/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;Why Podcasts Are My New Wikipedia —the  Perfect Informal Learning Resource Sept. 9, 2021 · In this article, I explain why podcasts replaced a lot of my Wikipedia usage for informal learning. I also talk about how I listen to five-plus hours of podcasts every day! Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-evaluate-a-3rd-party-restful-api-47/&amp;#34;&amp;gt;How to evaluate a 3rd party RESTful API? March 2, 2021 · 1, To build or to buy? 2, Can this API provide features you need? 3, Is this API stable and scalable? 4, How easy can you talk to a real human employee of this API vendor? Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-i-accidentally-built-a-podcast-api-business-46/&amp;#34;&amp;gt;How I accidentally built a Podcast API business Dec. 6, 2020 · In this article, I’ll share with you the journey of building this API business, the technology behind it, and hopefully you can learn one thing or two and build your own API business in the future. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/what-is-listen-notes-why-does-listen-notes-need-45/&amp;#34;&amp;gt;What is Listen Notes? Why does Listen Notes need to make money? Oct. 2, 2020 · Essentially, Listen Notes is an independent podcast database that has three UIs (User Interface) to access the data. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/numbers-of-tech-companies-when-they-were-small-42/&amp;#34;&amp;gt;Numbers of tech companies when they were small May 8, 2020 · This is a blog post that I wish it existed when I started my startup journey. I like collecting numbers (e.g., website traffic, domain name price, revenue…) of tech companies when they were small. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-for-chrome-28/&amp;#34;&amp;gt;Listen Notes for Chrome Dec. 1, 2019 · We just launched a Chrome extension! You can search podcasts / episodes right from your Chrome browser without opening ListenNotes.com. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/introducing-llamacorn-33/&amp;#34;&amp;gt;Introducing Llamacorn!!! Sept. 21, 2019 · I went to Peru last month and saw Llama… After I came back, I decided to make Llama the mascot of Listen Notes. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/some-api-improvements-34/&amp;#34;&amp;gt;Some API improvements May 20, 2019 · Better documentation. Better performance. Bigger thumbnail images. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-submit-a-new-podcast-to-listen-notes-38/&amp;#34;&amp;gt;How to submit a new podcast to Listen Notes database April 9, 2019 · If you are a podcaster or you are a podcast hosting service, you may want to submit new podcasts to Listen Notes database. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-api-v2-simple-pricing-same-endpoints-39/&amp;#34;&amp;gt;Listen API v2: simple pricing &amp;amp;amp; same endpoints March 27, 2019 · We just launched a new(-ish) version of Listen API. We call it “Listen API v2”. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/good-enough-engineering-to-start-an-internet-27/&amp;#34;&amp;gt;Good enough engineering to start an Internet company March 11, 2019 · I gave a guest lecture in an undergraduate software engineering class (CSCE431) at Texas A&amp;amp;amp;M University a few days ago. Now I’ve turned this lecture into a blog post here, and hopefully some people on the Internet will find this useful. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-explorer-get-similar-podcasts-40/&amp;#34;&amp;gt;Listen Explorer: Get similar podcasts Jan. 22, 2019 · The idea is simple: You pick a few podcasts, and you’ll get recommendations for similar podcasts. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-real-time-like-google-analytics-real-time-37/&amp;#34;&amp;gt;Listen Real-Time: Like Google Analytics Real-Time, but for podcast episodes Dec. 30, 2018 · Everyone’s saying “podcast discovery is broken”. Okay, here’s another way to discover podcasts — Check out what other people are listening to right now. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/just-listentm-a-simple-podcast-app-for-the-99-36/&amp;#34;&amp;gt;Just Listen™: A simple podcast app for the 99% Dec. 20, 2018 · A very simple &amp;amp;amp; very opinionated podcast app from Listen Notes: Just Listen™!! Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-import-opml-to-a-podcast-app-on-ios-android-35/&amp;#34;&amp;gt;How to import OPML to a podcast app on iOS / Android? Sept. 14, 2018 · An OPML file allows you to transfer your podcast subscriptions between podcast apps without manually subscribing to each podcast. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-a-standalone-podcast-search-engine-website-32/&amp;#34;&amp;gt;Why a standalone podcast search engine website? June 29, 2018 · Why Listen Notes is a podcast search engine website? Not an app? Not a podcast player? Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-listen-notes-doesnt-allow-users-to-review-31/&amp;#34;&amp;gt;Why Listen Notes doesn’t allow users to review podcasts? May 14, 2018 · There are ideas that sound wonderful, on paper. Allowing users to review podcasts is such an idea. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/postmortem-on-apr-22-2018-outage-30/&amp;#34;&amp;gt;Postmortem on Apr 22, 2018 outage April 26, 2018 · On Apr 22, 2018, Listen Notes website was down for ~4 hours and I lost 10 hours production data. This is the biggest outage since I launched Listen Notes as a side project last year. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/the-boring-technology-behind-a-one-person-23/&amp;#34;&amp;gt;The boring technology behind a one-person Internet company Jan. 24, 2018 · The tech stack of Listen Notes, the best podcast search engine and database. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/my-y-combinator-interview-experience-w18-22/&amp;#34;&amp;gt;My Y Combinator interview experience (W18) Jan. 12, 2018 · I want to be transparent on the process of building Listen Notes, as a product and as a company. If eventually I declare failure of this startup thing, these written documents may still benefit people who come from Google search :) Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-later-tm-is-like-instapaper-or-pocket-but-29/&amp;#34;&amp;gt;Listen Later ™ is like Instapaper or Pocket, but for podcasts! Dec. 19, 2017 · I just built a simple feature, called Listen Later. You can tell what it is from the name :) Yes, it’s like “Watch Later” on YouTube or “Read Later” on Pocket. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-do-people-use-listen-notes-26/&amp;#34;&amp;gt;How do people use Listen Notes? Nov. 12, 2017 · I’ve got a bunch of emails from Listen Notes users. Now I have a better understanding what people use Listen Notes for. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/migrating-listen-notes-servers-to-aws-25/&amp;#34;&amp;gt;Migrating Listen Notes servers to AWS Oct. 28, 2017 · Well, Listen Notes was a side project of mine. I run all my side projects on Digital Ocean, because it’s cheap &amp;amp;amp; convenient to set up. I decided to migrate the whole backend infrastructure to AWS. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/podcast-in-2017-is-just-like-web-in-1997-24/&amp;#34;&amp;gt;Podcast in 2017 is just like Web in 1997 Oct. 9, 2017 · Podcast in 2017 &amp;amp;amp; web in 1997 are similar in three aspects: number of users, ad spendings, and contents. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/how-to-use-listen-notes-from-chrome-address-bar-21/&amp;#34;&amp;gt;How to use Listen Notes from Chrome address bar? Oct. 3, 2017 · Click “Add” in the “Other search engines” section. Fill these three things. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/listen-notes-20-laying-the-foundation-of-future-20/&amp;#34;&amp;gt;Listen Notes 2.0: laying the foundation of future fast iteration Sept. 27, 2017 · Last week was the first time that I got a chance to work on my projects full-time. It was a very productive week. So, here comes Listen Notes 2.0. Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/whats-next-for-listen-notes-19/&amp;#34;&amp;gt;What’s next for Listen Notes? Sept. 20, 2017 · The very first official Listen Notes blog post! We used to have a mini-roadmap :) Read more...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>leah blogs</title>
      <link>https://www.whatsupup.com/blog/lienholder/alcoholism/20210928-081851/</link>
      <pubDate>Tue, 28 Sep 2021 08:18:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lienholder/alcoholism/20210928-081851/</guid>
      <description>&amp;lt;p&amp;gt;2004 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/03.html&amp;#34;&amp;gt;03&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/04.html&amp;#34;&amp;gt;04&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/05.html&amp;#34;&amp;gt;05&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/06.html&amp;#34;&amp;gt;06&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/07.html&amp;#34;&amp;gt;07&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/09.html&amp;#34;&amp;gt;09&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/10.html&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/11.html&amp;#34;&amp;gt;11&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2004/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2005 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/01.html&amp;#34;&amp;gt;01&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/03.html&amp;#34;&amp;gt;03&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/04.html&amp;#34;&amp;gt;04&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/05.html&amp;#34;&amp;gt;05&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/06.html&amp;#34;&amp;gt;06&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/07.html&amp;#34;&amp;gt;07&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/09.html&amp;#34;&amp;gt;09&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/10.html&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/11.html&amp;#34;&amp;gt;11&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2005/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2008 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/01.html&amp;#34;&amp;gt;01&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/03.html&amp;#34;&amp;gt;03&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/04.html&amp;#34;&amp;gt;04&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/05.html&amp;#34;&amp;gt;05&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/06.html&amp;#34;&amp;gt;06&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/07.html&amp;#34;&amp;gt;07&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/09.html&amp;#34;&amp;gt;09&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/11.html&amp;#34;&amp;gt;11&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2008/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2009 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/01.html&amp;#34;&amp;gt;01&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/03.html&amp;#34;&amp;gt;03&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/04.html&amp;#34;&amp;gt;04&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/05.html&amp;#34;&amp;gt;05&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/07.html&amp;#34;&amp;gt;07&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/09.html&amp;#34;&amp;gt;09&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2009/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2010 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/03.html&amp;#34;&amp;gt;03&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/09.html&amp;#34;&amp;gt;09&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/10.html&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/11.html&amp;#34;&amp;gt;11&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2010/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2011 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2011/01.html&amp;#34;&amp;gt;01&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2011/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2011/04.html&amp;#34;&amp;gt;04&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2011/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2012 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2012/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2012/08.html&amp;#34;&amp;gt;08&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2012/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2015 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2015/02.html&amp;#34;&amp;gt;02&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2015/12.html&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2021 / &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://leahneukirchen.org/archive/2021/01.html&amp;#34;&amp;gt;01&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
20jan2021 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Unfortunately, most of these things are on websites taken down already,
so this post will refer to pages on the Internet Archive extensively.
[Update 2020-01-16: His son Joe Tilbrook sent me a mail stating that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://qef.com/&amp;#34;&amp;gt;http://qef.com/&amp;lt;/a&amp;gt; is up again.]&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Around 2016, I swooped a copy of Caltech qed from USENIX tape 80.1
and tried making it work on modern platforms, with moderate success.
Thanks to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://inbox.vuxu.org/tuhs/201810070607.w9767Xrl014901@freefriends.org/&amp;#34;&amp;gt;efforts by Arnold Robbins&amp;lt;/a&amp;gt; there is now an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/arnoldrobbins/qed-archive&amp;#34;&amp;gt;QED Archive&amp;lt;/a&amp;gt; which also features a copy of 1992 QED from Toronto,
which contains contributions by
Tom Duff, Robert Pike, Hugh Redelmeier and David Tilbrook.
If you want to run it yourself, there is a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/phonologus/QED&amp;#34;&amp;gt;modernized, UTF-8 aware
version&amp;lt;/a&amp;gt; available now!&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
David’s opus magnum was a suite of tools called QEF, quod erat faciendum .
Euclid wrote this at the end of geometric constructions, and in a
software sense, we want a build system to produce what was to be made .
At its time of creation, David was responsible for maintaining
a (for the time) large system, essentially a Unix distribution.
Tooling was stuck in the era of 1977’s make(1).
For the details and basic ideas, see
Tilbrook and Place (1986), &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://grosskurth.ca/bib/1986/tilbrook.html&amp;#34;&amp;gt;“Tools for the Maintenance and Installation of a Large
Software Distribution”&amp;lt;/a&amp;gt; (Huge thanks to Alan Grosskurth for making a copy available.)
My favorite footnote is the one about their Prolog prototype of a build system:
“Is the cray free? I need to reinstall /bin/true!”&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/19990418032541/http://www.iptweb.com/tools/stdprod/qef/qefwhite.html&amp;#34;&amp;gt;QEF whitepaper&amp;lt;/a&amp;gt; from 1996 explains the system at a more developed state.&amp;lt;br&amp;gt;
What is intriguing is that the whole toolkit is created in classic
Unix manner from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20120213160026/http://www.qef.com/html/toolsdesc.html&amp;#34;&amp;gt;small tools&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20080511194411/http://www.qef.com/sixlangs/sixlangs.html&amp;#34;&amp;gt;little languages&amp;lt;/a&amp;gt; .
I acquired an evaluation copy of QEF in 2015, but sadly
it had no copy of QED included.  However, I could
read the full manpages for many of his tools.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
case the same way, but modulo 5.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
24dec2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
— Bo-hohoho-ne (@theonebean) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/theonebean/status/1340663494304215040?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;December 20, 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
23oct2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I was mostly familiar with the Incompatible Timesharing System (ITS)
of MIT (written for a PDP-6, later on a PDP-10), due to its leakage
of concepts and culture into Lisp Machines and the GNU project.
And of course, Berkeley is known for developments around Unix in the late
seventies which then turned into BSD.  However, I had only remotely heard of
WAITS, the operating system used at the Stanford Artificial
Intelligence Laboratory, which first ran on a PDP-6, and later on a PDP-10.
Initial development was a based on the standard DEC monitor (“kernel”).
[2020-10-26: Rich Anderson points out that it was not based on TOPS-10,
but rather a spinoff.]&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I think the record-oriented file system of WAITS was actually key to
support editing big files in this environment.  Other systems at the
time did not support this as well: Unix ed loaded the whole file into
memory [2020-10-25: as Eric Fisher points out, ed uses a temporary file
to keep blocks if the buffer reaches a certain size]
and wrote it out again, and Unix consists of many small files not
larger than 1000 lines.  On ITS, the only bigger files I could find
were assembled from other inputs, or mail archives which were only
read or appended to, but not modified inside.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
c062c7589&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
01jun2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
11may2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I have been using Emacs since 2001, any only really learned Vim in
2007.  Of course, I did quick admin edit tasks with it before, but in
2007 I had a small job where I had to develop on machines across the
ocean, with only&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
didn’t exist yet), efficient use of Vim was essential.  After the
summer of 2007, I was fairly familiar with Vim.  I still use Emacs for
my main editing and programming tasks, but on remote machines and for
small edit tasks I primarily use Vim.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
For quite some time—as my research will show, March 2016—, I have
been annoyed by a directory named&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
runit,1
  `-sh,30996 -c urxvt
      `-urxvt,30997
          `-zsh,30998
              `-zsh,31055
                  `-mkdir,31058 /home/leah/bin/mkdir --help
                      `-pstree,31060 -sap 31058&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
.  I added it in 2013.  Even before I added
the&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
flag in 2016.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
26apr2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I wondered if a Forth with fewer than these 5 words can still be
complete, and a bit of research turned up &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/larsbrinkhoff/forth-documents/blob/master/V%C3%A4gen%20mot%20en%20minimal%20Forth%20arkitektur.pdf&amp;#34;&amp;gt;a paper by Mikael
Patel&amp;lt;/a&amp;gt; from 1990.
It’s written in Swedish, but we can figure out the essentials from
page 4:&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
# du --apparent-size -shc /opt/texlive/20*
4.9G    /opt/texlive/2017
5.5G    /opt/texlive/2018
6.2G    /opt/texlive/2019
6.2G    /opt/texlive/2020&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
6.6G    /opt/texlive/2020&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
4.2G    /opt/texlive/2017
4.7G    /opt/texlive/2018
5.3G    /opt/texlive/2019
5.3G    /opt/texlive/2020
20G     total&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
# jdupes -r -m /opt/texlive/20*
Scanning: 729045 files, 53145 items (in 4 specified)
467364 duplicate files (in 208444 sets), occupying 13469 MB&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
# du -shc /opt/texlive/20{20..17}
5.2G    /opt/texlive/2020
672M    /opt/texlive/2019
1.5G    /opt/texlive/2018
1.1G    /opt/texlive/2017
8.4G    total&amp;lt;br&amp;gt;
So you can keep around TeX Live 2019 at the cost of 12% it’s original size,
and even older versions for less than 25%.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
18mar2020 ·&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Last Sunday, we had local elections in Bavaria, and somehow I got
nerd-sniped into looking at the proportional representation method
that is being used now as of 2020, which is the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Webster/Sainte-Lagu%C3%AB_method&amp;#34;&amp;gt;Sainte-Laguë
method&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
v: 10400 3400 6200
 s: 15&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
v % 0.5
20800 6800 12400f
 v % 1.5
6933.333 2266.667 4133.333
&amp;lt;p&amp;gt;(v%)&amp;#39;.5&#43;!s
20800    6800     12400
6933.333 2266.667 4133.333
4160     1360     2480
2971.429 971.4286 1771.429
2311.111 755.5556 1377.778
1890.909 618.1818 1127.273
1600     523.0769 953.8462
1386.667 453.3333 826.6667
1223.529 400      729.4118
&amp;amp;hellip;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
,/r
20800 6800 12400 6933.333 2266.667 4133.333 4160 1360 2480 2971.429 ...&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
^,/r
234.4828 251.8519 272 295.6522 323.8095 357.8947 400 427.5862 453.3333 ...&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
|^,/r
20800 12400 6933.333 6800 4160 4133.333 2971.429 2480 2311.111 2266.667 ...&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
s#|^,/r
20800 12400 6933.333 6800 4160 4133.333 2971.429 2480 2311.111 2266.667 1890.909 1771.429 1600 1386.667 1377.778&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
x:681
 v%x
7.63583 2.496329 4.552129&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
v: 9983378 11756412 1007445 1559070 8878524 1419438 1597499 1318396 395847 273557 86275 142051 339665 247453 528617 732056 120877
 s: 80
 &#43;/s&amp;amp;gt;(#v)^&amp;amp;lt;&amp;amp;gt;,/(v%)&amp;amp;#39;.5&#43;!s
20 23 2 3 18 3 3 3 1 1 0 0 1 0 1 1 0&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
For funsies (and because I’m pretty bored), we can contrast the new
election algorithm with the previous ones.
At the 2014 election, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Largest_remainder_method&amp;#34;&amp;gt;Hare/Niemeyer method&amp;lt;/a&amp;gt; was used.  Here’s the code, perhaps you can figure it out:&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
This yields the same result as Sainte-Laguë for this election.
There is still a significant difference between these methods:
if we compute how many more votes mut would have needed to get a seat,
it’s 6220 additional votes with Sainte-Laguë, but 26105 with
Hare/Niemeyer!&amp;lt;br&amp;gt;
Until 2010, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/D%27Hondt_method&amp;#34;&amp;gt;d’Hondt method&amp;lt;/a&amp;gt; was used.  Here, we just have to tweak the&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Copyright © 2004–2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:leah@vuxu.org&amp;#34;&amp;gt;Leah Neukirchen&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Chris Zacharias</title>
      <link>https://www.whatsupup.com/blog/gigabit/polenta/20210928-081836/</link>
      <pubDate>Tue, 28 Sep 2021 08:18:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gigabit/polenta/20210928-081836/</guid>
      <description>&amp;lt;p&amp;gt;May  1, 2019&amp;lt;br&amp;gt;
Feb  8, 2016&amp;lt;br&amp;gt;
Aug 26, 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/multiplane-camera&amp;#34;&amp;gt;During a recent trip to the Disney Museum in San Francisco, I became immediately fascinated by the multiplane camera that was on display there. The gigantic machine represents so much of what I find inspiring in graphics and technology. It is fun to get lost in thought, imagining what the modern equivalent of the multiplane camera might be and how to foster the intersection of art and technology from which the multiplane camera emerged. The multiplane camera was invented in 1933 by famous Disney animator/director Ub Iwerks. It worked by enabling animators to position their layers of acetate animation cels at varying distances and offsets in a vertical column. They could then shoot a camera downward to compose the cels into a single frame. While animators had been using acetate celluloid frames composited over painted mattes for decades prior, the technical effects that the multiplane&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Dec 21, 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;When I was going through YCombinator in the summer of 2011, I felt like I was the only person in the entire class who knew nothing about taking investment. I remember distinctly when Jessica Livingston announced the $150K we would be getting from SV Angel and Start Fund. When she told us the terms, the room erupted in shouting and applause. I sat there Googling nervously, trying to understand what had just been said and wondering if I really belonged in YC at all. Being surrounded by such a select group of founders, each in varying stages of building their companies, you pick up the knowledge you need very quickly. This is the most valuable part of the 3-month YCombinator session. One piece of knowledge you learn very early on is that investors tend to have a herd mentality. What I would later realize through observation was that founders tend to as well. I remember getting the...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/cruise-ships&amp;#34;&amp;gt;In July of 2010, I made the decision to leave YouTube. The first thoughts I had were “How am I going to explain this to anyone? How will I tell mom?” To my family, I had the greatest job in the world and the amount of money I was making was unfathomable. They were certainly not wrong in thinking this. Google is absolutely the best place in the world to work and they do pay very well. It certainly was not an easy decision on my part. About 4 months before, I was backpacking through Europe, stopping off in major cities to present our latest HTML5 work at the local Google offices. It was my first time really exploring a different part of the world. I met fascinating people and experienced many random adventures. I was trapped in Stockholm for 9 days due to the Icelandic ash cloud. I was a successful stowaway on a train from Copenhagen to Hamburg. I had a girlfriend break up with me during...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210928-081831/</link>
      <pubDate>Tue, 28 Sep 2021 08:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210928-081831/</guid>
      <description>Posted on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/&amp;#34;&amp;gt;September 23, 2021&amp;lt;/a&amp;gt; by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/author/byorgey/&amp;#34;&amp;gt;Brent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The first insight is that we can transform this into the classic problem of finding the maximum sum subarray (also known as the maximum segment sum ; either way I will abbreviate it as MSS) in two steps: first, turn each red cell into a 1, and each blue into -1. The sum of a segment then tells us how many more red than blue cells there are. Now, we actually want the biggest absolute difference between red and blue; but if we have an algorithm to find the MSS we can just run it twice: once to find the maximum excess of red over blue, and again with 1 and -1 flipped to find the maximum excess of blue over red.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Maximum_subarray_problem#Kadane&amp;#39;s_algorithm&amp;#34;&amp;gt;Kadane’s algorithm&amp;lt;/a&amp;gt; , first proposed by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.stat.cmu.edu/~kadane/&amp;#34;&amp;gt;Jay Kadane&amp;lt;/a&amp;gt; sometime in the late 1970s, is a linear-time algorithm for solving the MSS problem. It is actually quite simple to implement (the tricky part is understanding why it works!).&amp;lt;br&amp;gt;
was first published in 2007!)&amp;lt;br&amp;gt;
HM&amp;amp;gt; 2 &#43; 3
2 &#43; 3 : nat
5
HM&amp;amp;gt; \x. x
\x. x : forall a0. a0 -&amp;amp;gt; a0
HM&amp;amp;gt; \x.3
\x. 3 : forall a0. a0 -&amp;amp;gt; nat
HM&amp;amp;gt; \x. x &#43; 1
\x. x &#43; 1 : nat -&amp;amp;gt; nat
HM&amp;amp;gt; (\x. 3) (\y.y)
(\x. 3) (\y. y) : nat
3
HM&amp;amp;gt; \x. y
Unbound variable y
HM&amp;amp;gt; \x. x x
Infinite type u0 = u0 -&amp;amp;gt; u1
HM&amp;amp;gt; 3 3
Can&amp;#39;t unify nat and nat -&amp;amp;gt; u0
HM&amp;amp;gt; let foo : forall a. a -&amp;amp;gt; a = \x.3 in foo 5
Can&amp;#39;t unify s0 and nat
HM&amp;amp;gt; \f.\g.\x. f (g x)
\f. \g. \x. f (g x) : forall a2 a3 a4. (a3 -&amp;amp;gt; a4) -&amp;amp;gt; (a2 -&amp;amp;gt; a3) -&amp;amp;gt; a2 -&amp;amp;gt; a4
HM&amp;amp;gt; let f : forall a. a -&amp;amp;gt; a = \x.x in let y : forall b. b -&amp;amp;gt; b -&amp;amp;gt; b = \z.\q. f z in y 2 3
let f : forall a. a -&amp;amp;gt; a = \x. x in let y : forall b. b -&amp;amp;gt; b -&amp;amp;gt; b = \z. \q. f z in y 2 3 : nat
2
HM&amp;amp;gt; \y. let x : forall a. a -&amp;amp;gt; a = y in x 3
\y. let x : forall a. a -&amp;amp;gt; a = y in x 3 : forall s1. (s1 -&amp;amp;gt; s1) -&amp;amp;gt; nat
HM&amp;amp;gt; (\x. let y = x in y) (\z. \q. z)
(\x. let y = x in y) (\z. \q. z) : forall a1 a2. a1 -&amp;amp;gt; a2 -&amp;amp;gt; a1&amp;lt;br&amp;gt;
). Each such person represents a potential time save of 5 minutes, all of which will be realized once the groups are all consecutive. Hence all we have to do is sum these numbers and multiply by 5. It is instructive thinking about why this works. It does not compute the actual time saved by each group, just the potential time save represented by each group. That potential time save might be realized by the group itself (if the last person in the group gets to move up) or by a different group (if someone in the group lets others go ahead of them). Ultimately, though, it does not matter how much time is saved by each group, only the total amount of time saved.&amp;lt;br&amp;gt;
inSquare ( V2 x y ) = 0 &amp;amp;lt; x &amp;amp;amp;&amp;amp;amp; x &amp;amp;lt; 1000 &amp;amp;amp;&amp;amp;amp; 0 &amp;amp;lt; y &amp;amp;amp;&amp;amp;amp; y &amp;amp;lt; 1000&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/&amp;#34;&amp;gt;September 2021&amp;lt;/a&amp;gt; (5)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210928-081759/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210928-081759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/22/technology/facebook-cto-step-down-mike-schroepfer.html&amp;#34;&amp;gt;Facebook’s Chief Technology Officer to Step Down in 2022 Mike Schroepfer, who leads the company’s artificial intelligence and other technical efforts, said he planned to transition into a role as a senior fellow. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Sept. 22, 2021&amp;lt;br&amp;gt;
Aug. 31, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Sahil Lavingia</title>
      <link>https://www.whatsupup.com/blog/barbecuing/persuadably/20210928-081731/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/barbecuing/persuadably/20210928-081731/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sahillavingia.com/work&amp;#34;&amp;gt;No Meetings, No Deadlines, No Full-Time Employees&amp;lt;/a&amp;gt; 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sahillavingia.com/reflecting&amp;#34;&amp;gt;Reflecting on My Failure to Build a Billion-Dollar Company&amp;lt;/a&amp;gt; 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sahillavingia.com/bubble&amp;#34;&amp;gt;From Bubble to Bubble&amp;lt;/a&amp;gt; 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sahillavingia.com/border&amp;#34;&amp;gt;Across the Border&amp;lt;/a&amp;gt; Sci-fi, 2018&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210928-081719/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210928-081719/</guid>
      <description>September 8, 2021&amp;lt;br&amp;gt;
As we’re all aware by now, we made some big platform changes at the end of 2020. Whilst the big move has happened, it’s given us a great opportunity to clear out the cupboards and closets.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210928-081719/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210928-081719/</guid>
      <description>September 27, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/27/Let-distros-do-their-job.html&amp;#34;&amp;gt;Developers: Let distros do their job&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 23, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/23/Nitter-and-other-internet-reclamation-projects.html&amp;#34;&amp;gt;Nitter and other Internet reclamation projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 16, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/09/16/Mark-Rober-and-capitalist-manipulation.gmi&amp;#34;&amp;gt;Mark Rober and the manipulation of children for profit&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
September 15, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/15/Status-update-September-2021.html&amp;#34;&amp;gt;Status update, September 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 11, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/11/visurf-announcement.html&amp;#34;&amp;gt;visurf, a web browser based on NetSurf&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 11, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/11/Debugging-your-new-PL.html&amp;#34;&amp;gt;Tips for debugging your new programming language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 10, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/10/Apple-CSAM-scanning.html&amp;#34;&amp;gt;Police to begin regular, warrant-free searches of homes for child abuse material&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 6, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/06/goproxy-breaks-go.html&amp;#34;&amp;gt;proxy.golang.org allows many Go packages to be silently broken&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/05/In-praise-of-Postgres.html&amp;#34;&amp;gt;In praise of PostgreSQL&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 28, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/28/The-next-YAML.html&amp;#34;&amp;gt;My wish-list for the next YAML&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 21, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/07/21/Demon-Slayer-review.gmi&amp;#34;&amp;gt;Demon Slayer: The Movie: Mugen Train review&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
July 4, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/04/Is-GitHub-a-derivative-work.html&amp;#34;&amp;gt;Is GitHub a derivative work of GPL&amp;#39;d software?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 3, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/03/How-does-IRC-federate.html&amp;#34;&amp;gt;How does IRC&amp;#39;s federation model compare to ActivityPub?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 27, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/27/You-cant-capture-the-nuance.html&amp;#34;&amp;gt;You can&amp;#39;t capture the nuance of my form fields&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/24/finger-client.html&amp;#34;&amp;gt;A finger client&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 14, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/14/Provided-as-is-without-warranty.html&amp;#34;&amp;gt;Provided &amp;amp;quot;as is&amp;amp;quot;, without warranty of any kind&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 7, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/07/The-Netherlands.html&amp;#34;&amp;gt;I will be moving to the Netherlands&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 30, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/30/Come-build-your-project.html&amp;#34;&amp;gt;Build your project in our new language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/24/io_uring-finger-server.html&amp;#34;&amp;gt;Using io_uring to make a high-performance&amp;amp;hellip; finger server&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 20, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/05/20/How-I-choose-a-license.gmi&amp;#34;&amp;gt;How I choose a license&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
May 19, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/19/How-to-write-release-notes.html&amp;#34;&amp;gt;How to write release notes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 17, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/17/aerc-with-mbsync-postfix.html&amp;#34;&amp;gt;aerc, mbsync, and postfix for maximum comfy offline email&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 14, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/14/Pinebook-Pro-review.html&amp;#34;&amp;gt;Pinebook Pro review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 8, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/08/Try-not-to-make-unlikable-software.html&amp;#34;&amp;gt;I try not to make unlikable software (and features)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 7, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/07/godocs.io-six-months-later.html&amp;#34;&amp;gt;godocs.io six months later&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 6, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/05/06/Praise-for-Alpine-Linux.gmi&amp;#34;&amp;gt;Praise for Alpine Linux&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
May 3, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/05/03/awk-is-the-coolest-tool-you-dont-know.gmi&amp;#34;&amp;gt;awk is the coolest tool you don&amp;#39;t know&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
April 26, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/26/Cryptocurrency-is-a-disaster.html&amp;#34;&amp;gt;Cryptocurrency is an abject disaster&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 23, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/23/Lichess.html&amp;#34;&amp;gt;Recommended read: Why Lichess will always be free&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 22, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/22/Our-self-hosted-parser-design.html&amp;#34;&amp;gt;Parsers all the way down: writing a self-hosting parser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 12, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/12/DCO.html&amp;#34;&amp;gt;The Developer Certificate of Origin is a great alternative to a CLA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 7, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/07/The-next-chat-app.html&amp;#34;&amp;gt;What should the next chat app look like?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 2, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/04/02/Go-is-a-great-language.html&amp;#34;&amp;gt;Go is a great programming language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 29, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/03/29/The-worlds-dumbest-IRC-bot.html&amp;#34;&amp;gt;The world&amp;#39;s stupidest IRC bot&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 23, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/03/23/Open-sourcing-video-games.html&amp;#34;&amp;gt;The complete guide for open sourcing video games&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 19, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/03/19/A-new-systems-language.html&amp;#34;&amp;gt;We are building a new systems programming language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 17, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/03/17/Anime-recommendation-gatari.gmi&amp;#34;&amp;gt;Anime recommendation: *Monogatari&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
March 6, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/03/06/Corporate-surveillance-murder.html&amp;#34;&amp;gt;The corporate surveillance machine is killing people&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/03/05/Gemreader.gmi&amp;#34;&amp;gt;Gemreader, a feed reader for Geminispace&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
March 3, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/03/03/To-make-money-in-FOSS-build-a-business.html&amp;#34;&amp;gt;To make money in FOSS, build a business first&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 1, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/03/01/Celeste.gmi&amp;#34;&amp;gt;Celeste&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
February 25, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/02/25/Gmail-is-a-huge-source-of-spam.html&amp;#34;&amp;gt;Gmail is a huge source of spam&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 21, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/02/21/On-the-traits-of-good-replacements.html&amp;#34;&amp;gt;A great alternative is rarely fatter than what it aims to replace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 20, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/02/20/Free-gemini-hosting.gmi&amp;#34;&amp;gt;Free gemini hosting on sourcehut&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
February 9, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/02/09/How-to-make-your-downstreams-happy.html&amp;#34;&amp;gt;How to make your downstream users happy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 28, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/28/Use-open-platforms-or-else.html&amp;#34;&amp;gt;Use open platforms — or else&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 20, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/20/FOSS-is-to-surrender-your-monopoly.html&amp;#34;&amp;gt;Open source means surrendering your monopoly over commercial exploitation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 19, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/19/Elasticsearch-does-not-belong-to-Elastic.html&amp;#34;&amp;gt;Elasticsearch does not belong to Elastic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 19, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/19/Spooky-code-at-a-distance.html&amp;#34;&amp;gt;Spooky action at a distance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 7, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/07/History-will-not-remember-us-fondly.html&amp;#34;&amp;gt;History will not remember us fondly&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 6, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/06/Invented-or-discovered.html&amp;#34;&amp;gt;Was $X invented, or discovered?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 4, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/04/A-culture-of-stability-and-reliability.html&amp;#34;&amp;gt;Fostering a culture that values stability and reliability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 2, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/01/02/2021-01-02-Every-commit-should-be-perfect.gmi&amp;#34;&amp;gt;Every commit should be a perfect, atomic unit of change&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
January 1, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/01/01/Megacorps-are-not-your-dream-job.html&amp;#34;&amp;gt;A megacorp is not your dream job&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 25, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/12/25/H0-H0-H0.gmi&amp;#34;&amp;gt;H0 H0 H0&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
December 25, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/12/25/How-to-design-a-new-programming-language.html&amp;#34;&amp;gt;How to design a new programming language from scratch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 18, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/12/18/godocs.io.html&amp;#34;&amp;gt;godocs.io is now available&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 12, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/12/12/Shell-literacy.html&amp;#34;&amp;gt;Become shell literate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 4, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/12/04/Analytics-and-informed-consent.html&amp;#34;&amp;gt;Web analytics should at least meet the standards of informed consent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 29, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/11/29/skytree.gmi&amp;#34;&amp;gt;俺のスカイツリー旅行&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
November 20, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/11/20/A-few-ways-to-make-money-in-FOSS.html&amp;#34;&amp;gt;A few ways to make money in FOSS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 17, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/11/17/Better-than-DuckDuckGo.html&amp;#34;&amp;gt;We can do better than DuckDuckGo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 12, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/11/12/Copying-aint-stealing.gmi&amp;#34;&amp;gt;Copying ain&amp;#39;t stealing&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
November 10, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/11/10/2020-Election-worker.gmi&amp;#34;&amp;gt;My experience as a poll worker in Pennsylvania&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
November 6, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/11/06/Utility-vs-usability.html&amp;#34;&amp;gt;Utility vs usability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 1, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/11/01/What-is-Gemini-anyway.html&amp;#34;&amp;gt;What is this Gemini thing anyway, and why am I excited about it?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 23, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/10/23/Im-handing-wlroots-and-sway-to-Simon.html&amp;#34;&amp;gt;I&amp;#39;m handing over maintenance of wlroots and sway to Simon Ser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 22, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/10/22/Firefox-the-embarassment-of-FOSS.html&amp;#34;&amp;gt;Firefox: The Jewel^WEmbarassment of Open Source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 18, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/10/18/New-workstation.gmi&amp;#34;&amp;gt;New workstation&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
October 11, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/10/11/Kineto-a-gemini-proxy.gmi&amp;#34;&amp;gt;Kineto: An HTTP to Gemini proxy&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
October 9, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/10/09/Four-principles-of-software-engineering.html&amp;#34;&amp;gt;Four principles of software engineering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 1, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/10/01/Spamtoberfest.html&amp;#34;&amp;gt;Spamtoberfest&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 27, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2020/09/27/Gemini-and-Hugo.gmi&amp;#34;&amp;gt;Gemini and Hugo&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
September 25, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/09/25/A-story-of-two-libcs.html&amp;#34;&amp;gt;A tale of two libcs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 21, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/09/21/Gemini-TOFU.html&amp;#34;&amp;gt;TOFU recommendations for Gemini&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 20, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/09/20/The-potential-of-federation.html&amp;#34;&amp;gt;The unrealized potential of federation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 2, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/09/02/Linux-development-is-profoundly-distributed.html&amp;#34;&amp;gt;Linux development is distributed - profoundly so&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 27, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/27/Microsoft-plays-their-hand.html&amp;#34;&amp;gt;Embrace, extend, and finally extinguish - Microsoft plays their hand&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 24, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/24/Alice-in-Wonderland.html&amp;#34;&amp;gt;Alice in Wonderland and the theft of the public domain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 17, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/17/Engineers-solve-problems.html&amp;#34;&amp;gt;Software engineers solve problems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 13, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/13/Web-browsers-need-to-stop.html&amp;#34;&amp;gt;Web browsers need to stop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 10, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/10/How-to-contribute-to-FOSS.html&amp;#34;&amp;gt;I want to contribute to your project, how do I start?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 1, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/08/01/pkg-go-dev-sucks.html&amp;#34;&amp;gt;pkg.go.dev is more concerned with Google&amp;#39;s interests than good engineering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 27, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/07/27/Anti-AGPL-propaganda.html&amp;#34;&amp;gt;The falsehoods of anti-AGPL propaganda&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 14, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/07/14/March-2nd-1943.html&amp;#34;&amp;gt;March 2nd, 1943&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 26, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/06/26/Vendor-purpose-OS.html&amp;#34;&amp;gt;General-purpose OS, special-purpose OS, and now: vendor-purpose OS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 21, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/06/21/BARE-message-encoding.html&amp;#34;&amp;gt;Introducing the BARE message encoding&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 19, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/06/19/Mail-service-provider-recommendations.html&amp;#34;&amp;gt;Email service provider recommendations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 12, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/06/12/Can-we-talk-about-client-side-certs.html&amp;#34;&amp;gt;Can we talk about client-side certificates?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 6, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/06/06/Add-a-contrib-directory.html&amp;#34;&amp;gt;Add a &amp;amp;quot;contrib&amp;amp;quot; directory to your projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 5, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/05/05/We-are-complicit-in-our-employers-deeds.html&amp;#34;&amp;gt;We are complicit in our employer&amp;#39;s deeds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 22, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/04/22/How-to-store-data-forever.html&amp;#34;&amp;gt;How to store data forever&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 20, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/04/20/Configuring-aerc-for-git.html&amp;#34;&amp;gt;Configuring aerc for git via email&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 6, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/04/06/My-weird-branchless-git-workflow.html&amp;#34;&amp;gt;My unorthodox, branchless git workflow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 25, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/03/25/Designing-a-replacement-part-for-my-truck.html&amp;#34;&amp;gt;Designing and 3D printing a new part for my truck&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 18, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/03/18/Reckless-limitless-scope.html&amp;#34;&amp;gt;The reckless, infinite scope of web browsers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 13, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/03/13/GitHub-notifications.html&amp;#34;&amp;gt;GitHub&amp;#39;s new notifications: a case of regressive design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 7, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/03/07/Open-letter-to-Senator-Casey.html&amp;#34;&amp;gt;An open letter to Senator Bob Casey on end-to-end encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 3, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/03/03/Abiopause.html&amp;#34;&amp;gt;The Abiopause&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 21, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/02/21/Thoughts-on-performance.html&amp;#34;&amp;gt;Thoughts on performance &amp;amp;amp; optimization&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 18, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/02/18/Fucking-laptops.html&amp;#34;&amp;gt;Fucking laptops&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 6, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/02/06/Dependencies-and-maintainers.html&amp;#34;&amp;gt;Dependencies and maintainers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 27, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/01/27/KnightOS-was-interesting.html&amp;#34;&amp;gt;KnightOS was an interesting operating system&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 21, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/01/21/Stress-and-happiness.html&amp;#34;&amp;gt;The happinesses and stresses of full-time FOSS work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 17, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/01/17/Effective-project-governance.html&amp;#34;&amp;gt;A philosophy of project governance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 8, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/01/08/Re-Slow.html&amp;#34;&amp;gt;Following up on &amp;amp;quot;Hello world&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 4, 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2020/01/04/Slow.html&amp;#34;&amp;gt;Hello world&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 30, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/12/30/dotfiles.html&amp;#34;&amp;gt;Managing my dotfiles as a git repository&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 18, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/12/18/PinePhone-review.html&amp;#34;&amp;gt;PinePhone review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 9, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/12/09/Developers-shouldnt-distribute.html&amp;#34;&amp;gt;Developers shouldn&amp;#39;t distribute their own software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 29, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/11/29/dotorg.html&amp;#34;&amp;gt;Take action to save .org and prosecute those who sold out the internet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 26, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/11/26/Avoid-traumatic-changes.html&amp;#34;&amp;gt;Software developers should avoid traumatic changes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 20, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/11/20/China.html&amp;#34;&amp;gt;China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 30, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/10/30/Line-printer-shell-hack.html&amp;#34;&amp;gt;An old-school shell hack on a line printer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 12, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/10/12/how-to-fuck-up-releases.html&amp;#34;&amp;gt;How to fuck up software releases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 10, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/10/10/RaptorCS-redemption.html&amp;#34;&amp;gt;RaptorCS&amp;#39;s redemption: the POWER9 machine works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 7, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/10/07/HDCP-in-Weston.html&amp;#34;&amp;gt;Why Collabora really added Digital Restrictions Management to Weston&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 23, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/09/23/RaptorCS-Blackbird-a-horror-story.html&amp;#34;&amp;gt;RaptorCS POWER9 Blackbird PC review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 17, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/09/17/The-wrong-words-but-the-right-ideas.html&amp;#34;&amp;gt;Don&amp;#39;t sacrifice the right ideas to win the right words&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 8, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/09/08/Enough-to-decide.html&amp;#34;&amp;gt;How I decide between many programming languages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 2, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/09/02/Interactive-SSH-programs.html&amp;#34;&amp;gt;Building interactive SSH applications&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 19, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/08/19/Introducing-shell-access-for-builds.html&amp;#34;&amp;gt;Shell access for builds.sr.ht CI&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 9, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/08/09/DRM-leasing-and-VR-for-Wayland.html&amp;#34;&amp;gt;DRM leasing: VR for Wayland&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 29, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/07/29/FOSS-contributor-tracks.html&amp;#34;&amp;gt;FOSS contributor tracks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 8, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/07/08/Announcing-annotations-for-sourcehut.html&amp;#34;&amp;gt;Announcing code annotations for SourceHut&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 1, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/07/01/Absence-of-features-in-IRC.html&amp;#34;&amp;gt;Absence of certain features in IRC considered a feature&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 13, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/06/13/My-journey-from-MIT-to-GPL.html&amp;#34;&amp;gt;My personal journey from MIT to GPL&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 3, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/06/03/Announcing-aerc-0.1.0.html&amp;#34;&amp;gt;Initial pre-release of aerc: an email client for your terminal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 24, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/05/24/What-is-a-fork.html&amp;#34;&amp;gt;What is a fork, really, and how GitHub changed its meaning&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 13, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/05/13/Git-email-webcast.html&amp;#34;&amp;gt;Webcast: Reviewing git &amp;amp;amp; mercurial patches with email&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 6, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/05/06/Calculate-your-doation-fees-for-Patreon.html&amp;#34;&amp;gt;Calculating your donation&amp;#39;s value following Patreon&amp;#39;s fee changes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 1, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/05/01/Announcing-wio.html&amp;#34;&amp;gt;Announcing Wio: A clone of Plan 9&amp;#39;s Rio for Wayland&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 29, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/04/29/Shut-up-and-get-back-to-work-style.html&amp;#34;&amp;gt;The &amp;amp;quot;shut up and get back to work&amp;amp;quot; coding style guide&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 23, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/04/23/Using-cage-for-a-seamless-RDP-Wayland-desktop.html&amp;#34;&amp;gt;Using Cage for a seamless remote Wayland session&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 19, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/04/19/Your-VPN-is-a-serious-choice.html&amp;#34;&amp;gt;Choosing a VPN service is a serious decision&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 15, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/04/15/Announcing-first-class-hg-support-on-sourcehut.html&amp;#34;&amp;gt;Announcing first-class Mercurial support on Sourcehut&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
April 2, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/04/02/NewPipe-represents-the-best-of-FOSS.html&amp;#34;&amp;gt;NewPipe represents the best of FOSS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 25, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/03/25/Rust-is-not-a-good-C-replacement.html&amp;#34;&amp;gt;Rust is not a good C replacement&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 11, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/03/11/Sway-1.0-released.html&amp;#34;&amp;gt;Announcing the release of sway 1.0&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
March 4, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/03/04/sourcehut-design.html&amp;#34;&amp;gt;Sourcehut&amp;#39;s spartan approach to web design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 25, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/02/25/Using-git-with-discipline.html&amp;#34;&amp;gt;Tips for a disciplined git workflow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 18, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/02/18/Generics-arent-ready-for-Go.html&amp;#34;&amp;gt;Generics aren&amp;#39;t ready for Go&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 10, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/02/10/Wayland-misconceptions-debunked.html&amp;#34;&amp;gt;Wayland misconceptions debunked&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 5, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/02/05/FOSDEM-recap.html&amp;#34;&amp;gt;My experiences at FOSDEM 2019&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 30, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/01/30/Why-I-built-sr.ht-with-Flask.html&amp;#34;&amp;gt;Why I chose Flask to build sr.ht&amp;#39;s mini-services&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 23, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/01/23/Why-I-use-old-hardware.html&amp;#34;&amp;gt;Why I use old hardware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 15, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/01/15/Im-doing-FOSS-full-time.html&amp;#34;&amp;gt;I&amp;#39;m going to work full-time on free software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 13, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/01/13/Backups-and-redundancy-at-sr.ht.html&amp;#34;&amp;gt;Backups &amp;amp;amp; redundancy at sr.ht&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
January 1, 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2019/01/01/Patches-welcome.html&amp;#34;&amp;gt;Patches welcome&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 28, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/12/28/Anatomy-of-a-shell.html&amp;#34;&amp;gt;Anatomy of a shell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 20, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/12/20/Porting-Alpine-Linux-to-RISC-V.html&amp;#34;&amp;gt;Porting Alpine Linux to RISC-V&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
December 4, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/12/04/How-to-abandon-a-FLOSS-project.html&amp;#34;&amp;gt;How to abandon a FLOSS project&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
November 15, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/11/15/sr.ht-general-availability.html&amp;#34;&amp;gt;sr.ht, the hacker&amp;#39;s forge, now open for public alpha&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 30, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/10/30/Its-not-okay-to-pretend-youre-open-source.html&amp;#34;&amp;gt;It&amp;#39;s not okay to pretend your software is open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 29, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/10/29/How-does-virtual-memory-work.html&amp;#34;&amp;gt;How does virtual memory work?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 20, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/10/20/Sway-1.0-highlights.html&amp;#34;&amp;gt;Sway 1.0-beta.1 release highlights&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 8, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/10/08/Go-1.11.html&amp;#34;&amp;gt;Go 1.11 got me to stop ignoring Go&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
October 5, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/10/05/Dont-sign-a-CLA.html&amp;#34;&amp;gt;Don&amp;#39;t sign a CLA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 30, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/09/30/Sway-wlroots-at-XDC-2018.html&amp;#34;&amp;gt;Sway &amp;amp;amp; wlroots at XDC 2018&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 10, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/09/10/Getting-started-with-qemu.html&amp;#34;&amp;gt;Getting started with qemu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
September 4, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/09/04/Conservative-web-development.html&amp;#34;&amp;gt;Conservative web development&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 26, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/08/26/Self-hosted-livestreaming.html&amp;#34;&amp;gt;How to make a self-hosted video livestream&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 22, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/08/22/Commons-clause-will-destroy-open-source.html&amp;#34;&amp;gt;The Commons Clause will destroy open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 8, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/08/08/Signal.html&amp;#34;&amp;gt;I don&amp;#39;t trust Signal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 5, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/08/05/Local-mail-server.html&amp;#34;&amp;gt;Setting up a local dev mail server&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 29, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/07/29/Wayland-shells.html&amp;#34;&amp;gt;Writing a Wayland compositor with wlroots: shells&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 23, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/07/23/Git-is-already-distributed.html&amp;#34;&amp;gt;Git is already federated &amp;amp;amp; decentralized&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 17, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/07/17/Input-handling-in-wlroots.html&amp;#34;&amp;gt;Input handling in wlroots&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 9, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/07/09/Simple-correct-fast.html&amp;#34;&amp;gt;Simple, correct, fast: in that order&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 2, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/07/02/Email-driven-git.html&amp;#34;&amp;gt;The advantages of an email-driven git workflow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 27, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/06/27/My-lets-encrypt-setup.html&amp;#34;&amp;gt;A quick review of my Let&amp;#39;s Encrypt setup&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
June 5, 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2018/06/05/Should-you-move-to-sr.ht.html&amp;#34;&amp;gt;Should you move …&amp;lt;/a&amp;gt;</description>
    </item>
    
    <item>
      <title>From the Canyon Edge</title>
      <link>https://www.whatsupup.com/blog/audiometry/cottony/20210928-081719/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/audiometry/cottony/20210928-081719/</guid>
      <description>Saturday, January 16, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/2LFekQf&amp;#34;&amp;gt;Bread knife&amp;lt;/a&amp;gt; .  We&amp;#39;ll get to the slicing part later, but get yourself an awesome bread knife.  I&amp;#39;m a big fan of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/3oQOqrh&amp;#34;&amp;gt;Miyabi series&amp;lt;/a&amp;gt; , but if that&amp;#39;s too pricey ($300), here&amp;#39;s a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/2LFekQf&amp;#34;&amp;gt;great knife&amp;lt;/a&amp;gt; for $30.&amp;lt;br&amp;gt;
The Spring launch of the Apex 20a platform on March 26, 2020, marks the beginning of an exciting, new era of product development at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://apexclearing.com/&amp;#34;&amp;gt;Apex Clearing&amp;lt;/a&amp;gt; .  We have adopted a number of product management best practices from the software industry and adapted them to address some of the unique challenges within financial services and software-as-a-service.  In the interest of transparency, I’m pleased to share our new processes, what we’ve learned along the way, and where we’re headed next.&amp;lt;br&amp;gt;
Ubuntu, OpenStack, and Kubernetes all share similar, predictable, time-based release cycles.  Ubuntu has released every April and October, since October of 2004 – that&amp;#39;s 32 major software platform releases, on time, every time, over 16 years.  Ubuntu has set the bar for velocity, quality, and predictability in the open source world.  OpenStack’s development processes have largely mirrored Ubuntu’s, with many of the early project leaders having been ex-Ubuntu engineers and managers.  OpenStack, too, has utilized a 6-month development cycle, since 2010, now on its 20 th release.  Kubernetes came along in 2014, and sought to increase the pace a bit, with quarterly release cycles.  Kubernetes is a little bit looser with dates than Ubuntu or OpenStack, but has generally cranked out 4 quality releases per year, over the last 6 years.  I’ve been involved in each of these projects at some level, and I’ve thoroughly enjoyed coaching a number of early stage start-ups on how to apply these principles to their product development methodologies.&amp;lt;br&amp;gt;
When I arrived at Apex in September 2019 to lead the product organization, I inherited an excellent team of product and project managers, peered with high-quality engineering teams.  Products and projects, however, were managed pretty asynchronously, hence release timelines and new feature commitments were unpredictable.  Of course, I had seen this before at a number of the start-ups that I’ve advised, so the model was quite familiar.&amp;lt;br&amp;gt;
Our cycles are named for the year in which it will complete (launch), and with a letter as an iterator.  In 2020, we launch Apex 20a (March), Apex 20b (July), and Apex 20c (November), and looking forward to 2021, we should see Apex 21a (March), Apex 21b (July), and Apex 21c (November).  The “c” cycles are a few extra weeks, to account for the holidays near the end of the year.  These aren’t really “versions”, as Apex is more like “software as a service”, rather than “delivered software”, like Ubuntu, OpenStack, and Kubernetes.  Also, conversationally, we&amp;#39;re referring to the cycles with the season &amp;amp;ndash; so Apex 20a is our &amp;amp;quot;Spring&amp;amp;quot; launch, 20b will be our &amp;amp;quot;Summer&amp;amp;quot; launch, and 20c will be our &amp;amp;quot;Autumn&amp;amp;quot; launch.&amp;lt;br&amp;gt;
The Planning Summit signals the end of the PRD-writing period, during which product managers worked closely with their engineering counterparts, digesting all of those product requests and priorities, and turn those into product requirements written in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ietf.org/rfc/rfc2119.txt&amp;#34;&amp;gt;RFC2119&amp;lt;/a&amp;gt; -style language (must, should, may, etc.).  At the end of that process, each Product Manager and their technical counterpart lead an hour-long session with their plan for the next cycle, including fairly detailed commitments as to the major changes we should expect to be delivered.  Our Planning Summit is about a dozen, hour long sessions, spread over three days in the same week.  We exit the Planning Summit with clear product and engineering consensus on work commitments across the product portfolio, for the upcoming cycle.  This marks the beginning of the development portion of the cycle.&amp;lt;br&amp;gt;
Apex 20a launched on March 31, 2020, as our first release using the methodologies described above.  Apex clients can find detailed release notes in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://developer.apexclearing.com/&amp;#34;&amp;gt;Apex Developer Portal&amp;lt;/a&amp;gt; .  This cycle began with a Prioritization Summit in October 2019, a Planning Summit in November 2019, and a Mid-cycle Summit in January 2020.   This cycle involved 17-weeks of development.&amp;lt;br&amp;gt;
Our work on Apex 20b is already well underway, having held our Prioritization Summit in February 2020, and we’re holding our Planning Summit this week (March 2020).  Our Mid-cycle Summit will be held in May 2020, and we will launch Apex 20b in July 2020.&amp;lt;br&amp;gt;
Apex 20a is the first of many coordinated product launch cycles our customers will experience.  We’ve adapted many of the best practices utilized by the open source software industry as well as Silicon Valley, and those practices are helping us work more effectively with our tech-savvy client base.  Apex will have 3 launches in 2020 (20a, 20b, 20c), and at least 3 launches in 2021.  By openly sharing our product stages and delivering a consistent, predictable, and reliable schedule, there are now ample opportunities for both customer input and detailed review and oversight by our leaders, which culminates in secure and stable products for our industry.  We’re delighted at the engagement thus far, and really look forward to more collaboration in the future.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;▼&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/2021/&amp;#34;&amp;gt;2021&amp;lt;/a&amp;gt; (1)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;►&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/2020/&amp;#34;&amp;gt;2020&amp;lt;/a&amp;gt; (3)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/dustinkirkland/hollywood/issues/58#issuecomment-902832441&amp;#34;&amp;gt;dustinkirkland commented on issue dustinkirkland/hollywood#58&amp;lt;/a&amp;gt; - 8/20/2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/dustinkirkland/petname/issues/1#issuecomment-889983462&amp;#34;&amp;gt;dustinkirkland commented on issue dustinkirkland/petname#1&amp;lt;/a&amp;gt; - 7/30/2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ubuntu&amp;#34;&amp;gt;Ubuntu&amp;lt;/a&amp;gt; (469) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ubuntu-Server&amp;#34;&amp;gt;Ubuntu-Server&amp;lt;/a&amp;gt; (234) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Canonical&amp;#34;&amp;gt;Canonical&amp;lt;/a&amp;gt; (225) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/gazzang&amp;#34;&amp;gt;gazzang&amp;lt;/a&amp;gt; (58) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Byobu&amp;#34;&amp;gt;Byobu&amp;lt;/a&amp;gt; (56) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ubuntu-cloud&amp;#34;&amp;gt;ubuntu-cloud&amp;lt;/a&amp;gt; (53) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Cloud&amp;#34;&amp;gt;Cloud&amp;lt;/a&amp;gt; (48) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ecryptfs&amp;#34;&amp;gt;ecryptfs&amp;lt;/a&amp;gt; (46) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/video&amp;#34;&amp;gt;video&amp;lt;/a&amp;gt; (34) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/openstack&amp;#34;&amp;gt;openstack&amp;lt;/a&amp;gt; (28) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/KVM&amp;#34;&amp;gt;KVM&amp;lt;/a&amp;gt; (24) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Docker&amp;#34;&amp;gt;Docker&amp;lt;/a&amp;gt; (21) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LXD&amp;#34;&amp;gt;LXD&amp;lt;/a&amp;gt; (19) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ubuntu-Desktop&amp;#34;&amp;gt;Ubuntu-Desktop&amp;lt;/a&amp;gt; (16) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LXC&amp;#34;&amp;gt;LXC&amp;lt;/a&amp;gt; (15) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/maas&amp;#34;&amp;gt;maas&amp;lt;/a&amp;gt; (15) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Bikeshed&amp;#34;&amp;gt;Bikeshed&amp;lt;/a&amp;gt; (13) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/google&amp;#34;&amp;gt;google&amp;lt;/a&amp;gt; (13) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/juju&amp;#34;&amp;gt;juju&amp;lt;/a&amp;gt; (13) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/security&amp;#34;&amp;gt;security&amp;lt;/a&amp;gt; (13) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Containers&amp;#34;&amp;gt;Containers&amp;lt;/a&amp;gt; (12) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/slides&amp;#34;&amp;gt;slides&amp;lt;/a&amp;gt; (12) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Daemon&amp;#34;&amp;gt;Daemon&amp;lt;/a&amp;gt; (11) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Linux&amp;#34;&amp;gt;Linux&amp;lt;/a&amp;gt; (9) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/QEMU&amp;#34;&amp;gt;QEMU&amp;lt;/a&amp;gt; (9) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/snappy&amp;#34;&amp;gt;snappy&amp;lt;/a&amp;gt; (9) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Austin&amp;#34;&amp;gt;Austin&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/GoogleCloud&amp;#34;&amp;gt;GoogleCloud&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Screen-Profiles&amp;#34;&amp;gt;Screen-Profiles&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Solar&amp;#34;&amp;gt;Solar&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/TLF&amp;#34;&amp;gt;TLF&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/run-one&amp;#34;&amp;gt;run-one&amp;lt;/a&amp;gt; (8) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Green-Computing&amp;#34;&amp;gt;Green-Computing&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Intel&amp;#34;&amp;gt;Intel&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/PowerNap&amp;#34;&amp;gt;PowerNap&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Testdrive&amp;#34;&amp;gt;Testdrive&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/aws&amp;#34;&amp;gt;aws&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/manpages&amp;#34;&amp;gt;manpages&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ztrustee&amp;#34;&amp;gt;ztrustee&amp;lt;/a&amp;gt; (7) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/EC2&amp;#34;&amp;gt;EC2&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Featured&amp;#34;&amp;gt;Featured&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Kubernetes&amp;#34;&amp;gt;Kubernetes&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LCA2010&amp;#34;&amp;gt;LCA2010&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LTS&amp;#34;&amp;gt;LTS&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/NUC&amp;#34;&amp;gt;NUC&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Travel&amp;#34;&amp;gt;Travel&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ubuntu-Core&amp;#34;&amp;gt;Ubuntu-Core&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/encryption&amp;#34;&amp;gt;encryption&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/orangebox&amp;#34;&amp;gt;orangebox&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/orchestra&amp;#34;&amp;gt;orchestra&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ssh-import-id&amp;#34;&amp;gt;ssh-import-id&amp;lt;/a&amp;gt; (6) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Go&amp;#34;&amp;gt;Go&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/IoT&amp;#34;&amp;gt;IoT&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/UEC&amp;#34;&amp;gt;UEC&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/amazon&amp;#34;&amp;gt;amazon&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/arm&amp;#34;&amp;gt;arm&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ibm&amp;#34;&amp;gt;ibm&amp;lt;/a&amp;gt; (5) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Android&amp;#34;&amp;gt;Android&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/CloudFoundry&amp;#34;&amp;gt;CloudFoundry&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Entropy&amp;#34;&amp;gt;Entropy&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Hacks&amp;#34;&amp;gt;Hacks&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Landscape&amp;#34;&amp;gt;Landscape&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/PalmPre&amp;#34;&amp;gt;PalmPre&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Pictor&amp;#34;&amp;gt;Pictor&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Running&amp;#34;&amp;gt;Running&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/SxSW&amp;#34;&amp;gt;SxSW&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Virt&amp;#34;&amp;gt;Virt&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Windows&amp;#34;&amp;gt;Windows&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bootmail&amp;#34;&amp;gt;bootmail&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bug-zapping&amp;#34;&amp;gt;bug-zapping&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ensemble&amp;#34;&amp;gt;ensemble&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hollywood&amp;#34;&amp;gt;hollywood&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/linuxfoundation&amp;#34;&amp;gt;linuxfoundation&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/microsoft&amp;#34;&amp;gt;microsoft&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/power&amp;#34;&amp;gt;power&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ssh&amp;#34;&amp;gt;ssh&amp;lt;/a&amp;gt; (4) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Eucalyptus&amp;#34;&amp;gt;Eucalyptus&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/HOWTO&amp;#34;&amp;gt;HOWTO&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Hiking&amp;#34;&amp;gt;Hiking&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LinuxCon&amp;#34;&amp;gt;LinuxCon&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ReleaseParty&amp;#34;&amp;gt;ReleaseParty&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Reviews&amp;#34;&amp;gt;Reviews&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/UDS&amp;#34;&amp;gt;UDS&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/VMWare&amp;#34;&amp;gt;VMWare&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/aubergine&amp;#34;&amp;gt;aubergine&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/azure&amp;#34;&amp;gt;azure&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dmcrypt&amp;#34;&amp;gt;dmcrypt&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dotdee&amp;#34;&amp;gt;dotdee&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/fingerprints&amp;#34;&amp;gt;fingerprints&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/font&amp;#34;&amp;gt;font&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/gce&amp;#34;&amp;gt;gce&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/gpg&amp;#34;&amp;gt;gpg&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hadoop&amp;#34;&amp;gt;hadoop&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/keep-one-running&amp;#34;&amp;gt;keep-one-running&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/kernel&amp;#34;&amp;gt;kernel&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/keymanagement&amp;#34;&amp;gt;keymanagement&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/meetup&amp;#34;&amp;gt;meetup&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/overlayroot&amp;#34;&amp;gt;overlayroot&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/podcast&amp;#34;&amp;gt;podcast&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/s390x&amp;#34;&amp;gt;s390x&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/tmux&amp;#34;&amp;gt;tmux&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/update-motd&amp;#34;&amp;gt;update-motd&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/zescrow&amp;#34;&amp;gt;zescrow&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/zfs&amp;#34;&amp;gt;zfs&amp;lt;/a&amp;gt; (3) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Audacity&amp;#34;&amp;gt;Audacity&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Classroom&amp;#34;&amp;gt;Classroom&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Debian&amp;#34;&amp;gt;Debian&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Family&amp;#34;&amp;gt;Family&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LWN&amp;#34;&amp;gt;LWN&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Libvirt&amp;#34;&amp;gt;Libvirt&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Netflix&amp;#34;&amp;gt;Netflix&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Patents&amp;#34;&amp;gt;Patents&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/PetName&amp;#34;&amp;gt;PetName&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Pollen&amp;#34;&amp;gt;Pollen&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/QEMU-KVM&amp;#34;&amp;gt;QEMU-KVM&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Scotland&amp;#34;&amp;gt;Scotland&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Screen&amp;#34;&amp;gt;Screen&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Smplayer&amp;#34;&amp;gt;Smplayer&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Sound&amp;#34;&amp;gt;Sound&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Texas&amp;#34;&amp;gt;Texas&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Virtualization&amp;#34;&amp;gt;Virtualization&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/amt&amp;#34;&amp;gt;amt&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/apple&amp;#34;&amp;gt;apple&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/apply-patch&amp;#34;&amp;gt;apply-patch&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/audio&amp;#34;&amp;gt;audio&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/aurora&amp;#34;&amp;gt;aurora&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bigdata&amp;#34;&amp;gt;bigdata&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/changelog&amp;#34;&amp;gt;changelog&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cloud-init&amp;#34;&amp;gt;cloud-init&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cloudopen&amp;#34;&amp;gt;cloudopen&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/conferences&amp;#34;&amp;gt;conferences&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/coreos&amp;#34;&amp;gt;coreos&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/edge&amp;#34;&amp;gt;edge&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/gazzangbang&amp;#34;&amp;gt;gazzangbang&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ge&amp;#34;&amp;gt;ge&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/gnupg&amp;#34;&amp;gt;gnupg&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hockeypuck&amp;#34;&amp;gt;hockeypuck&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/johnnyfootball&amp;#34;&amp;gt;johnnyfootball&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/launchpad&amp;#34;&amp;gt;launchpad&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/livepatch&amp;#34;&amp;gt;livepatch&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mencoder&amp;#34;&amp;gt;mencoder&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mondrian&amp;#34;&amp;gt;mondrian&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mongodb&amp;#34;&amp;gt;mongodb&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/musica&amp;#34;&amp;gt;musica&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/networking&amp;#34;&amp;gt;networking&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/privacy&amp;#34;&amp;gt;privacy&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/puppet&amp;#34;&amp;gt;puppet&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/python&amp;#34;&amp;gt;python&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/rant&amp;#34;&amp;gt;rant&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/redhat&amp;#34;&amp;gt;redhat&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/scale&amp;#34;&amp;gt;scale&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/slashdot&amp;#34;&amp;gt;slashdot&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/survey&amp;#34;&amp;gt;survey&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/txlf&amp;#34;&amp;gt;txlf&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/uinstall&amp;#34;&amp;gt;uinstall&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/uquick&amp;#34;&amp;gt;uquick&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/xps13&amp;#34;&amp;gt;xps13&amp;lt;/a&amp;gt; (2) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/10gen&amp;#34;&amp;gt;10gen&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/AMD&amp;#34;&amp;gt;AMD&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Alfresco&amp;#34;&amp;gt;Alfresco&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Approx&amp;#34;&amp;gt;Approx&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Asus&amp;#34;&amp;gt;Asus&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/BSG&amp;#34;&amp;gt;BSG&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Banks&amp;#34;&amp;gt;Banks&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ChromeOS&amp;#34;&amp;gt;ChromeOS&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Community&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Conference&amp;#34;&amp;gt;Conference&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/DNS&amp;#34;&amp;gt;DNS&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/DevOps&amp;#34;&amp;gt;DevOps&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Dosbox&amp;#34;&amp;gt;Dosbox&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ESM&amp;#34;&amp;gt;ESM&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Fedora&amp;#34;&amp;gt;Fedora&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Fraud&amp;#34;&amp;gt;Fraud&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/G1&amp;#34;&amp;gt;G1&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Gorilla&amp;#34;&amp;gt;Gorilla&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/HackerNews&amp;#34;&amp;gt;HackerNews&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/IPV6&amp;#34;&amp;gt;IPV6&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Images&amp;#34;&amp;gt;Images&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Java&amp;#34;&amp;gt;Java&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/JeOS&amp;#34;&amp;gt;JeOS&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Joyent&amp;#34;&amp;gt;Joyent&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LTS4&amp;#34;&amp;gt;LTS4&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/LinuxOne&amp;#34;&amp;gt;LinuxOne&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Lost&amp;#34;&amp;gt;Lost&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/MWC&amp;#34;&amp;gt;MWC&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Membership&amp;#34;&amp;gt;Membership&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/MythTV&amp;#34;&amp;gt;MythTV&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Nespresso&amp;#34;&amp;gt;Nespresso&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/NewZealand&amp;#34;&amp;gt;NewZealand&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Oracle&amp;#34;&amp;gt;Oracle&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Parable&amp;#34;&amp;gt;Parable&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Patriot&amp;#34;&amp;gt;Patriot&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Phones&amp;#34;&amp;gt;Phones&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ping&amp;#34;&amp;gt;Ping&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/RHEL&amp;#34;&amp;gt;RHEL&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Roadmap&amp;#34;&amp;gt;Roadmap&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Roomba&amp;#34;&amp;gt;Roomba&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/SSD&amp;#34;&amp;gt;SSD&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Siteam&amp;#34;&amp;gt;Siteam&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Snaps&amp;#34;&amp;gt;Snaps&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/StarWars&amp;#34;&amp;gt;StarWars&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/TAMU&amp;#34;&amp;gt;TAMU&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Tesla&amp;#34;&amp;gt;Tesla&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/TheCUBE&amp;#34;&amp;gt;TheCUBE&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Throwback&amp;#34;&amp;gt;Throwback&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Turnkey&amp;#34;&amp;gt;Turnkey&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Ubuntu-HA&amp;#34;&amp;gt;Ubuntu-HA&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Unifi&amp;#34;&amp;gt;Unifi&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/Unity&amp;#34;&amp;gt;Unity&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/WebOS&amp;#34;&amp;gt;WebOS&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/acta&amp;#34;&amp;gt;acta&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/acug&amp;#34;&amp;gt;acug&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/adapt&amp;#34;&amp;gt;adapt&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/aggies&amp;#34;&amp;gt;aggies&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/agile&amp;#34;&amp;gt;agile&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/alpine&amp;#34;&amp;gt;alpine&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/amttool&amp;#34;&amp;gt;amttool&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/animation&amp;#34;&amp;gt;animation&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/apex&amp;#34;&amp;gt;apex&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/appliance&amp;#34;&amp;gt;appliance&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/art&amp;#34;&amp;gt;art&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/atomic&amp;#34;&amp;gt;atomic&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/auth&amp;#34;&amp;gt;auth&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/avconv&amp;#34;&amp;gt;avconv&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/baby&amp;#34;&amp;gt;baby&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/base64&amp;#34;&amp;gt;base64&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bazaar&amp;#34;&amp;gt;bazaar&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bbq&amp;#34;&amp;gt;bbq&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bcc&amp;#34;&amp;gt;bcc&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bip&amp;#34;&amp;gt;bip&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/blindcafe&amp;#34;&amp;gt;blindcafe&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/bpf&amp;#34;&amp;gt;bpf&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/brisket&amp;#34;&amp;gt;brisket&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/c5%20chevrolet%20corvette%20forsale&amp;#34;&amp;gt;c5 chevrolet corvette forsale&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cadillac&amp;#34;&amp;gt;cadillac&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cassandra&amp;#34;&amp;gt;cassandra&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cdh&amp;#34;&amp;gt;cdh&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/charm&amp;#34;&amp;gt;charm&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/chromium&amp;#34;&amp;gt;chromium&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cim&amp;#34;&amp;gt;cim&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cirsc&amp;#34;&amp;gt;cirsc&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cloc&amp;#34;&amp;gt;cloc&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/clockwork&amp;#34;&amp;gt;clockwork&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cloud-live&amp;#34;&amp;gt;cloud-live&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/conjure-up&amp;#34;&amp;gt;conjure-up&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cr-gpg&amp;#34;&amp;gt;cr-gpg&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/createous&amp;#34;&amp;gt;createous&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cts-v&amp;#34;&amp;gt;cts-v&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/cyanogen&amp;#34;&amp;gt;cyanogen&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dd-wrt&amp;#34;&amp;gt;dd-wrt&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dell&amp;#34;&amp;gt;dell&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dennisritchie&amp;#34;&amp;gt;dennisritchie&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/devices&amp;#34;&amp;gt;devices&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dmr&amp;#34;&amp;gt;dmr&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dpkg&amp;#34;&amp;gt;dpkg&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/dropcam&amp;#34;&amp;gt;dropcam&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/easteregg&amp;#34;&amp;gt;easteregg&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/extremeprogramming&amp;#34;&amp;gt;extremeprogramming&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ffmpeg&amp;#34;&amp;gt;ffmpeg&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/firstbuild&amp;#34;&amp;gt;firstbuild&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/football&amp;#34;&amp;gt;football&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/fossil&amp;#34;&amp;gt;fossil&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/fridge&amp;#34;&amp;gt;fridge&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/github&amp;#34;&amp;gt;github&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hackathon&amp;#34;&amp;gt;hackathon&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/heisman&amp;#34;&amp;gt;heisman&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hiring&amp;#34;&amp;gt;hiring&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hkp&amp;#34;&amp;gt;hkp&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/homebrew&amp;#34;&amp;gt;homebrew&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/hpc&amp;#34;&amp;gt;hpc&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/html5&amp;#34;&amp;gt;html5&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/iphone&amp;#34;&amp;gt;iphone&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ipmi&amp;#34;&amp;gt;ipmi&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/it&amp;#34;&amp;gt;it&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/jobs&amp;#34;&amp;gt;jobs&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/kenburns&amp;#34;&amp;gt;kenburns&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/keyescrow&amp;#34;&amp;gt;keyescrow&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/keymon&amp;#34;&amp;gt;keymon&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/lenovo&amp;#34;&amp;gt;lenovo&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/linaro&amp;#34;&amp;gt;linaro&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/lisa&amp;#34;&amp;gt;lisa&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/lunatia&amp;#34;&amp;gt;lunatia&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/lyft&amp;#34;&amp;gt;lyft&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/lzma&amp;#34;&amp;gt;lzma&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/maddog&amp;#34;&amp;gt;maddog&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/maker&amp;#34;&amp;gt;maker&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mcollective&amp;#34;&amp;gt;mcollective&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mdadm&amp;#34;&amp;gt;mdadm&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/meltdown&amp;#34;&amp;gt;meltdown&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mobile&amp;#34;&amp;gt;mobile&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mozart&amp;#34;&amp;gt;mozart&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/mpi&amp;#34;&amp;gt;mpi&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/nest&amp;#34;&amp;gt;nest&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/nosql&amp;#34;&amp;gt;nosql&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/oakridge&amp;#34;&amp;gt;oakridge&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/openssl&amp;#34;&amp;gt;openssl&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ornl&amp;#34;&amp;gt;ornl&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pairprogramming&amp;#34;&amp;gt;pairprogramming&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/paperless&amp;#34;&amp;gt;paperless&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pascal&amp;#34;&amp;gt;pascal&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/passwords&amp;#34;&amp;gt;passwords&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pastebinit&amp;#34;&amp;gt;pastebinit&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pbget&amp;#34;&amp;gt;pbget&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pbput&amp;#34;&amp;gt;pbput&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/php&amp;#34;&amp;gt;php&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pirate&amp;#34;&amp;gt;pirate&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/product&amp;#34;&amp;gt;product&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/purge-old-kernels&amp;#34;&amp;gt;purge-old-kernels&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/pvoutput&amp;#34;&amp;gt;pvoutput&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/qwersive&amp;#34;&amp;gt;qwersive&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/random&amp;#34;&amp;gt;random&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/rootsign&amp;#34;&amp;gt;rootsign&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/run-one-constantly&amp;#34;&amp;gt;run-one-constantly&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/run-this-one&amp;#34;&amp;gt;run-this-one&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/smoke&amp;#34;&amp;gt;smoke&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/snl&amp;#34;&amp;gt;snl&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/soc&amp;#34;&amp;gt;soc&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/sopa&amp;#34;&amp;gt;sopa&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/spectre&amp;#34;&amp;gt;spectre&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/sputnik&amp;#34;&amp;gt;sputnik&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/storage&amp;#34;&amp;gt;storage&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/swype&amp;#34;&amp;gt;swype&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/tbt&amp;#34;&amp;gt;tbt&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/theft&amp;#34;&amp;gt;theft&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/tips&amp;#34;&amp;gt;tips&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/tmpfs&amp;#34;&amp;gt;tmpfs&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/touch&amp;#34;&amp;gt;touch&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/transcode&amp;#34;&amp;gt;transcode&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/uber&amp;#34;&amp;gt;uber&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ubrewtu&amp;#34;&amp;gt;ubrewtu&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ubuntu-allstars&amp;#34;&amp;gt;ubuntu-allstars&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/ubuntu-sever&amp;#34;&amp;gt;ubuntu-sever&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/udw&amp;#34;&amp;gt;udw&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/unix&amp;#34;&amp;gt;unix&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/usenix&amp;#34;&amp;gt;usenix&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/virt-manager&amp;#34;&amp;gt;virt-manager&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/vlan&amp;#34;&amp;gt;vlan&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/wbem&amp;#34;&amp;gt;wbem&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/wilwheaton&amp;#34;&amp;gt;wilwheaton&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/wine&amp;#34;&amp;gt;wine&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/wsman&amp;#34;&amp;gt;wsman&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/yo&amp;#34;&amp;gt;yo&amp;lt;/a&amp;gt; (1) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/search/label/zncrypt&amp;#34;&amp;gt;zncrypt&amp;lt;/a&amp;gt; (1)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210928-081715/</link>
      <pubDate>Tue, 28 Sep 2021 08:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210928-081715/</guid>
      <description>Sept. 23, 2021&amp;lt;br&amp;gt;
Aug. 3, 2021&amp;lt;br&amp;gt;
June 22, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/17/science/betelgeuse-montarges-star-supernova.html&amp;#34;&amp;gt;Out There Betelgeuse Merely Burped, Astronomers Conclude The dramatic dimming of the red supergiant in 2019 was the product of dust, not a prelude to destruction, a new study has found. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210928-081652/</link>
      <pubDate>Tue, 28 Sep 2021 08:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210928-081652/</guid>
      <description>&amp;lt;p&amp;gt;Before founding The Markup, she led investigative teams at ProPublica and The Wall Street Journal. She is the author of “Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance,” (Times Books, 2014) and “Stealing MySpace: The Battle to Control the Most Popular Website in America” (Random House, March 2009). She has a B.A. in mathematics from The University of Chicago and an MBA from Columbia University.&amp;lt;br&amp;gt;
Julia’s OpenPGP key fingerprint is F292 E93A 86B3 1713 05A6  FE9F 85C9 09BB C664 D201.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/22/germanys-far-right-political-party-the-afd-is-dominating-facebook-this-election&amp;#34;&amp;gt;Citizen Browser Germany’s Far-Right Political Party, the AfD, Is Dominating Facebook This Election Ahead of a national vote this month, Citizen Browser data shows that posts promoting the AfD party appeared more than three times as often as rivals&amp;#39; September 22, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/21/facebook-rolls-out-news-feed-change-that-blocks-watchdogs-from-gathering-data&amp;#34;&amp;gt;Citizen Browser Facebook Rolls Out News Feed Change That Blocks Watchdogs from Gathering Data The tweak, which targets the code in accessibility features for visually impaired users, drew ire from researchers and those who monitor the platform September 21, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/08/10/how-the-daily-wire-uses-facebooks-targeted-advertising-to-build-its-brand&amp;#34;&amp;gt;Citizen Browser How The Daily Wire Uses Facebook’s Targeted Advertising  to Build Its Brand The social media giant&amp;amp;#39;s powerful targeting tools appear to be part of Ben Shapiro’s success in growing his audience on the platform August 10, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/07/09/facebook-got-rid-of-racial-ad-categories-or-did-it&amp;#34;&amp;gt;Citizen Browser Facebook Got Rid of Racial Ad Categories. Or Did It? Our Citizen Browser project found an array of proxies through which advertisers can target Black Facebook users, among other demographics July 9, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/06/24/after-repeatedly-promising-not-to-facebook-keeps-recommending-political-groups-to-its-users&amp;#34;&amp;gt;Citizen Browser After Repeatedly Promising Not to, Facebook Keeps Recommending Political Groups to Its Users The company announced the policy as a way to stop spreading divisive content June 24, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/05/20/facebook-said-it-would-stop-recommending-anti-vaccine-groups-it-didnt&amp;#34;&amp;gt;Citizen Browser Facebook Said It Would Stop Recommending Anti-Vaccine Groups. It Didn’t As COVID-19 surged, the social media company pointed users to all sorts of anti-vaccine and anti-mask groups May 20, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/05/06/how-big-pharma-finds-sick-users-on-facebook&amp;#34;&amp;gt;Citizen Browser How Big Pharma Finds Sick Users on Facebook We found drug ads targeted at users interested in everything from bourbon to therapy May 6, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/04/29/credit-card-ads-were-targeted-by-age-violating-facebooks-anti-discrimination-policy&amp;#34;&amp;gt;Citizen Browser Credit Card Ads Were Targeted by Age, Violating Facebook’s Anti-Discrimination Policy Such ads, along with other age-targeted financial product ads, may violate civil rights laws, attorneys say April 29, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/show-your-work/2021/03/11/how-we-built-a-facebook-feed-viewer&amp;#34;&amp;gt;Show Your Work Citizen Browser How We Built a Facebook Feed Viewer Split Screen invites readers to explore how different people experience Facebook March 11, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/03/11/introducing-split-screen&amp;#34;&amp;gt;Citizen Browser Introducing “Split Screen” A new tool from The Markup’s Citizen Browser project March 11, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20210928-081605/</link>
      <pubDate>Tue, 28 Sep 2021 08:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20210928-081605/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-08-25-2021-transparency-report-january-to-june/&amp;#34;&amp;gt;August 25, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-08-25-2021-transparency-report-january-to-june/&amp;#34;&amp;gt;2021 Transparency Report: January to June&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We’re reporting on a six-month period rather than annually to increase our level of transparency. For this report, we’ve added more granularity to our 2020 stats.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-02-25-2020-transparency-report/&amp;#34;&amp;gt;2020 Transparency Report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We’re excited to share GitHub’s 2019 Transparency Report, a by-the-numbers look at how we handle requests for user data and moderate content on GitHub.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210928-081600/</link>
      <pubDate>Tue, 28 Sep 2021 08:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210928-081600/</guid>
      <description>&amp;lt;p&amp;gt;Dan Goodin is Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, and hardware hacking. A journalist with more than 15 years experience, he has been chronicling the exploits of white-hat, grey-hat and black-hat hackers since 2005 as a reporter for the Associated Press and later, The Register. He has a Bachelors Degree in English from the University of Massachusetts and a Masters of Journalism from UC Berkeley. In his spare time, he enjoys gardening, cooking, and following the independent music scene.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Dan can receive encrypted messages over Signal at &#43;1650-440-4479.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20210928-081557/</link>
      <pubDate>Tue, 28 Sep 2021 08:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20210928-081557/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-06-29-introducing-github-copilot-ai-pair-programmer/&amp;#34;&amp;gt;June 29, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210928-081556/</link>
      <pubDate>Tue, 28 Sep 2021 08:15:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210928-081556/</guid>
      <description>Singer R. Kelly found guilty by a federal jury of racketeering in his sex-trafficking trial &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/government/jurors-resume-deliberations-r-kelly-trial-2021-09-27/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Sep 23 2021&amp;lt;br&amp;gt;
Aug 29 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210928-081533/</link>
      <pubDate>Tue, 28 Sep 2021 08:15:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210928-081533/</guid>
      <description>Sept. 1, 2021&amp;lt;br&amp;gt;
Aug. 19, 2021&amp;lt;br&amp;gt;
July 28, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210928-081525/</link>
      <pubDate>Tue, 28 Sep 2021 08:15:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210928-081525/</guid>
      <description>© 2021 Alex Kantrowitz. See &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/privacy&amp;#34;&amp;gt;privacy&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/tos&amp;#34;&amp;gt;terms&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com/ccpa#personal-data-collected&amp;#34;&amp;gt;information collection notice&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210928-081453/</link>
      <pubDate>Tue, 28 Sep 2021 08:14:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210928-081453/</guid>
      <description>© Smartcar, Inc. 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210928-081436/</link>
      <pubDate>Tue, 28 Sep 2021 08:14:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210928-081436/</guid>
      <description>&amp;lt;p&amp;gt;News 22 Sept 2021&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 07 Sept 2021&amp;lt;br&amp;gt;
News 20 Aug 2021&amp;lt;br&amp;gt;
News 23 Jul 2021&amp;lt;br&amp;gt;
News 23 Jun 2021&amp;lt;br&amp;gt;
News 07 May 2021&amp;lt;br&amp;gt;
News 19 Apr 2021&amp;lt;br&amp;gt;
News 19 Mar 2021&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 16 Mar 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-00641-8&amp;#34;&amp;gt;Record number of asteroids seen whizzing past Earth in 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
News 22 Feb 2021&amp;lt;br&amp;gt;
Comments &amp;amp;amp; Opinion 01 Feb 2021&amp;lt;br&amp;gt;
News 28 Jan 2021&amp;lt;br&amp;gt;
News 17 Dec 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-020-03438-3&amp;#34;&amp;gt;2020 beyond COVID: the other science events that shaped the year&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-020-03437-4&amp;#34;&amp;gt;COVID and 2020: An extraordinary year for science&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
News 19 Nov 2020&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 16 Nov 2020&amp;lt;br&amp;gt;
News 29 Oct 2020&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210928-081416/</link>
      <pubDate>Tue, 28 Sep 2021 08:14:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210928-081416/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-rp2040-on-sale/&amp;#34;&amp;gt;Raspberry Silicon update: RP2040 on sale now at $1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Eben Upton - 1st Jun 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-rp2040-on-sale/#comments&amp;#34;&amp;gt;28 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 24th May 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/announcing-the-raspberry-pi-poe-hat/#comments&amp;#34;&amp;gt;81 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 26th Feb 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/pi-day-at-the-raspberry-pi-foundation/#comments&amp;#34;&amp;gt;4 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 1st Dec 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/spread-the-joy-of-learning-through-making/#comments&amp;#34;&amp;gt;2 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 30th Nov 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/new-raspberry-pi-4-case-fan/#comments&amp;#34;&amp;gt;81 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 2nd Nov 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-400-the-70-desktop-pc/#comments&amp;#34;&amp;gt;453 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 20th Oct 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-merged-to-mesa/#comments&amp;#34;&amp;gt;37 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Eben Upton - 9th Jun 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-now-with-added-source-code/#comments&amp;#34;&amp;gt;33 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210928-081400/</link>
      <pubDate>Tue, 28 Sep 2021 08:14:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210928-081400/</guid>
      <description>&amp;lt;p&amp;gt;— Justin Schuh (@justinschuh) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/justinschuh/status/1374809351920132096?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;March 24, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
(Note that the third case is kind of weird. It might be a subcase of #1 if you have another device that’s active and can send you the data. It might be a subcase of #2. I hate this one and am sending it to live on a farm upstate.)&amp;lt;br&amp;gt;
What I learned from my exploration ( and here I pray the documentation is accurate) is that Apple actually does seem to provide end-to-end encryption for browser data. Or more specifically: they provide &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.apple.com/en-us/HT202303&amp;#34;&amp;gt;end-to-end encryption for browser history data&amp;lt;/a&amp;gt; starting as of iOS 13.&amp;lt;br&amp;gt;
Until a few years ago, nobody thought much about this. In fact, in the early DKIM configurations were kind of a joke: mail providers chose DKIM signing keys that were trivial for motivated attackers to crack. Back in 2012 a security researcher named Zachary Harris pointed out that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wired.com/2012/10/dkim-vulnerability-widespread/&amp;#34;&amp;gt;Google and several other companies&amp;lt;/a&amp;gt; were using using 512-bit RSA to sign DKIM. He showed that these keys could be “cracked” in a matter of hours on rented cloud hardware, and then used these keys to forge emails from Larry and Sergey.&amp;lt;br&amp;gt;
Providers like Google reacted to the whole “Larry and Sergey” embarassment in the way you’d expect. Without giving the implications any serious thought, they quickly ramped up their keys to 1024-bit or 2048-bit RSA. This stopped the forgeries, but inadvertently turned a harmless anti-spam protocol into a life-long cryptographic authenticity stamp — one that can be used to verify the provenance of any email dump, regardless of how it reaches the verifier.&amp;lt;br&amp;gt;
The most famous example is also one of the most divisive: back in 2016, Wikileaks published a batch of stolen emails stolen from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wikileaks.org/podesta-emails/&amp;#34;&amp;gt;John Podesta’s Google account&amp;lt;/a&amp;gt; . Since the sourcing of these emails was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://apnews.com/article/dea73efc01594839957c3c9a6c962b8a&amp;#34;&amp;gt;murky&amp;lt;/a&amp;gt; , WikiLeaks faced a high burden in proving to readers that these messages were actually authentic. DKIM provided an elegant solution: every email presented on Wikileaks’ pages &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wikileaks.org/podesta-emails/emailid/10667&amp;#34;&amp;gt;publicly states the verification status of the attached DKIM signatures&amp;lt;/a&amp;gt; , something you can see today. The site also provides a helpful resource &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wikileaks.org/DKIM-Verification.html&amp;#34;&amp;gt;page for journalists, explaining how DKIM proves that the emails are real.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
But the Podesta emails weren’t the end of the DKIM story. In 2017, ProPublica &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.propublica.org/nerds/authenticating-email-using-dkim-and-arc-or-how-we-analyzed-the-kasowitz-emails&amp;#34;&amp;gt;used DKIM&amp;lt;/a&amp;gt; to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.propublica.org/article/marc-kasowitz-trump-lawyer-threat-emails-maddow&amp;#34;&amp;gt;verify the authenticity of emails&amp;lt;/a&amp;gt; allegedly sent to a critic by President Trump’s personal lawyer Mark Kasowitz. In 2018, the Associated Press used it once again to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://apnews.com/article/d093a02a3d8a4e1b8dc7f5d19475899b&amp;#34;&amp;gt;verify leaked emails tying a Russian lawyer to Donald Trump Jr&amp;lt;/a&amp;gt; . And it happened again this year, when the recipients of an alleged “Hunter Biden laptop” provided a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonexaminer.com/opinion/the-hunter-biden-emails-are-legitimate-and-theyre-not-going-away&amp;#34;&amp;gt;single 2015 email to Rob Graham for DKIM verification&amp;lt;/a&amp;gt; , in an effort to overcome journalistic skepticism at the sourcing of their information.&amp;lt;br&amp;gt;
DKIM was never intended to provide long-lived authenticity for your emails. The security guarantees it provides are important, but need only exist for a period of hours (perhaps days on the outside) from the moment a mail server transmits your email. The fact that DKIM can be used to prove authenticity of stolen email from as long ago as 2015 is basically a screwup: the result of misuse and misconfiguration by mail providers who should know better.&amp;lt;br&amp;gt;
Of course, merely replacing DKIM keypairs does nothing by itself: smart people on the Internet routinely archive DKIM public keys. This is, in fact, how a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/robertdavidgraham/hunter-dkim&amp;#34;&amp;gt;2015 Google email was verified in 2020&amp;lt;/a&amp;gt; : the key that Google used for verifying DKIM emails during that long-ago time period (a single key was used from 2012-2016, seriously Google, this is just malpractice!) is no longer in use, but has been cached in various places on the Internet.&amp;lt;br&amp;gt;
Google could launch the process right now by releasing its ancient 2016-era private keys. Since the secrecy of these serves literally no security purpose at this point, except for allowing third parties to verify email leaks, there’s no case for keeping these values secret at all. Just dump them.&amp;lt;br&amp;gt;
The basis for our modern cellular telephony standards began in Europe back in the 1980s, with a standard known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/GSM&amp;#34;&amp;gt;Global System for Mobile&amp;lt;/a&amp;gt; . GSM was the first major digital cellular telephony standard, and it introduced a number of revolutionary features such as the use of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/A5/1&amp;#34;&amp;gt;encryption&amp;lt;/a&amp;gt; to protect phone calls. Early GSM was designed primarily for voice communications, although &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/General_Packet_Radio_Service&amp;#34;&amp;gt;data could be sent&amp;lt;/a&amp;gt; over the air at some expense.&amp;lt;br&amp;gt;
This is bad behavior on its merits, and more critically: it probably doesn’t result in good PIN choices. To make it go away, I chose the simplest PIN that the app would allow me to, which was 9512. I assume many other users simply entered their phone passcodes, which is a nasty security risk all on its own.&amp;lt;br&amp;gt;
About eight years ago I set out to write a very informal piece on a specific cryptographic modeling technique called the “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Random_oracle&amp;#34;&amp;gt;random oracle model”&amp;lt;/a&amp;gt; . This was way back in the good old days of 2011, which was a more innocent and gentle era of cryptography. Back then nobody foresaw that all of our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/10/16/falling-through-the-kracks/&amp;#34;&amp;gt;standard&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/03/01/attack-of-week-drown/&amp;#34;&amp;gt;cryptography&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/05/22/attack-of-week-logjam/&amp;#34;&amp;gt;would&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/03/03/attack-of-week-freak-or-factoring-nsa/&amp;#34;&amp;gt;turn&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2014/04/08/attack-of-the-week-openssl-heartbleed/&amp;#34;&amp;gt;out&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/&amp;#34;&amp;gt;to&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/&amp;#34;&amp;gt;be&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/10/23/attack-of-the-week-duhk/&amp;#34;&amp;gt;riddled&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/12/22/on-juniper-backdoor/&amp;#34;&amp;gt;with&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2014/10/15/attack-of-week-poodle/&amp;#34;&amp;gt;bugs&amp;lt;/a&amp;gt; ; you didn’t have to be reminded that “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en_us/article/43nk9b/cryptocurrency-are-not-crypto-bitcoin&amp;#34;&amp;gt;crypto means cryptography&amp;lt;/a&amp;gt; “. People even used &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://qz.com/1285209/bitcoin-pizza-day-2018-eight-years-ago-someone-bought-two-pizzas-with-bitcoins-now-worth-82-million/&amp;#34;&amp;gt;Bitcoin to actually buy things.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
So we don’t use random functions to implement our hashing. Out in “the real world” we use weird functions developed by Belgians or the National Security Agency, things like like SHA256 and SHA3 and Blake2. These functions come with blazingly fast and tiny algorithms for computing them, most of which occupy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/brainhub/SHA3IUF/blob/master/sha3.c&amp;#34;&amp;gt;few dozen lines of code&amp;lt;/a&amp;gt; or less. They certainly aren’t random, but as best we can tell, the output looks pretty jumbled up.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;Of course everyone knows random oracle proofs aren’t “real”. Most conscientious protocol designers will admit that proving something secure in the random oracle model does not actually mean it’ll be secure “in the real world”. In other words, the fact that random oracle model proofs are kind of bogus is not some deep secret I’m letting you in on.&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;And anyway: ROM proofs are generally considered a useful heuristic. For those who aren’t familiar with the term, “heuristic” is a word that grownups use when they’re about to secure your life’s savings using cryptography they can’t prove anything about.&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;ROM-validated schemes have a pretty decent track record in practice. If ROM proofs were kicking out absurdly broken schemes every other day, we would probably have abandoned this technique. Yet we use cryptography that’s proven (only) in the ROM just about ever day — and mostly it works fine.&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;For years, many people believed that the ROM could actually be saved. This hope was driven by the fact that ROM schemes generally seemed to work pretty well when implemented with strong hash functions, and so perhaps all we needed to do was to find a hash function that was “good enough” to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eprint.iacr.org/1997/007&amp;#34;&amp;gt;make ROM proofs meaningful&amp;lt;/a&amp;gt; . Some theoreticians hoped that fancy techniques like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2014/02/21/cryptographic-obfuscation-and/&amp;#34;&amp;gt;cryptographic obfuscation&amp;lt;/a&amp;gt; could somehow be used to make concrete hashing algorithms that behaved well enough to make (some) ROM proofs instantiable.**&amp;lt;br&amp;gt;
So that’s kind of the state of the ROM, or at least — it was the state up until the late 1990s. We knew this model was artificial, and yet it stubbornly refused to explode or produce totally nonsense results.&amp;lt;br&amp;gt;
And then, in 1998, everything went south.&amp;lt;br&amp;gt;
For theoretical cryptographers, the real breaking point for the random oracle model came in the form of a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eprint.iacr.org/1998/011.pdf&amp;#34;&amp;gt;1998 STOC paper by Canetti, Goldreich and Halevi&amp;lt;/a&amp;gt; (henceforth CGH). I’m going to devote the rest of this (long!) post to explaining the gist of what they found.&amp;lt;br&amp;gt;
In this setting, the attacker actually does have access to a short, efficient program P that matches the hash function H . In practice, this function will probably be something like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/SHA-2&amp;#34;&amp;gt;SHA2&amp;lt;/a&amp;gt; or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blake2.net/&amp;#34;&amp;gt;Blake2.&amp;lt;/a&amp;gt; But even in a weird case where it’s some crazy obfuscated function, the attacker is still expected to have a program that they can efficiently evaluate. Since the attacker possesses this program, they can easily encode it into a short enough message and send it to the signing oracle.&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210928-081355/</link>
      <pubDate>Tue, 28 Sep 2021 08:13:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210928-081355/</guid>
      <description>September 22, 2021&amp;lt;br&amp;gt;
$ cosign verify-attestation -key cosign.pub gcr.io/distroless/base@sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;lt;br&amp;gt;
Verification for gcr.io/distroless/base@sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91 &amp;amp;ndash;&amp;lt;br&amp;gt;
$ rekor-cli search &amp;amp;ndash;sha sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;lt;br&amp;gt;
af7a9687d263504ccdb2759169c9903d8760775045c6e7554e365ec2bf29f6f8&amp;lt;br&amp;gt;
$ rekor-cli get &amp;amp;ndash;uuid af7a9687d263504ccdb2759169c9903d8760775045c6e7554e365ec2bf29f6f8 &amp;amp;ndash;format json | jq -r .Attestation | base64 &amp;amp;ndash;decode | jq&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;703a4726aedc9ec7a7e32251087565246db117bb9a141a7993d1c4bb4036660d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;d322ed16d530596c37eee3eb57a039677502aa71f0e4739b0272b1ebd8be9bce&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;2dfdd5bf591d0da3f67a25f3fc96d929b256d5be3e0af084db10952e5da2c661&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;dc0a793d83196a239abf3ba035b3d1a0c7a24184856c2649666e84bc82fc5980&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;c9507268813f235b11e63a7ae01526b180c94858bd718d6b4746c9c0e8425f7a&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;4af613acf571a1b86b1d3c50682caada0b82024e566c1c4c2fe485a70f3af47d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;2c4bb6b7236db0a55ec54ba8845e4031f5db2be957ac61867872bf42e56c4deb&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;deb41661be772c6256194eb1df6b526cc95a6f60e5f5b740dda2769b20778c51&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;927dd07e7373e1883469c95f4ecb31fe63c3acd104aac1655e15cfa9ae0899bf&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;f106757268ab4e650b032e78df0372a35914ed346c219359b58b3d863ad9fb58&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;aa8a0358b2813e8b48a54c7504316c7dcea59d6ae50daa0228847de852c83878&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;9acfd1fdf62b26cbd4f3c31422cf1edf3b7b01a9ecee00a499ef8b7e3536914d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;e50641dbb871f78831f9aa7ffa59ec8f44d4cc33ae4ee992c9f4b046040e97f2&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;CHAINS-GIT_COMMIT={string 976c1c9bc178ac0371d8888d69893145c3df09f0 []}&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;event_id&amp;amp;quot;: &amp;amp;quot;531c282f-806e-41e4-b3ad-b596c4283381&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;image&amp;amp;quot;: &amp;amp;quot;docker.io/library/golang@sha256:cb1a7482cb5cfc52527c5cdea5159419292360087d5249e3fe5472f3477be642&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;buildStartedOn&amp;amp;quot;: &amp;amp;quot;2021-09-16T00:03:04Z&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;buildFinishedOn&amp;amp;quot;: &amp;amp;quot;2021-09-16T00:04:36Z&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;revision&amp;amp;quot;: &amp;amp;quot;976c1c9bc178ac0371d8888d69893145c3df09f0&amp;amp;quot;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210928-081352/</link>
      <pubDate>Tue, 28 Sep 2021 08:13:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210928-081352/</guid>
      <description>Tuesday, September 14, 2021&amp;lt;br&amp;gt;
tl;dr I combined &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/fuzzilli&amp;#34;&amp;gt;Fuzzilli&amp;lt;/a&amp;gt; (an open-source JavaScript engine fuzzer), with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/TinyInst&amp;#34;&amp;gt;TinyInst&amp;lt;/a&amp;gt; (an open-source dynamic instrumentation library for fuzzing). I also added grammar-based mutation support to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/Jackalope&amp;#34;&amp;gt;Jackalope&amp;lt;/a&amp;gt; (my black-box binary fuzzer). So far, these two approaches resulted in finding three security issues in jscript9.dll (default JavaScript engine used by Internet Explorer).&amp;lt;br&amp;gt;
It comes somewhat naturally to combine the tooling I’ve been working on with techniques that have been so successful in finding JavaScript bugs, and try to use the resulting tooling to fuzz JavaScript engines for which the source code is not available. Of such engines, I know two: jscript and jscript9 (implemented in jscript.dll and jscript9.dll) on Windows, which are both used by the Internet Explorer web browser. Of these two, jscript9 is probably more interesting in the context of mutational coverage-guided fuzzing since it includes a JIT compiler and more advanced engine features.&amp;lt;br&amp;gt;
While you might think that Internet Explorer is a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blogs.windows.com/windowsexperience/2021/05/19/the-future-of-internet-explorer-on-windows-10-is-in-microsoft-edge/&amp;#34;&amp;gt;thing of the past&amp;lt;/a&amp;gt; and it doesn’t make sense to spend energy looking for bugs in it, the fact remains that Internet Explorer is still heavily exploited by real-world attackers. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786&amp;#34;&amp;gt;2020&amp;lt;/a&amp;gt; there were two Internet Explorer 0days exploited in the wild and three in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=2129022708&amp;#34;&amp;gt;2021&amp;lt;/a&amp;gt; so far . One of these vulnerabilities was in the JIT compiler of jscript9. I’ve personally vowed several times that I’m done looking into Internet Explorer, but each time, more 0days in the wild pop up and I change my mind.&amp;lt;br&amp;gt;
Edit 2021-09-20 : The version of Swift for Windows used in this project was from January 2021, when I first started working on it. Since version 5.4, Swift Package Manager is supported on Windows, so building Swift code should be much easier now. Additionally, static linking is supported for C/C&#43;&#43; code.&amp;lt;br&amp;gt;
JavaScript grammar was initially constructed by following  the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tc39.es/ecma262/#sec-grammar-summary&amp;#34;&amp;gt;ECMAScript 2022 specification&amp;lt;/a&amp;gt; . However, as always when constructing fuzzing grammars from specifications or in a (semi)automated way, this grammar was only a starting point. More manual work was needed to make the grammar output valid and generate interesting samples more frequently.&amp;lt;br&amp;gt;
The following image shows Jackalope running against jscript9.&amp;lt;br&amp;gt;
I ran Fuzzilli for several weeks on 100 cores. This resulted in finding two vulnerabilities, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2157&amp;#34;&amp;gt;CVE-2021-26419&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2168&amp;#34;&amp;gt;CVE-2021-31959&amp;lt;/a&amp;gt; . Note that the bugs that were analyzed and determined not to have security impact are not counted here. Both of the vulnerabilities found were in the bytecode generator, a part of the JavaScript engine that is typically not very well tested by generation-based fuzzing approaches. Both of these bugs were found relatively early in the fuzzing process and would be findable even by fuzzing on a single machine.&amp;lt;br&amp;gt;
Jackalope was run on a similar setup: for several weeks on 100 cores. Interestingly, at least against jscript9, Jackalope with grammar-based mutations behaved quite similarly to Fuzzilli: it was hitting a similar level of coverage and finding similar bugs. It also found CVE-2021-26419 quickly into the fuzzing process. Of course, it’s easy to re-discover bugs once they have already been found with another tool, but neither the grammar engine nor the JavaScript grammar contain anything specifically meant for finding these bugs.&amp;lt;br&amp;gt;
About a week and a half into fuzzing with Jackalope, it triggered a bug I hadn&amp;#39;t seen before, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2188&amp;#34;&amp;gt;CVE-2021-34480&amp;lt;/a&amp;gt; . This time, the bug was in the JIT compiler, which is another component not exercised very well with generation-based approaches. I was quite happy with this find, because it validated the feasibility of a grammar-based approach for finding JIT bugs.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/04/policy-and-disclosure-2021-edition.html&amp;#34;&amp;gt;Policy and Disclosure: 2021 Edition&amp;lt;/a&amp;gt; (Apr)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html&amp;#34;&amp;gt;In-the-Wild Series: October 2020 0-day discovery&amp;lt;/a&amp;gt; (Mar)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/06/ff-sandbox-escape-cve-2020-12388.html&amp;#34;&amp;gt;FF Sandbox Escape (CVE-2020-12388)&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html&amp;#34;&amp;gt;Policy and Disclosure: 2020 Edition&amp;lt;/a&amp;gt; (Jan)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html&amp;#34;&amp;gt;The Many Possibilities of CVE-2019-8646&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2017/09/the-great-dom-fuzz-off-of-2017.html&amp;#34;&amp;gt;The Great DOM Fuzz-off of 2017&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/02/exploitingscve-2015-0318sinsflash.html&amp;#34;&amp;gt;(^Exploiting)\s*(CVE-2015-0318)\s*(in)\s*(Flash$)&amp;lt;/a&amp;gt; (Feb)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/12/internet-explorer-epm-sandbox-escape.html&amp;#34;&amp;gt;Internet Explorer EPM Sandbox Escape CVE-2014-6350&amp;lt;/a&amp;gt; (Dec)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/11/pwn4fun-spring-2014-safari-part-ii.html&amp;#34;&amp;gt;pwn4fun Spring 2014 - Safari - Part II&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/11/project-zero-patch-tuesday-roundup.html&amp;#34;&amp;gt;Project Zero Patch Tuesday roundup, November 2014&amp;lt;/a&amp;gt; (Nov)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/09/exploiting-cve-2014-0556-in-flash.html&amp;#34;&amp;gt;Exploiting CVE-2014-0556 in Flash&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html&amp;#34;&amp;gt;The poisoned NUL byte, 2014 edition&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2014/07/pwn4fun-spring-2014-safari-part-i_24.html&amp;#34;&amp;gt;pwn4fun Spring 2014 - Safari - Part I&amp;lt;/a&amp;gt; (Jul)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>/var/blog | blogging data from aditya mukerjee</title>
      <link>https://www.whatsupup.com/blog/nuncle/haw/20210928-081339/</link>
      <pubDate>Tue, 28 Sep 2021 08:13:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nuncle/haw/20210928-081339/</guid>
      <description>&amp;lt;p&amp;gt;$ echo -n “resp_success:1|c|#method:post” | nc -4u localhost 8126&amp;lt;br&amp;gt;
$ veneur-emit -hostport udp://localhost:8126 -count 1 -name &amp;amp;quot;resp_success&amp;amp;quot; -tag &amp;amp;quot;method:post&amp;amp;quot;&amp;lt;br&amp;gt;
args : [&amp;amp;quot;-c&amp;amp;quot;, &amp;amp;quot;while true; do veneur-emit -hostport udp://localhost:8126 -count 1 -name &amp;#39;my.test.metric&amp;#39;; sleep 10; done&amp;amp;quot;]&amp;lt;br&amp;gt;
That’s the first container in our pod, and if we deploy it as-is, it’ll start faithfully firing off UDP metrics on port 8126. But there’s nothing listening on that port, so it’s just talking into the void. Let’s give it an audience by adding a second container in the same pod:&amp;lt;br&amp;gt;
In addition, we listen for UDP packets on port 8126 to receive the metrics, and we also listen for HTTP traffic on port 8127. Port 8127 is used for the healthcheck endpoint. It can also be used to listen for metrics that are emitted over TCP using authenticated TLS instead of UDP, but we won’t cover that here, as it’s not needed for most Kubernetes deployments.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.flickr.com/photos/tmab2003/3241889036&amp;#34;&amp;gt;Photo CC-BY TMAB2003.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.saucontds.com/%E2%80%8E&amp;#34;&amp;gt;Saucon TDS&amp;lt;/a&amp;gt; uses OpenDNS for DNS lookups, but they redirect undesired lookups to their block page. I confirmed this by asking my neighbor across the aisle to visit drive.google.com – he happened to be using Safari, which gave him a 404-eque page instead of the big red error message that Chrome gave, but that was enough for me to confirm that the bus was, indeed, hijacking traffic on Port 53.&amp;lt;br&amp;gt;
First, Alice flips a coin, but keeps the result of the coin flip secret. Let’s say that ‘H’ is 1, and ’T’ is 0.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Internal Register | Software and hardware projects for fun from a guy who loves retro computing</title>
      <link>https://www.whatsupup.com/blog/giuseppe/fibroma/20210928-081332/</link>
      <pubDate>Tue, 28 Sep 2021 08:13:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/giuseppe/fibroma/20210928-081332/</guid>
      <description>2021-08-08 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2021/08/08/Another-Homebrew-Console.html&amp;#34;&amp;gt;Another ‘Homebrew’ Video Game Console&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-09-29 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/09/29/Console-Video.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-09-29 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/09/29/Console-PPU-Simulator.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - PPU Simulator&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-07-26 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/07/26/Console-CPU.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - CPU Board&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-03-14 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/03/14/Homebrew-Console.html&amp;#34;&amp;gt;Building a ‘Homebrew’ Video Game Console&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays - Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20210928-081303/</link>
      <pubDate>Tue, 28 Sep 2021 08:13:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20210928-081303/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/going-up-the-hill/&amp;#34;&amp;gt;Going up the hill&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/part-two-i-sell-onions-on-the-internet/&amp;#34;&amp;gt;part two, I sell onions on the Internet&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/building-from-a-place-of-surrender/&amp;#34;&amp;gt;Building from a place of surrender&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/behind-the-scenes-carpet-pad-recycling-business-1997/&amp;#34;&amp;gt;Behind the scenes of a carpet pad recycling business in 1997&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/building-things-that-do-just-one-thing/&amp;#34;&amp;gt;Building things that do [ just one thing ]&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/let-go-then-go/&amp;#34;&amp;gt;Let go, then go&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/must-ride-mule-to-from-work-location/&amp;#34;&amp;gt;Must ride mule (to &amp;amp;amp; from) work location&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/benevolent-uplifting-cuss-words/&amp;#34;&amp;gt;Benevolent, uplifting cuss words&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/give-me-grunt-work/&amp;#34;&amp;gt;Give me grunt work&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/dude-that-built-duderanch-com/&amp;#34;&amp;gt;The dude that built DudeRanch.com&amp;lt;/a&amp;gt; : 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/i-sell-onions-on-the-internet/&amp;#34;&amp;gt;I sell onions on the Internet&amp;lt;/a&amp;gt; : 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/slow-down-wander/&amp;#34;&amp;gt;Slow down &amp;amp;amp; wander&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/window-shopping-expired-domain-names/&amp;#34;&amp;gt;Window shopping for expired Domain Names&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/build-a-side-business/&amp;#34;&amp;gt;Want to build a side business? Just buy a great Domain Name&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&amp;&gt; /dev/null</title>
      <link>https://www.whatsupup.com/blog/airbrush/misogynic/20210928-081248/</link>
      <pubDate>Tue, 28 Sep 2021 08:12:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/airbrush/misogynic/20210928-081248/</guid>
      <description>&amp;lt;p&amp;gt;© 2020 George Hilliard&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-fun-and-profit/&amp;#34;&amp;gt;Hacking Reolink cameras for fun and profit&amp;lt;/a&amp;gt; May 16, 2020 Dragging Reolink, kicking and screaming, into the light of the open-standards day&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/05/mastering-embedded-linux-part-5-platform-daemons/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 5: Platform Daemons&amp;lt;/a&amp;gt; May 02, 2020 Writing a custom program that talks to hardware&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/03/mastering-embedded-linux-part-4-adding-features/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 4: Adding Features&amp;lt;/a&amp;gt; Mar 11, 2020 How to make your embedded system do something useful&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/02/trying-the-allwinner-f1c200s/&amp;#34;&amp;gt;Trying the Allwinner F1C200s&amp;lt;/a&amp;gt; Feb 29, 2020 Continuing experiments with inexpensive Allwinner processors&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/01/the-wave-particle-duality-of-git-commits/&amp;#34;&amp;gt;The Wave/Particle Duality of Git Commits&amp;lt;/a&amp;gt; Jan 20, 2020 Yet another way to think of&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2020/01/mastering-embedded-linux-part-3-buildroot/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 3: Buildroot&amp;lt;/a&amp;gt; Jan 14, 2020 Compiling a Linux OS from source code with the Buildroot distribution&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/mastering-embedded-linux-part-2-hardware/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 2: Hardware&amp;lt;/a&amp;gt; Dec 28, 2019 Diving deeper into the hardware powering cheap embedded Linux systems&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/designing-my-linux-business-card/&amp;#34;&amp;gt;Designing My Linux-Powered Business Card&amp;lt;/a&amp;gt; Dec 23, 2019 Behind-the-scenes build log for my Linux-powered business card&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/12/my-business-card-runs-linux/&amp;#34;&amp;gt;My Business Card Runs Linux&amp;lt;/a&amp;gt; Dec 23, 2019 In which I build a Linux computer cheap enough to give away&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thirtythreeforty.net/posts/2019/08/mastering-embedded-linux-part-1-concepts/&amp;#34;&amp;gt;Mastering Embedded Linux, Part 1: Concepts&amp;lt;/a&amp;gt; Aug 25, 2019 A high-level introduction to concepts in hacking cheap embedded Linux systems&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210928-081241/</link>
      <pubDate>Tue, 28 Sep 2021 08:12:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210928-081241/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/26/Rock-and-Roll&amp;#34;&amp;gt;Rock Decades&amp;lt;/a&amp;gt; · On Saturday September 25 th , 2021, we went to a concert by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulpigat.com/cousin-harley/&amp;#34;&amp;gt;Cousin Harley&amp;lt;/a&amp;gt; featuring &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulpigat.com/paul-pigat/#about&amp;#34;&amp;gt;Paul Pigat&amp;lt;/a&amp;gt; . The last live indoor music we’d seen was March 8, 2020, which is     to say a gap of 566 days.  Speaking of gaps, 2021 marks, more or     less, both seventy years of Rock ’n’ Roll and 50 years of my loving it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/26/Rock-and-Roll&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/05/Western-Electric&amp;#34;&amp;gt;Western Electric&amp;lt;/a&amp;gt; · At 6:30 PM on Wednesday August 4 th my 15-year-old daughter and I pulled up the Jaguar I-Pace electric car     in front of my 91-year-old Mom’s place in Regina, Saskatchewan. I was tired and achey because I’d just finished driving 1,725km     (1,072 miles) across two days to see her for the first time since Covid started.  I was happy to see Mom, happy about the first road-trip in a     long time, and happy to have tested the hypothesis that, in 2021, a fully-electric vehicle can handle long-haul travel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/05/Western-Electric&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [16 comments]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/29/Under-and-Over&amp;#34;&amp;gt;CL XL: Under and Over&amp;lt;/a&amp;gt; · Wow, the last &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/What/The%20World/Cottage%20Life/&amp;#34;&amp;gt;Cottage Life&amp;lt;/a&amp;gt; piece was in 2019, suggesting there     was no such thing in 2020. And, what with Covid, there was less. While this story happened in situ , it’s really about something else: How much residential construction and software are like each other, and share     the same really-important rule: Underpromise and overdeliver. [Includes compulsory nature shots.] &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/29/Under-and-Over&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/17/Music-Notes&amp;#34;&amp;gt;Music Notes&amp;lt;/a&amp;gt; · Herewith notes on what I’m listening to in 2021, and why that’s a problem.  With recommendations both for music and for     things we can do to keep it alive &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/17/Music-Notes&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [11 comments]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/12/Slow-M1&amp;#34;&amp;gt;Where’s the Apple M2?&amp;lt;/a&amp;gt; · DPReview just published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.dpreview.com/opinion/5834413552/apple-still-hasnt-made-a-truly-pro-m1-mac&amp;#34;&amp;gt;Apple still hasn&amp;#39;t made a truly     “Pro” M1 Mac – so what’s the holdup?&amp;lt;/a&amp;gt; Following on the good performance and awesome power efficiency of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Apple_M1&amp;#34;&amp;gt;Apple M1&amp;lt;/a&amp;gt; , there’s a hungry background rumble in Mac-land along the lines of     “Since the M1 is an entry-level chip, the next CPU is gonna blow everyone’s mind!”     But it’s been eight months since the M1 shipped and we haven’t heard from Apple.  I have a good guess what’s     going on: It’s proving really hard to make a CPU (or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/System_on_a_chip&amp;#34;&amp;gt;SoC&amp;lt;/a&amp;gt; ) that’s perceptibly faster than the M1.     Here’s why &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/12/Slow-M1&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [7 comments]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/01/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to the June 2021 issue of&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/LP-Victory&amp;#34;&amp;gt;LP Victory&amp;lt;/a&amp;gt; · Some readers may remember &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/201x/2019/02/23/LP-Log&amp;#34;&amp;gt;a February 2019&amp;lt;/a&amp;gt; blog post describing how I inherited 900 or so used LPs,     mostly classical. As of this week, I’ve listened to all of them (or rejected them out of hand), and kept 220 or so (counting methods were     imperfect). Herewith lessons and reconfigurations.  Also there’s a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/Fourteen-Classics&amp;#34;&amp;gt;companion piece&amp;lt;/a&amp;gt; on sixteen albums I especially liked &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/LP-Victory&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/&amp;#34;&amp;gt;When?&amp;lt;/a&amp;gt; (5112 fragments) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/What/&amp;#34;&amp;gt;What?&amp;lt;/a&amp;gt; (342 categories)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>SIGPIPE 13</title>
      <link>https://www.whatsupup.com/blog/alveolar/cozey/20210928-081238/</link>
      <pubDate>Tue, 28 Sep 2021 08:12:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alveolar/cozey/20210928-081238/</guid>
      <description>Update 2011-01-27: Recent versions of Mac OS X make these replacements obsolete.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Slate Star Codex</title>
      <link>https://www.whatsupup.com/blog/kyat/underwrite/20210928-081234/</link>
      <pubDate>Tue, 28 Sep 2021 08:12:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kyat/underwrite/20210928-081234/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/top-posts/&amp;#34;&amp;gt;Top Posts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2021/01/21/introducing-astral-codex-ten/&amp;#34;&amp;gt;January 21, 2021&amp;lt;/a&amp;gt; by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/author/admin2/&amp;#34;&amp;gt;Scott Alexander&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
[EDIT 2/13/21: This post is originally from June 2020, but there’s been renewed interest in it because the NYT article involved just came out. This post says the NYT was going to write a positive article, which was the impression I got in June 2020. The actual article was very negative; I feel this was as retaliation for writing this post, but I can’t prove it. I feel I was misrepresented by slicing and dicing quotations in a way that made me sound like a far-right nutcase; I am actually a liberal Democrat who voted for Warren in the primary and Biden in the general, and I generally hold pretty standard center-left views in support of race and gender equality. You can read my full statement defending against the Times’ allegations &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://astralcodexten.substack.com/p/statement-on-new-york-times-article&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . To learn more about this blog and read older posts, go to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/about/&amp;#34;&amp;gt;the About page&amp;lt;/a&amp;gt; .]&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The Representative For Gerontocracy is supposedly the oldest person in the country who is medically fit and willing to serve, but this has been so hard to sort out that in practice they are selected by the national retirees’ special interest group from the pool of willing candidates above age 90.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Posted on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2020/06/16/open-thread-156-25/&amp;#34;&amp;gt;June 16, 2020&amp;lt;/a&amp;gt; by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/author/bughimamborag/&amp;#34;&amp;gt;a reader&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
But every so often, somebody tries to do things the proper way. Go over decades of research into what makes psychiatric drugs work and how they could work better. Figure out the hypothetical properties of the ideal psych drug. Figure out a molecule that matches those properties. Synthesize it and see what happens. This was the vision of vortioxetine and vilazodone, two antidepressants from the early 2010s. They were approved by the FDA, sent to market, and prescribed to millions of people. Now it’s been enough time to look back and give them a fair evaluation. And…&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
1. Comment of the week: superkamiokande from the subreddit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reddit.com/r/slatestarcodex/comments/h7egp3/wordy_wernickes/fumiaix/&amp;#34;&amp;gt;explains the structural and computational differences between Wernicke’s and Broca’s areas&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
2. There’s another SSC virtual meetup next week, guest speaker Robin Hanson. More information &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cephalopods.blog/2020/04/12/ssc-lesswrong-meetup/&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
3. As many areas reopen, local groups will have to decide whether or not to restart in-person meetups. I can’t speak to other countries that may have things more under control, but in the US context, I am against this. Just because it’s legal to hold medium-sized gatherings now doesn’t mean it’s a good idea. I would feel really bad if anyone became sick or spread the pandemic because of my blog. I don’t control local groups, and they can do what they want, but I won’t be advertising meetups on the blogroll until I feel like they’re safe. Exceptions for East Asia, New Zealand, and anyone else who can convince me that their country is in the clear.&amp;lt;br&amp;gt;
4. Some people have noticed that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2014/12/17/the-toxoplasma-of-rage/&amp;#34;&amp;gt;my toxoplasma post&amp;lt;/a&amp;gt; seems disconfirmed by recent protests, which reached national scale even though the incident was very clear-cut and uncontroversial. I agree this is some negative evidence. The toxoplasma model was meant to be a tendency, not a 100% claim about things always work. Certainly it is still mysterious in general why some outrageous incidents spark protests and other near-identical ones don’t. I think it’s relevant that everyone is in a bad place right now because of coronavirus (remember, just two months ago Marginal Revolution posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://marginalrevolution.com/marginalrevolution/2020/04/when-will-the-riots-begin.html&amp;#34;&amp;gt;When Will The Riots Begin?&amp;lt;/a&amp;gt; ), and that 2020 is the peak of Turchin’s fifty-year &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2019/09/02/book-review-ages-of-discord/&amp;#34;&amp;gt;cycle of conflict&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
5. Speaking of protests, the open threads have been getting pretty intense lately. I realize some awful stuff has been going on, and emotions are really high, but I want everyone to take a deep breath and try to calm down a little bit before saying anything you’ll regret later. I will be enforcing the usually-poorly-enforced ban on culture war topics in this thread with unrecorded deletions. I may or may not suspend the next one or two hidden threads to give everyone a chance to calm down. I hope everybody is staying safe and sane during these difficult times.&amp;lt;br&amp;gt;
6. If you haven’t already taken last week’s nootropics survey, and you are an experienced user of nootropics, you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2020/06/07/take-the-new-nootropics-survey/&amp;#34;&amp;gt;take it now&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I would be failing my brand if I didn’t write something about GPT-3, but I’m not an expert and discussion is still in its early stages. Consider this a summary of some of the interesting questions I’ve heard posed elsewhere, especially comments by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gwern.net/newsletter/2020/05&amp;#34;&amp;gt;gwern&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nostalgebraist.tumblr.com/post/619672884731904000/gpt-3-and-scaling-trends&amp;#34;&amp;gt;nostalgebraist&amp;lt;/a&amp;gt; . Both of them are smart people who I broadly trust on AI issues, and both have done great work with GPT-2. Gwern has gotten it to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2019/03/14/gwerns-ai-generated-poetry/&amp;#34;&amp;gt;write poetry&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gwern.net/GPT-2-music&amp;#34;&amp;gt;compose music&amp;lt;/a&amp;gt; , and even &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2020/01/06/a-very-unlikely-chess-game/&amp;#34;&amp;gt;sort of play some chess&amp;lt;/a&amp;gt; ; nostalgebraist has created &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nostalgebraist-autoresponder.tumblr.com/&amp;#34;&amp;gt;nostalgebraist-autoresponder&amp;lt;/a&amp;gt; (a Tumblr written by GPT-2 trained on nostalgebraist’s own Tumblr output). Both of them disagree pretty strongly on the implications of GPT-3. I don’t know enough to resolve that disagreement, so this will be a kind of incoherent post, and hopefully stimulate some more productive comments. So:&amp;lt;br&amp;gt;
OpenAI has released a new paper, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arxiv.org/pdf/2005.14165.pdf&amp;#34;&amp;gt;Language Models Are Few-Shot Learners&amp;lt;/a&amp;gt; , introducing GPT-3, the successor to the wildly-successful language-processing AI GPT-2.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Before we get into the weeds, let’s get a quick gestalt impression of how GPT-3 does compared to GPT-2.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
After two days of intense debate, the United Methodist Church has agreed to a historic split – one that is expected to end in the creation of a new denomination, one that will be “theologically and socially conservative,” according to the Washington Post. The majority of delegates attending the church’s annual General Conference in May voted to strengthen a ban on the ordination of LGBTQ clergy and to write new rules that will “discipline” clergy who officiate at same-sex weddings. But those who opposed these measures have a new plan: They say they will form a separate denomination by 2020, calling their church the Christian Methodist denomination.&amp;lt;br&amp;gt;
The Post notes that the denomination, which claims 12.5 million members, was in the early 20th century the “largest Protestant denomination in the US”, but that it has been shrinking in recent decades. The new split will be the second in the church’s history. The first occurred in 1968, when roughly 10% of the denomination left to form the Evangelical United Brethren Church. The Post notes that the proposed split “comes at a critical time for the church, which has been losing members for years,” which has been “pushed toward the brink of a schism over the role of LGBTQ people in the church.” Gay marriage is not the only issue that has divided the church. In 2016, the denomination was split over ordination of transgender clergy, with the North Pacific regional conference voting to ban them from serving as clergy, and the South Pacific regional conference voting to allow them.&amp;lt;br&amp;gt;
In case you’re wondering, no, the Methodist Church did not really split from the Evangelical United Brethren Church in 1968, it merged with it in that year. GPT-3 is doing what I used to do on essay questions – throw out a bunch of half-remembered names and dates and hope nobody looks too closely at the exact relations.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
My ten favorite animals are: 1. Zebras with a white scar on the back 2. Insiduous spiders and octopus 3. Frog with large leaves, hopefully black 4. Cockatiel with scales 5. Razorbill with wings hanging about 4 inches from one’s face and a heart tattoo on a frog 3. Cockatric interlocking tetrabods that can be blind, cut, and eaten raw: 4. Black and white desert crocodiles living in sunlight 5. Zebra and many other pea bugs&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
“Zero-shot” means you just type in “20 &#43; 20 = ?”. “One-shot” means you give it an example first: “10 &#43; 10 = 20. 20 &#43; 20 = ?” “Few-shot” means you give it as many examples as it can take. Even the largest and best model only does mediocre on the zero-shot task, but it does better on the one-shot and best on the few-shot. So it seems like if you remind it what addition is a couple of times before solving an addition problem, it does better. This suggests that there is a working model of addition somewhere within the bowels of this 175 billion parameter monster, but it has a hard time drawing it out for any particular task. You need to tell it “addition” “we’re doing addition” “come on now, do some addition!” up to fifty times before it will actually deploy its addition model for these problems, instead of some other model. Maybe if you did this five hundred or five thousand times, it would excel at the problems it can’t do now, like adding five digit numbers. But why should this be so hard? The plus sign almost always means addition. “20 &#43; 20 = ?” is not some inscrutable hieroglyphic text. It basically always means the same thing. Shouldn’t this be easy?&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
[EDIT: an alert reader points out that when GPT-3 fails at addition problems, it fails in human-like ways – for example, forgetting to carry a 1.]&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
— 𝔊𝔴𝔢𝔯𝔫 (@gwern) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/gwern/status/1267215588214136833?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;May 31, 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
And how many parameters does the adult human brain have? The responsible answer is that brain function doesn’t map perfectly to neural net function, and even if it did we would have no idea how to even begin to make this calculation. The irresponsible answer is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.piekniewski.info/2018/08/28/fun-numbers-about-the-brain/&amp;#34;&amp;gt;a hundred trillion&amp;lt;/a&amp;gt; . That’s a big number. But at the current rate of GPT progress, a GPT will have that same number of parameters somewhere between GPT-4 and GPT-5. Given the speed at which OpenAI works, that should happen about two years from now.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A few years ago I surveyed nootropics users about their experiences with different substances and posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slatestarcodex.com/2016/03/01/2016-nootropics-survey-results/&amp;#34;&amp;gt;the results&amp;lt;/a&amp;gt; here. Since then lots of new nootropics have come out, so I’m doing it again. If you have nootropics experience, please take &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://forms.gle/6yLP6qU818hRSgUc7&amp;#34;&amp;gt;The 2020 SSC Nootropics Survey&amp;lt;/a&amp;gt; . Expected completion time is ~15 minutes.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>the mango zone</title>
      <link>https://www.whatsupup.com/blog/canton/ricketier/20210928-081221/</link>
      <pubDate>Tue, 28 Sep 2021 08:12:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/canton/ricketier/20210928-081221/</guid>
      <description>I talk about my exemplary performance in the Do Not Get Arrested Challenge 2020, and share some tips and tricks for future participants. Not a talk video, I&amp;#39;m a fraud.&amp;lt;br&amp;gt;
Come on down to luigi town, we&amp;#39;ve got: the 2013 tumblr hack, linkedin roasting, your sweet mango boy, one loopy b o i, regrets&amp;lt;br&amp;gt;
At PyCon AU 2016. For the record, this is creepy and I think doing it is not okay!&amp;lt;br&amp;gt;
Generates SICK 2003 usernames like [MTNDEW]xxX_m@ng0PdF_Xxx.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>meh.</title>
      <link>https://www.whatsupup.com/blog/cohere/laid/20210928-081114/</link>
      <pubDate>Tue, 28 Sep 2021 08:11:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/cohere/laid/20210928-081114/</guid>
      <description>2021-02-28&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210928-081055/</link>
      <pubDate>Tue, 28 Sep 2021 08:10:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210928-081055/</guid>
      <description>Marc co-created the highly influential Mosaic internet browser and co-founded Netscape, which later sold to AOL for $4.2 billion. He also co-founded Loudcloud, which as Opsware, sold to Hewlett-Packard for $1.6 billion. He later served on the board of Hewlett-Packard from 2008 to 2018.&amp;lt;br&amp;gt;
Before Web 3, users and builders had to choose between the limited functionality of Web 1 or the corporate, centralized model of Web 2.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20210928-081027/</link>
      <pubDate>Tue, 28 Sep 2021 08:10:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20210928-081027/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jimio&amp;#34;&amp;gt;jimio&amp;lt;/a&amp;gt; on 10 Aug 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/junh3&amp;#34;&amp;gt;junh3&amp;lt;/a&amp;gt; on 04 May 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 21 Apr 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/junh3&amp;#34;&amp;gt;junh3&amp;lt;/a&amp;gt; on 13 Apr 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 04 Feb 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 23 Dec 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/randall-signal&amp;#34;&amp;gt;randall-signal&amp;lt;/a&amp;gt; on 14 Dec 2020&amp;lt;br&amp;gt;
2020 has seen its fair number of challenges and changes. We’ve all adapted to new ways of staying in touch, getting work done, celebrating birthdays and weddings, and even exercising. As more and more of our critical and personal moments move online, we want to continue to provide you with new ways to share and connect privately.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/randall-signal&amp;#34;&amp;gt;randall-signal&amp;lt;/a&amp;gt; on 28 Oct 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/greggcorp&amp;#34;&amp;gt;greggcorp&amp;lt;/a&amp;gt; on 26 Oct 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/peter-signal&amp;#34;&amp;gt;peter-signal&amp;lt;/a&amp;gt; on 20 Oct 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 13 Aug 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 01 Jul 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/junh3&amp;#34;&amp;gt;junh3&amp;lt;/a&amp;gt; on 23 Jun 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 12 Jun 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/imperiopolis&amp;#34;&amp;gt;imperiopolis&amp;lt;/a&amp;gt; on 09 Jun 2020&amp;lt;br&amp;gt;
One immediate thing seems clear about 2020: it’s a good year to cover your face. Online, we’re working to scale and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/blur-tools/&amp;#34;&amp;gt;improve Signal&amp;lt;/a&amp;gt; for everyone that is relying on it, but as one small offline way to help support everyone self-organizing for change in the streets, we’re also distributing face coverings free of charge.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 05 Jun 2020&amp;lt;br&amp;gt;
One immediate thing seems clear: 2020 is a pretty good year to cover your face.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/randall-signal&amp;#34;&amp;gt;randall-signal&amp;lt;/a&amp;gt; on 19 May 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 08 Apr 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jimio&amp;#34;&amp;gt;jimio&amp;lt;/a&amp;gt; on 27 Jan 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/alan-signal&amp;#34;&amp;gt;alan-signal&amp;lt;/a&amp;gt; on 13 Jan 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 06 Jan 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 19 Dec 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jimio&amp;#34;&amp;gt;jimio&amp;lt;/a&amp;gt; on 09 Dec 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 27 Nov 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 29 Oct 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 01 May 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 21 Feb 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/scottnonnenberg&amp;#34;&amp;gt;scottnonnenberg&amp;lt;/a&amp;gt; on 31 Oct 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 26 Sep 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jlund&amp;#34;&amp;gt;jlund&amp;lt;/a&amp;gt; on 06 Sep 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 13 Mar 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 13 Jan 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 17 Nov 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 11 Oct 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 08 Jul 2016&amp;lt;br&amp;gt;
Our Signal Protocol libraries are open source, licensed GPLv3. We like the GPL for the quality control that it provides. If someone publicly says that they’re using our software, we want to see if they’ve made any modifications, and whether they’re using it correctly. This helps to increase transparency and accountability in deployments of our software, which we feel are important for end-to-end encryption.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 07 Apr 2016&amp;lt;br&amp;gt;
Over the past year, we’ve been progressively rolling out Signal Protocol support for all WhatsApp communication across all WhatsApp clients. This includes chats, group chats, attachments, voice notes, and voice calls across Android, iPhone, Windows Phone, Nokia S40, Nokia S60, Blackberry, and BB10.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/riyapenn&amp;#34;&amp;gt;riyapenn&amp;lt;/a&amp;gt; on 18 Aug 2015&amp;lt;br&amp;gt;
It’s 2015, and the end of the road for encrypted SMS/MMS in TextSecure.&amp;lt;br&amp;gt;
The TextSecure story started back in 2009, at the dawn of the smartphone era. Back then, TextSecure focused on securing the transport that everyone coming from feature phones was familiar with: SMS. Today, many things have changed, and TextSecure now emphasizes the “TextSecure transport,” which uses data rather than SMS. While we remain committed to supporting plaintext SMS/MMS in addition to the encrypted TextSecure transport so that the app can function as a unified messenger, we are beginning the process of phasing out support for SMS/MMS as an encrypted transport in favor of the TextSecure data protocol.&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/greggawatt&amp;#34;&amp;gt;greggawatt&amp;lt;/a&amp;gt; on 31 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/lconnolly&amp;#34;&amp;gt;lconnolly&amp;lt;/a&amp;gt; on 30 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rhodey&amp;#34;&amp;gt;rhodey&amp;lt;/a&amp;gt; on 29 Jan 2015&amp;lt;br&amp;gt;
on 28 Jan 2015&amp;lt;br&amp;gt;
The 1988 film &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.imdb.com/title/tt0096256/?ref_=nv_sr_1&amp;#34;&amp;gt;They Live&amp;lt;/a&amp;gt; is one of the last great masterpieces to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=18qD9hmU9xg&amp;#34;&amp;gt;come out of the Hollywood left&amp;lt;/a&amp;gt; . In the film, a drifter named John Nada discovers a box of sunglasses that, when worn, allows the wearer to really see the world around him.&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/kmonkeyjam&amp;#34;&amp;gt;kmonkeyjam&amp;lt;/a&amp;gt; on 26 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/joyceyan&amp;#34;&amp;gt;joyceyan&amp;lt;/a&amp;gt; on 24 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jackflips&amp;#34;&amp;gt;jackflips&amp;lt;/a&amp;gt; on 23 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/uxyoko&amp;#34;&amp;gt;uxyoko&amp;lt;/a&amp;gt; on 22 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rileyjshaw&amp;#34;&amp;gt;rileyjshaw&amp;lt;/a&amp;gt; on 21 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jessysaurusrex&amp;#34;&amp;gt;jessysaurusrex&amp;lt;/a&amp;gt; on 20 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 19 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/trevp&amp;#34;&amp;gt;trevp&amp;lt;/a&amp;gt; on 18 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/abolishme&amp;#34;&amp;gt;abolishme&amp;lt;/a&amp;gt; on 17 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 16 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/TheBlueMatt&amp;#34;&amp;gt;TheBlueMatt&amp;lt;/a&amp;gt; on 15 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/elchao96&amp;#34;&amp;gt;elchao96&amp;lt;/a&amp;gt; on 14 Jan 2015&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/turtlekiosk&amp;#34;&amp;gt;turtlekiosk&amp;lt;/a&amp;gt; on 13 Jan 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/winter-lineup-2014/&amp;#34;&amp;gt;Winter Of Code Lineup 2014-2015&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rhodey&amp;#34;&amp;gt;rhodey&amp;lt;/a&amp;gt; on 21 Jul 2014&amp;lt;br&amp;gt;
Spring Break of Code 2013 I cut open my foot and hand while surfing; both wounds easily warranted stitches. Winter Break of Code 2014 I banged the top of my foot surfing over some coral; the cuts were sealed within minutes. Spring Break of Code 2013 I struggled with the Android SDK, while Winter Break of Code 2014 I caught myself taking a few too many short-cuts. On day zero nothing is easy, but over time you improve, spilling a little less blood every time.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/meskio&amp;#34;&amp;gt;meskio&amp;lt;/a&amp;gt; on 12 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 10 Jan 2014&amp;lt;br&amp;gt;
At the Open Whisper Systems &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://whispersystems.org/blog/sure/&amp;#34;&amp;gt;spring break of code&amp;lt;/a&amp;gt; in 2013, I started work on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/signalapp/TextSecure-iOS&amp;#34;&amp;gt;TextSecure iOS&amp;lt;/a&amp;gt; . People are chomping at the bit to use our software on iOS. After a hiatus from the project, I’ve been happy to return to it over the last few months, joining some other contributors, including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fredericjacobs.com/&amp;#34;&amp;gt;Frederic Jacobs&amp;lt;/a&amp;gt; as co-lead, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/nabla-c0d3&amp;#34;&amp;gt;Alban Diquet&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.cvursache.com/&amp;#34;&amp;gt;Claudiu-Vlad Ursache&amp;lt;/a&amp;gt; submitting pull requests, even over the holidays, with important cryptographic storage and UI-polishing contributions, and Bitcoin donations coming in from around the world.&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/mkhandekar&amp;#34;&amp;gt;mkhandekar&amp;lt;/a&amp;gt; on 09 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 08 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/mcginty&amp;#34;&amp;gt;mcginty&amp;lt;/a&amp;gt; on 07 Jan 2014&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/meskio&amp;#34;&amp;gt;meskio&amp;lt;/a&amp;gt; on 22 Oct 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 27 Sep 2013&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/moxie0&amp;#34;&amp;gt;moxie0&amp;lt;/a&amp;gt; on 22 Aug 2013&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/emblem&amp;#34;&amp;gt;emblem&amp;lt;/a&amp;gt; on 30 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/abolishme&amp;#34;&amp;gt;abolishme&amp;lt;/a&amp;gt; on 29 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/corbett&amp;#34;&amp;gt;corbett&amp;lt;/a&amp;gt; on 28 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/liliakai&amp;#34;&amp;gt;liliakai&amp;lt;/a&amp;gt; on 27 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/rhodey&amp;#34;&amp;gt;rhodey&amp;lt;/a&amp;gt; on 26 Mar 2013&amp;lt;br&amp;gt;
A guest post by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/isislovecruft&amp;#34;&amp;gt;isislovecruft&amp;lt;/a&amp;gt; on 25 Mar 2013&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/emblem&amp;#34;&amp;gt;emblem&amp;lt;/a&amp;gt; on 18 Feb 2013&amp;lt;br&amp;gt;
Whisper Systems was a company focused on the development of mobile security software, which was acquired by Twitter in late 2011. Twitter very generously made some of the Whisper Systems software available under an Open Source license (GPLv3), which has since been under open development by the community. The software has seen a number of new releases based on that open development, and we’ve been calling the project for this continued work “Open Whisper Systems.” Welcome to the project’s new home.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210928-080951/</link>
      <pubDate>Tue, 28 Sep 2021 08:09:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210928-080951/</guid>
      <description>Rough notes for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-08-27/slack-crashes-secret-stderr.html&amp;#34;&amp;gt;Slack&amp;#39;s Secret STDERR Messages&amp;lt;/a&amp;gt; , where I used eBPF and other tools to debug Slack&amp;#39;s mysterious crashes (2021).&amp;lt;br&amp;gt;
Slides for my eBPF Summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-ebpf-getting-started-2021&amp;#34;&amp;gt;Performance Wins with eBPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-ebpf-getting-started-2021&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/eBPFSummit2021_eBPF_performance_getting_started.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bGAVrtb_tFs&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
Slides for my Facebook Systems@Scale talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/systemsscale-2021-bpf-performance-getting-started&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/systemsscale-2021-bpf-performance-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/Scale2021_BPF_performance_getting_started_2021.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/atscaleevents/videos/536868690830345&amp;#34;&amp;gt;video&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
My plenary talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;Computing Performance: On the Horizon&amp;lt;/a&amp;gt; for the USENIX LISA 2021 conference, covering the present and future of processors, memory, disks, networking, hypervisors, and more. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/computing-performance-on-the-horizon-2021&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2021_ComputingPerformance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-03/how-to-add-bpf-observability.html&amp;#34;&amp;gt;How To Add eBPF Observability To Your Product&amp;lt;/a&amp;gt; aimed at those adding it to commercial or internal observability platforms (2021).&amp;lt;br&amp;gt;
A 122-slide talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;BPF Internals (eBPF)&amp;lt;/a&amp;gt; for the USENIX LISA 2021 conference, where I show all the steps from the high-level bpftrace language to machine code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/bpf-internals-ebpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2021_BPF_Internals.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_5Z2AU7QTH4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
As it has become an FAQ, a post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-05-23/what-is-observability.html&amp;#34;&amp;gt;What is Observability&amp;lt;/a&amp;gt; , a term myself and other performance engineers have used since before it was popular (2021).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2020-11-04/bpf-co-re-btf-libbpf.html&amp;#34;&amp;gt;BPF binaries: BTF, CO-RE, and the future of eBPF perf tools&amp;lt;/a&amp;gt; (2020).&amp;lt;br&amp;gt;
Slides for my eBPF summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-bpf-getting-started&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; , where I showed how to get started the easy way, as I kept seeing people start the hard way waste their own time ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-bpf-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/eBPF2020_performance_getting_started.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=wyfhjr_ufag&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2020).&amp;lt;br&amp;gt;
Slides for my YOW2020 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2020-linux-systems-performance&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , delivered online ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2020-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/YOW2020_Linux_Systems_Performance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_Lf-h5TDTN0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2020).&amp;lt;br&amp;gt;
My latest book website: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/systems-performance-2nd-edition-book.html&amp;#34;&amp;gt;Systems Performance: Enterprise and the Cloud, Second Edition&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2020-07-15/systems-performance-2nd-edition.html&amp;#34;&amp;gt;blog post&amp;lt;/a&amp;gt; about it. The publisher is Addison-Wesley, and the draft book is over 800 pages. This updates the Linux and cloud content, and adds chapters on perf, Ftrace, and BPF (2020).&amp;lt;br&amp;gt;
In my post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2019-12-22/bpf-theremin.html&amp;#34;&amp;gt;BPF Theremin, Tetris, and Typewriters&amp;lt;/a&amp;gt; I share the source for the BPF theremin I&amp;#39;ve demoed during conference keynotes, which turns WiFi signal strength into sound. (2019)&amp;lt;br&amp;gt;
My book website: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/bpf-performance-tools-book.html&amp;#34;&amp;gt;BPF Performance Tools: Linux System and Application Observability&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2019-07-15/bpf-performance-tools-book.html&amp;#34;&amp;gt;blog post&amp;lt;/a&amp;gt; about it. The publisher is Addison-Wesley, and the book is 880 pages, including over 100 new BPF tools to analyze all the things (2019).&amp;lt;br&amp;gt;
Slides for my AWS re:Invent 2019 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/reinvent-2019-bpf-performance-analysis-at-netflix&amp;#34;&amp;gt;BPF Performance Analysis at Netflix&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/reinvent-2019-bpf-performance-analysis-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my Ubuntu Masters 2019 keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/um2019-bpf-a-new-type-of-software&amp;#34;&amp;gt;Extended BPF: A New Type of Software&amp;lt;/a&amp;gt; , where I first discussed how BPF is a new type of software and a fundamental change to the 50-year old kernel model, and how we observe this new software that&amp;#39;s already in production at major companies ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/um2019-bpf-a-new-type-of-software&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/UM2019_BPF_a_new_type_of_software.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=7pmXdG8-7WU&amp;amp;feature=youtu.be&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
An article for opensource.com: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https:///opensource.com/article/19/8/introduction-bpftrace&amp;#34;&amp;gt;An introduction to bpftrace for Linux&amp;lt;/a&amp;gt; , summarizing the syntax and including a one-liners tutorial ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/opensource_An_introduction_to_bpftrace.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2019).&amp;lt;br&amp;gt;
Slides for my USENIX LISA 2019 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa2019-linux-systems-performance&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , covering observability, methodologies, benchmarking, profiling, tracing, and tuning. It&amp;#39;s intended for everyone as a tour of fundamentals, and some companies have indicated they will use it for new hire training. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa2019-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2019_Linux_Systems_Performance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=fhBHvsi0Ql0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my LSFMM 2019 keynote on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lsfmm-2019-bpf-observability-143092820&amp;#34;&amp;gt;BPF Observability&amp;lt;/a&amp;gt; , which was also summarized by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/787131/&amp;#34;&amp;gt;lwn.net&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lsfmm-2019-bpf-observability-143092820&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LSFMM2019_BPF_Observability.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my SCaLE17x talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ebpf-perf-tools-2019&amp;#34;&amp;gt;eBPF Perf Tools&amp;lt;/a&amp;gt; , although I spent half the talk demonstrating how to instrument Minecraft using eBPF live, which is not captured by the slides ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ebpf-perf-tools-2019&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/SCALE2019_eBPF_Perf_Tools.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/P2hbiWTB2w4?t=158&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2019).&amp;lt;br&amp;gt;
Slides for my YOW2018 keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2018-cloud-performance-root-cause-analysis-at-netflix&amp;#34;&amp;gt;Cloud Performance Root Cause Analysis at Netflix&amp;lt;/a&amp;gt; which I delivered in Sydney, Brisbane, and Melbourne ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2018-cloud-performance-root-cause-analysis-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/YOW2018_CloudPerfRCANetflix.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=tAY8PnfrS_k&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my YOW2018 CTO summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2018-cto-summit-working-at-netflix&amp;#34;&amp;gt;Working at Netflix&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2018-cto-summit-working-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/YOWCTO2018_Working_at_Netflix.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=EjFxLvv9_ao&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
I posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2018-11-08/flamescope-pattern-recognition.html&amp;#34;&amp;gt;FlameScope Pattern Recognition&amp;lt;/a&amp;gt; , showing how to interpret the subsecond-offset heatmap view of profile data, and also spoke about this with Martin Spier at the LinkedIn performance engineering meetup ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/flamescope-2018&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LinkedIn2018_FlameScope.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/ogEhUnQdQiU?t=1361&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2018).&amp;lt;br&amp;gt;
Linux gets a high-level eBPF front-end: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html&amp;#34;&amp;gt;bpftrace (DTrace 2.0) for Linux 2018&amp;lt;/a&amp;gt; . The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace&amp;#34;&amp;gt;repository&amp;lt;/a&amp;gt; has tools and docs I developed, including a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md&amp;#34;&amp;gt;bpftrace one-liners tutorial&amp;lt;/a&amp;gt; , a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/reference_guide.md&amp;#34;&amp;gt;bpftrace reference guide&amp;lt;/a&amp;gt; , and an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/internals_development.md&amp;#34;&amp;gt;internals development guide&amp;lt;/a&amp;gt; (2018).&amp;lt;br&amp;gt;
To help everyone make fewer mistakes when benchmarking, I published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2018-06-30/benchmarking-checklist.html&amp;#34;&amp;gt;Evaluating the Evaluation: A Benchmarking Checklist&amp;lt;/a&amp;gt; (2018).&amp;lt;br&amp;gt;
At NetConf 2018 I gave a talk/discussion on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/netconf-2018-bpf-observability&amp;#34;&amp;gt;BPF Observability&amp;lt;/a&amp;gt; , attended by top contributors of the Linux TCP/IP stack ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/netconf-2018-bpf-observability&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/NetConf_BPF_observability.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides from my PerconaLive 2018 keynote on summarizing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/linux-performance-2018-perconalive-keynote-95516934&amp;#34;&amp;gt;Linux Performance 2018&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/linux-performance-2018-perconalive-keynote-95516934&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/Percona2018_Linux_Performance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/sV3XfrfjrPo?t=30m51s&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
For the Netflix TechBlog I posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/netflix-techblog/netflix-flamescope-a57ca19d47bb&amp;#34;&amp;gt;Netflix FlameScope&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/Netflix_FlameScope_20180404.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ), showing the new open source performance analysis tool for visualizing and exploring profiles with flame graphs, that Martin Spier and I have been working on (2018).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2018-02-09/kpti-kaiser-meltdown-performance.html&amp;#34;&amp;gt;KPTI/KAISER Meltdown Initial Performance Regressions&amp;lt;/a&amp;gt; , showing the estimated performance losses on Linux for simulated workloads (2018).&amp;lt;br&amp;gt;
A page on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/wss.html&amp;#34;&amp;gt;Working Set Size Estimation&amp;lt;/a&amp;gt; , covering what I know and have developed on the topic. It includes new tools that use Linux referenced and idle page flags for page-based WSS estimation (2018-).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-11-29/aws-ec2-virtualization-2017.html&amp;#34;&amp;gt;AWS EC2 Virtualization 2017&amp;lt;/a&amp;gt; , explaining how virtualization performance has been improving over the years, and details of the new AWS Nitro hypervisor (2017).&amp;lt;br&amp;gt;
Slides for my AWS re:Invent 2017 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/how-netflix-tunes-ec2-instances-for-performance&amp;#34;&amp;gt;How Netflix Tunes EC2 Instances for Performance&amp;lt;/a&amp;gt; , describing instance selection, EC2 features, kernel tuning, and observability ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/how-netflix-tunes-ec2-instances-for-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=89fYOo1V2pA&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/AWSreInvent2017_performance_tuning_EC2.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.com/article/17/11/bccbpf-performance&amp;#34;&amp;gt;7 tools for analyzing performance in Linux with bcc/BPF&amp;lt;/a&amp;gt; for opensource.com, which is also my first post on eBPF for the Fedora/Red Hat family of operating systems ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/opensource_7_useful_bcc_BPF_perf_tools.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2017).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-11-13/brilliant-jerks.html&amp;#34;&amp;gt;Brilliant Jerks in Engineering&amp;lt;/a&amp;gt; which describes two fictional jerks, one selfless and one selfish, to explore their behaviors, the damage caused, and the use of a &amp;amp;quot;no brilliant jerks&amp;amp;quot; policy (2017).&amp;lt;br&amp;gt;
Slides for my USENIX LISA 2017 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa17-container-performance-analysis&amp;#34;&amp;gt;Linux Container Performance Analysis&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa17-container-performance-analysis&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=NYLXZ58EboM&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2017_Container_Performance_Analysis.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my Kernel Recipes 2017 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/kernel-recipes-2017-using-linux-perf-at-netflix&amp;#34;&amp;gt;Using Linux perf at Netflix&amp;lt;/a&amp;gt; , focusing on fixing CPU profiling ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/kernel-recipes-2017-using-linux-perf-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=UVM3WX8Lq2k&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/KernelRecipes_Perf_Events.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
For EuroBSDcon 2017, I gave the closing keynote on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/eurobsdcon-2017-system-performance-analysis-methodologies&amp;#34;&amp;gt;System Performance Analysis Methodologies (BSD)&amp;lt;/a&amp;gt; , and I used FreeBSD for many examples. In this talk I introduced a FreeBSD static perf tools diagram, the BSD perf analysis in 60 seconds checklist, and the tstate.d tool for thread state analysis ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/eurobsdcon-2017-system-performance-analysis-methodologies&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=ay41Uq1DrvM&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/EuroBSDcon2017_SystemMethodology.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my OSSNA 2017 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ossna-2017-performance-analysis-superpowers-with-linux-bpf&amp;#34;&amp;gt;Performance Analysis Superpowers with Linux BPF&amp;lt;/a&amp;gt; . This talk was not videoed. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/ossna-2017-performance-analysis-superpowers-with-linux-bpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/OSS2017_BPF_superpowers.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-09-05/solaris-to-linux-2017.html&amp;#34;&amp;gt;Solaris to Linux Migration 2017&amp;lt;/a&amp;gt; . Solaris was an OS that was once in widespread use, but development now seems to have ceased. I&amp;#39;ve been asked about Solaris to Linux migrations, but I&amp;#39;ve never seen a resource that covers them both in depth (maybe because no one else has the expertise or inclination to write it), so this is my summary.&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-08-08/linux-load-averages.html&amp;#34;&amp;gt;Linux Load Averages: Solving the Mystery&amp;lt;/a&amp;gt; , where I dug up the patch that added the uninterruptible sleep state to Linux load averages, and measured code paths in that state as an off-CPU flame graph (2017).&amp;lt;br&amp;gt;
My slides for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/EdHunter8/sre-perf-meetupslides/61&amp;#34;&amp;gt;PMCs on the Cloud&amp;lt;/a&amp;gt; at the SBSRE meetup, with the Netflix perf team ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/EdHunter8/sre-perf-meetupslides/61&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=i5Ml9uY2rBw&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtu.be/86Wj_-pWcwE?t=53m3s&amp;#34;&amp;gt;meetup&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/SBSRE_perf_meetup_aug2017.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2017).&amp;lt;br&amp;gt;
Slides for my 2017 USENIX ATC &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/usenix-atc-2017-performance-superpowers-with-enhanced-bpf&amp;#34;&amp;gt;Performance Analysis Superpowers with Linux eBPF&amp;lt;/a&amp;gt; , updating my earlier talk ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/usenix-atc-2017-performance-superpowers-with-enhanced-bpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=oc9000dM9-k&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/USENIX_ATC2017_BPF_superpowers.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my 2017 USENIX ATC talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/usenix-atc-2017-visualizing-performance-with-flame-graphs&amp;#34;&amp;gt;Visualizing Performance with Flame Graphs&amp;lt;/a&amp;gt; , with updates and challenges ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/usenix-atc-2017-visualizing-performance-with-flame-graphs&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=D53T1Ejig1Q&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/USENIX_ATC2017_flamegraphs.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for my Velocity talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/velocity-2017-performance-analysis-superpowers-with-linux-ebpf&amp;#34;&amp;gt;Performance Analysis Superpowers with Linux eBPF&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/velocity-2017-performance-analysis-superpowers-with-linux-ebpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bj3qdEDbCD4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/Velocity2017_BPF_superpowers.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2017).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-05-16/working-at-netflix-2017.html&amp;#34;&amp;gt;Working at Netflix 2017&amp;lt;/a&amp;gt; , following on from my earlier posts. I expanded on mundane topics like how many meetings I have each week, as I was getting asked this recently. (2017).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-05-09/cpu-utilization-is-wrong.html&amp;#34;&amp;gt;CPU Utilization is Wrong&amp;lt;/a&amp;gt; : a post explaining the growing problem of memory stall cycles dominating %CPU (2017).&amp;lt;br&amp;gt;
In my post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-05-04/the-pmcs-of-ec2.html&amp;#34;&amp;gt;The PMCs of EC2: Measuring IPC&amp;lt;/a&amp;gt; , I demonstrate measuring Performance Monitoring Counters (PMCs) for the first time in the AWS EC2 cloud, something I&amp;#39;d been working on with Amazon and others for a while. PMCs are crucial for understanding CPU behavior, including memory I/O, stall cycles, and cache misses. (2017).&amp;lt;br&amp;gt;
A post about my DockerCon 2017 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-05-15/container-performance-analysis-dockercon-2017.html&amp;#34;&amp;gt;Container Performance Analysis&amp;lt;/a&amp;gt; , where I showed how to find bottlenecks in the host vs the container, how to profiler container apps, and dig deeper into the kernel ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-05-15/container-performance-analysis-dockercon-2017.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/container-performance-analysis&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/DockerCon2017_performance_analysis.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bK9A5ODIgac&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ). (2017).&amp;lt;br&amp;gt;
Slides for my SCaLE15x talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/linux-4x-tracing-performance-analysis-with-bccbpf&amp;#34;&amp;gt;Linux 4.x Tracing: Performance Analysis with bcc/BPF&amp;lt;/a&amp;gt; , where I also included a ply demo for the first time ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/linux-4x-tracing-performance-analysis-with-bccbpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=w8nFRoFJ6EQ&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/SCALE2017_perf_analysis_eBPF.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2017).&amp;lt;br&amp;gt;
At the IO Visor (iovisor) Summit 2017 I led a discussion on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/bpf-tools-2017&amp;#34;&amp;gt;BPF Tools&amp;lt;/a&amp;gt; for performance and observability, covering strategy, current tools, and future challenges ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/bpf-tools-2017&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/IOVisor2017_bpftools.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for BSidesSF 2017 with Alex Maestretti on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/AlexMaestretti/security-monitoring-with-ebpf&amp;#34;&amp;gt;Linux Monitoring at Scale with eBPF&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/AlexMaestretti/security-monitoring-with-ebpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=44nV6Mj11uw&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/BSidesSF2017_BPF_security_monitoring.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
I posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-02-05/file-system-flame-graph.html&amp;#34;&amp;gt;Where has my disk space gone? Flame graphs for file systems&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-02-06/flamegraphs-vs-treemaps-vs-sunburst.html&amp;#34;&amp;gt;Flame Graphs vs Tree Maps vs Sunburst&amp;lt;/a&amp;gt; (2017).&amp;lt;br&amp;gt;
Slides for my Linux.conf.au 2017 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/bpf-tracing-and-more&amp;#34;&amp;gt;BPF: Tracing and More&amp;lt;/a&amp;gt; , summarizing other uses for enhanced BPF. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/bpf-tracing-and-more&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=JRFNIKUROPE&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LCA2017_BPF_tracing_and_more.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2017-01-31/golang-bcc-bpf-function-tracing.html&amp;#34;&amp;gt;Golang bcc/eBPF Function Tracing&amp;lt;/a&amp;gt; , where I figured out how to trace functions and arguments for different Go compilers (2017).&amp;lt;br&amp;gt;
A page to summarize &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/ebpf.html&amp;#34;&amp;gt;eBPF Tools&amp;lt;/a&amp;gt; using Linux eBPF and the bcc front end for advanced observability and tracing tools (2016&#43;).&amp;lt;br&amp;gt;
Slides for my USENIX LISA 2016 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/linux-4x-tracing-tools-using-bpf-superpowers&amp;#34;&amp;gt;Linux 4.x Tracing Tools: Using BPF Superpowers&amp;lt;/a&amp;gt; , which focused on bcc tools I&amp;#39;ve developed. This included my demo &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=GsMs3n8CB6g&amp;#34;&amp;gt;Give me 15 minutes and I&amp;#39;ll change your view of Linux tracing&amp;lt;/a&amp;gt; . ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/linux-4x-tracing-tools-using-bpf-superpowers&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2016_BPF_tools_16_9.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=GsMs3n8CB6g&amp;#34;&amp;gt;youtube demo&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=UmOU3I36T2U&amp;amp;t=1151s&amp;#34;&amp;gt;youtube talk&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2016-10-27/dtrace-for-linux-2016.html&amp;#34;&amp;gt;DTrace for Linux 2016&amp;lt;/a&amp;gt; , announcing that the Linux kernel now has similar raw capabilities as DTrace in Linux 4.9 via enhanced BPF. I&amp;#39;ve been heavily involved in this project, especially as the …</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20210928-080947/</link>
      <pubDate>Tue, 28 Sep 2021 08:09:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20210928-080947/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2021/08/26/qrencoding.html&amp;#34;&amp;gt;Efficient QR codes&amp;lt;/a&amp;gt; (26 Aug 2021)&amp;lt;br&amp;gt;
The most basic segment type is byte mode , which is a series of 8-bit bytes. If you control the QR decoder then this is perfectly efficient for encoding binary data. But you probably need to work with a variety of decoders. In that case, beware: the first edition of the QR standard, ISO/IEC 18004, said that byte mode should be interpreted as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/JIS_X_0201&amp;#34;&amp;gt;JIS X 0201&amp;lt;/a&amp;gt; . The 2005 edition changed that to be &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/ISO/IEC_8859-1&amp;#34;&amp;gt;ISO/IEC 8859-1&amp;lt;/a&amp;gt; (i.e. Latin-1). In practice, some QR decoders will attempt to content-sniff the encoding because, while UTF-8 contents should be indicated with an ECI header, they often aren&amp;#39;t and UTF-8 is really common.&amp;lt;br&amp;gt;
You probably want to put a URL-like prefix at the front to make your QR codes distinguishable. One thing to consider is that “https://www.example.com/” is a byte-mode segment that takes 204 bits, but “HTTPS://WWW.EXAMPLE.COM/” is alphanumeric and needs only 145 bits. (That&amp;#39;s assuming QR versions 1 through 9, the lengths are slightly different otherwise.) DNS names are case insensitive and “an implementation should accept uppercase letters” for the scheme says &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc3986#section-3.1&amp;#34;&amp;gt;RFC 3986&amp;lt;/a&amp;gt; . Maybe it just looks odd and that&amp;#39;s not worth the bits, though?&amp;lt;br&amp;gt;
One thing to note is that the QR spec (ISO/IEC 18004:2005) has a whole section on “structured append” mode, where multiple QR codes can be combined into one. But trying that with iOS and Android shows that neither support it, so probably it can be considered dead and that&amp;#39;s why SHC is replicating the same feature at a higher level.&amp;lt;br&amp;gt;
Our motivating issue is thus: if you have a whole byte then taking it mod 10 to generate a digit works fairly well. The digits 0–5 have probability 26/256 while 6–9 have probability 25/256. That&amp;#39;s not uniform therefore it doesn&amp;#39;t encode the maximum amount of entropy, but it&amp;#39;s 99.992% efficient, which is pretty good. But when you have a smaller range of input values the non-uniformity becomes significant and so does the reduction in information transmitted.&amp;lt;br&amp;gt;
to 1024. Our example input will be&amp;lt;br&amp;gt;
I 65 157 208 237 55 31 68 183 40257 →7,5 60880 →0,8 7991 →1,9 46916 →6,1 402/656 608/656 79/656 469/656 399250 →0,5,2 307743 →3,4,7 399/431 185761 →6,1,7 →2,3,1 307/431 132/186&amp;lt;br&amp;gt;
The input bytes are written (in base 10) along the top. Pairs of them are combined. Take the top-right box: its value is 157×256 &#43; 65 = 40257. That can be considered to be 40257 mod 65536 and, since there&amp;#39;s a reasonable number of bits in there, two digits are extracted. Obviously 40257 mod 10 = 7, and 4025 mod 10 = 5. So the two digits are 7 and 5. That leaves 402 mod 656, and 656 is below the limit of 1024 that we set, so it&amp;#39;s passed down to be combined into the box below. This continues down the tree: each time there&amp;#39;s too little data left to extract another digit, the leftovers are passed down to be combinined. At the bottom there&amp;#39;s nothing else to combine with so the final leftover value, 132 mod 186, is converted into the digits 2, 3, and 1. The ultimate output digits are concatenated from left-to-right, top-to-bottom.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2020/12/23/acvp.html&amp;#34;&amp;gt;ACVP&amp;lt;/a&amp;gt; (23 Dec 2020)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2020/09/06/20yearsago.html&amp;#34;&amp;gt;Letter to 20 years ago&amp;lt;/a&amp;gt; (06 Sep 2020)&amp;lt;br&amp;gt;
I noticed that I have not posted anything here in 2020! There&amp;#39;s a bunch of reasons for this: the work I&amp;#39;m doing at the moment does not lend itself so well to blog posts, and life intervenes, leaving less time for personal projects. But in order to head off the risk that I&amp;#39;ll post nothing at all this year I pulled something from one of my notebooks. 2020 is a round number so I decided to do some reflection and this was a letter that I imagined writing to myself 20 years ago. It is very much a letter to me! The topics are going to be quite specific and if you weren&amp;#39;t paying attention to the computing industry in the year 2000 I’m not sure how much of it will make sense. But these are the points that I think me of 20 years ago would have wondered about.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2019/10/30/pqsivssl.html&amp;#34;&amp;gt;Real-world measurements of structured-lattices and supersingular isogenies in TLS&amp;lt;/a&amp;gt; (30 Oct 2019)&amp;lt;br&amp;gt;
This is the third in a series of posts about running experiments on post-quantum confidentiality in TLS. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2018/04/11/pqconftls.html&amp;#34;&amp;gt;first&amp;lt;/a&amp;gt; detailed experiments that measured the estimated network overhead of three families of post-quantum key exchanges. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2018/12/12/cecpq2.html&amp;#34;&amp;gt;second&amp;lt;/a&amp;gt; detailed the choices behind a specific structured-lattice scheme. This one gives details of a full, end-to-end measurement of that scheme and a supersingular isogeny scheme, SIKE/p434. This was done in collaboration with Cloudflare, who integrated Microsoft&amp;#39;s SIKE code into &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boringssl.googlesource.com/boringssl&amp;#34;&amp;gt;BoringSSL&amp;lt;/a&amp;gt; for the tests, and ran the server-side of the experiment.&amp;lt;br&amp;gt;
Google Chrome installs, on Dev and Canary channels, and on all platforms except iOS, were randomly assigned to one of three groups: control (30%), CECPQ2 (30%), or CECPQ2b (30%). (A random ten percent of installs did not take part in the experiment so the numbers only add up to 90.) CECPQ2 is the hybrid X25519&#43;structured-lattice scheme &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2018/12/12/cecpq2.html&amp;#34;&amp;gt;previously described&amp;lt;/a&amp;gt; . CECPQ2b is the name that we gave to the combination of X25519 and the SIKE/p434 scheme.&amp;lt;br&amp;gt;
Because optimised assembly implementations are labour-intensive to write, they were only available/written for AArch64 and x86-64. Because SIKE is computationally expensive, it wasn’t feasible to enable it without an assembly implementation, thus only AArch64 and x86-64 clients were included in the experiment and ARMv7 and x86 clients did not contribute to the results even if they were assigned to one of the experiment groups.&amp;lt;br&amp;gt;
1 10 100 1000 10000 TLS handshake time (ms) TLS handshake latency (Windows)&amp;lt;br&amp;gt;
1 10 100 1000 10000 TLS handshake time (ms) TLS handshake latency (Android)&amp;lt;br&amp;gt;
From the histograms we can see that the CECPQ2b (SIKE) group shifts visibly to the right (i.e. slower) in both cases. (On Android, a similar but smaller shift is seen for CECPQ2.) Despite the advantages of removing the slower clients and experimenting with worse-than-usual networks, the computational demands of SIKE out-weigh the reduced network traffic. Only for the slowest 5% of connections are the smaller messages of SIKE a net advantage.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2019/08/10/ctap2features.html&amp;#34;&amp;gt;Username (and password) free login with security keys&amp;lt;/a&amp;gt; (10 Aug 2019)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ramblings from Jessie: Home</title>
      <link>https://www.whatsupup.com/blog/conservatorship/reemphasize/20210928-080922/</link>
      <pubDate>Tue, 28 Sep 2021 08:09:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/conservatorship/reemphasize/20210928-080922/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://queue.acm.org/detail.cfm?id=3469844&amp;#34;&amp;gt;ACM Queue: June 2021&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.jessfraz.com/pdf/a-new-era-for-mechanical-cad.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cacm.acm.org/magazines/2020/12/248797-the-life-of-a-data-byte/fulltext&amp;#34;&amp;gt;Communications of the ACM: December 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Friday, January 22, 2021 · 9 min read&amp;lt;br&amp;gt;
Tesla had its first Battery Day on September 22nd, 20201. What a fantastic world we live in that we can witness the first Apple-like keynote for batteries. Batteries are a part of our everyday life; without them, the world would be a much different place. Your cellphone, flashlight, tablet, laptops, drones, cars, and other devices would not be portable and operational without batteries.
At the heart of it, batteries store chemical energy and convert it into electrical energy.&amp;lt;br&amp;gt;
Being cooped up at home got me looking into the new Xbox and PlayStation 5. I was curious about the innovations in the consoles since their successors. Both claim to have ray tracing and support for 8K graphics. This then got me thinking about how prevalent 8K televisions are today. 8K televisions seem to be in the same state as 4K televisions a few years ago. One thing I know through my life is that pixel density will continue to get bigger and bigger.&amp;lt;br&amp;gt;
I am unsure if my love of automation comes from a dislike of doing the same thing twice or an overall desire to be more productive and make everything more efficient. Like a lot of programmers, I often ask myself “can this be scripted” when I find myself doing a manual task.
I was inspired recently by reading Wolfram’s writing on his personal infrastructure for productivity1. I, too, have written about my personal infrastructure2, but not at the level of depth or with the same focus on productivity as Wolfram.&amp;lt;br&amp;gt;
I came up with a list of questions I would ask my cloud provider if I was buying a product. They are as follows:
1. What problem is this solving? I would ask this to make sure I even need this product. So many people tend to buy into the hype for “shiny”, they miss if they even needed the thing in the first place.
2. How did you implement this?&amp;lt;br&amp;gt;
From the Intel x86 Manual:
In the mid-1960s, Intel cofounder and Chairman Emeritus Gordon Moore had this observation: “… the number of transistors that would be incorporated on a silicon die would double every 18 months for the next several years.” Over the past three and half decades, this prediction known as “Moore’s Law” has continued to hold true.
Moore’s Law is coming up a lot lately in the context of coming to an end.&amp;lt;br&amp;gt;
I recently started a job at Microsoft. In my first week I have already learned so much about Windows, I figured I would try to put it all into writing. This post is coming to you from a Windows Subsystem for Linux console!
I&amp;amp;#39;m headed to Seattle because I&amp;amp;#39;M JOINING MICROSOFT, at the airport wearing this awesome shirt from @listonb &amp;amp;amp; @Taylorb_msft ���� pic.twitter.com/8rnAg1dsPd
— jessie frazelle (@jessfraz) September 4, 2017&amp;lt;br&amp;gt;
I really enjoyed Felipe Hoffa’s post on Analyzing GitHub issues and comments with BigQuery .
Which got me wondering about my favorite subject ever, The Art of Closing. I wonder what the stats are for the top 15 projects on GitHub in terms of pull requests opened vs. pull requests closed. This post will use the GitHub Archive dataset.
Top 15 repositories with the most pull requests First let’s find the top 15 repos with the most pull requests from 2015.&amp;lt;br&amp;gt;
This blog post is going to be a bit different. After watching Stranger Things, my friend and I started discussing scary movies from our childhood. I couldn’t help but remember a very specific strange thing that happened to me growing up. I thought, hey, this would be a kinda weird blog post. So here it is. The events following are factual.
It was a hot, dry summer in July of 1995 in Phoenix, Arizona.&amp;lt;br&amp;gt;
Hello and welcome to what will become the most sarcastic post on my blog. This is going to be a series of “buzzfeed” style programming articles and after this post I very happily pass the baton to Filippo Valsorda to continue. And I urge you to write your own as well.
@jessfraz &amp;amp;#34;We asked Jess for her top 10 ldflags; you won&amp;amp;#39;t believe what happened next&amp;amp;#34;
— adg (@enneff) July 17, 2016&amp;lt;br&amp;gt;
This is so cool I can hardly stand it.
In Docker 1.10, the awesome libnetwork team added the ability to specify a specific IP for a container. If you want to see the pull request it’s here: docker/docker#19001.
I have a IP Block on OVH for my server with 16 extra public IPs. I totally use these for good and not for evil.
But to use these previously with Docker containers meant hackery with the awesome pipework.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20210928-080843/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20210928-080843/</guid>
      <description>July 27, 2021&amp;lt;br&amp;gt;
Copyright © 2021 Bartosz Ciechanowski&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Neil Sainsbury</title>
      <link>https://www.whatsupup.com/blog/invertase/atween/20210928-080839/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/invertase/atween/20210928-080839/</guid>
      <description>2020&amp;lt;br&amp;gt;
May 1, 2020&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>www.bitlog.com | Jake Voytko&#39;s personal log of bits</title>
      <link>https://www.whatsupup.com/blog/misinform/lossy/20210928-080836/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/misinform/lossy/20210928-080836/</guid>
      <description>So what happened? For about a year and a half, I worked on adding GraphQL as an internal API layer within Etsy. I’m proud of the work that I did. I was given an incredible amount of latitude to design and build the support for it. It’s some of the best engineering that I’ve ever done. Adding an entire API layer to a medium-sized company is hard, but we successfully launched, got some people using it, got some wins, and were growing it. Yet there were serious staffing challenges on the project. At the beginning of 2020, we were 2 engineers and were promised 2 more would be added. The 2 promised headcount vanished at the beginning of the pandemic, and the other engineer was unable to work for vast swaths of the year. Consequently, I worked alone for most of the year. It was too much for me. Working on a growing an API layer and working by myself was burning me out. Taking a 6 week break and working on another team didn’t shake this feeling for me. Problems like this are difficult to fix. Hiring takes months. Onboarding and ramping up takes months. So this was a problem that would take roughly 6 months to fix.&amp;lt;br&amp;gt;
I want to emphasize that Etsy is a great place to work. I would work there again. If you don’t work there, you should seriously consider it. They pay well and the work is meaningful. My situation was an edge case. A lot of Etsy’s practices were developed while it was a small or a medium-sized company. But make no mistake: it is rounding the bend to being a large company: It just entered the S&amp;amp;amp;P 500. Sometimes it takes scale and growth to uncover problems. Things that worked at the smaller scale break when the company is three times larger. I encountered one of these growing pains, but it’s the kind that the company will learn how to avoid over time.&amp;lt;br&amp;gt;
So I’m setting out on my own. I’ve been inspired by the stories that I’ve heard on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.indiehackers.com/podcasts&amp;#34;&amp;gt;Indie Hackers podcast&amp;lt;/a&amp;gt; . Unlike many, I am so fortunate that 2020 improved my financial footing. My expenses went down and my savings went up. Accordingly, I’m in the best position of my life to start a new business that can be successful. I started a company called Jaunty, Inc. using Stripe Atlas.&amp;lt;br&amp;gt;
I’m waiting for the IRS to issue my EIN, which will allow me to set up a business bank account and have fully-separated finances. But the IRS is currently backlogged. In fact, the IRS won’t even respond to the question “has it been issued yet?” until I’ve been waiting for 45 days, and I’ve been waiting for 30. Accordingly, I’ve been trying to learn skills that I can reuse when I can have separated finances.&amp;lt;br&amp;gt;
Hopefully, I’ll have some good news to report in the new year. I expect that I will be able to try and fail at 3 ideas during 2021. Hopefully, one of the three will start to get some traction, and I will be able to get some revenue. My 2021 goal is to to rent out a tiny private office. If I learned anything from the pandemic, it’s that I need a separation between my personal space and my work space.&amp;lt;br&amp;gt;
The most stress I encountered was probably the period between the 2020 election and the period where Joe Biden was announced the winner, with the second-most being the following period where it was unclear whether democracy would hold in the United States, and the following period was reading about the George Floyd protests and seeing the widespread police violence against protestors. I have a nervous habit of chewing my nails when I’m thinking or nervous, and this evolved into literally chewing open sores into my fingers. Thankfully these have mostly healed. At this point, I can handle lemons and limes again without fear. In 2020, I donated a lot of money to causes (Biden’s campaign, organizations like Black Girls Code that bolster education for underrepresented minorities in tech, and organizations that seek to selectively replace policing with policies targeted to specific problems), but I didn’t donate much time this year. I don’t know how to feel about this.&amp;lt;br&amp;gt;
My girlfriend is a professional translator and précis writer. She is extremely concerned with the precise definitions of words. This means that I had the misfortune of learning the difference between the terms coronavirus (a class of viruses), novel coronavirus (a placeholder name before a significant coronavirus strain is named), SARS-CoV-2 (the official name of the virus causing the current pandemic), and COVID-19 (the human disease caused by SARS-CoV-2). Why misfortune? Because I watched people use them interchangeably and incorrectly all year, while also knowing that it wasn’t worth correcting them. This was my small 2020 cross to bear.&amp;lt;br&amp;gt;
2021&amp;lt;br&amp;gt;
My biggest focus for 2021 is getting Jaunty, Inc. on a sustainable course. I would like to end the year by paying myself enough of a salary to cover all of my monthly expenses, and also to be able to rent an office somewhere. $10k-15k in monthly revenue is the line where many people can start doing this. This would put me close to hiring my first employee, but that’s getting ahead of myself.&amp;lt;br&amp;gt;
I’m only going to permanently switch away from Gmail once. I won’t be switching to the 2020 version of HEY. I hope that they continue to evolve the email client in a thoughtful way. I can imagine myself switching to a future iteration of HEY based on its privacy stance and its speed.&amp;lt;br&amp;gt;
Please consider donating to Black Girls Code. When I was growing up,
I had access to high school classes about programming and a computer
in my bedroom which allowed me to hone these skills. I&amp;#39;d like
everyone to have this kind of access to opportunities. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blackgirlscode.com/&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://www.blackgirlscode.com/&amp;#34;&amp;gt;https://www.blackgirlscode.com/&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; I donated $500, but please consider donating even if it&amp;#39;s $5.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bitlog.com/2020/12/31/2020-year-in-review-living-in-interesting-times/&amp;#34;&amp;gt;2020 year in review: living in interesting times&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Security Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/sovietizing/ohioan/20210928-080817/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sovietizing/ohioan/20210928-080817/</guid>
      <description>In 2018, we started pioneering work on securing one of the oldest parts of the Internet, one that had till then remained largely untouched by efforts to make the web … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/10/working-in-the-open-enhancing-privacy-and-security-in-the-dns/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Since its founding in 1998, Mozilla has championed human-rights-compliant innovation as well as choice, control, and privacy for people on the Internet. We have worked hard to actualise this belief … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/10/08/the-eus-current-approach-to-qwacs-qualified-website-authentication-certificates-will-undermine-security-on-the-open-web/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Australia’s Independent National Security Legislation Monitor (INSLM) earlier this month released a 316-page report calling for significant, and much needed, reforms to the nation’s 2018 Telecommunications and Other Legislation Amendment … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/07/27/australian-watchdog-recommends-major-changes-to-exceptional-access-law-tola/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
ATUALIZAÇÃO: no dia 30 de junho de 2020, o senado brasileiro aprovou o “PL 2630/2020” (Lei das Fake News) com algumas emendas importantes que tornaram opcional a verificação de identidade … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/06/29/analise-da-mozilla-a-proposta-de-lei-sobre-noticias-falsas-do-brasil-prejudica-a-privacidade-a-seguranca-e-a-liberdade-de-expressao/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
UPDATE: On 30 June 2020, the Brazilian Senate passed “PLS 2630/2020” (the fake news law) with some key amendments that made government identity verification for accounts optional, excluded social media … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/06/29/brazils-fake-news-law-harms-privacy-security-and-free-expression/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>privacy Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/evildoer/onionskin/20210928-080810/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/evildoer/onionskin/20210928-080810/</guid>
      <description>After almost a year’s worth of deliberation, the Kris Gopalakrishnan Committee released its draft report on non-personal data regulation in India in July 2020. The report is one of the … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/09/12/indias-ambitious-non-personal-data-report-should-put-privacy-first-mozilla/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Australia’s Independent National Security Legislation Monitor (INSLM) earlier this month released a 316-page report calling for significant, and much needed, reforms to the nation’s 2018 Telecommunications and Other Legislation Amendment … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2020/07/27/australian-watchdog-recommends-major-changes-to-exceptional-access-law-tola/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019 saw a spike of activity to protect online privacy as governments around the globe grappled with new revelations of data breaches and privacy violations. While much of the privacy … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2019/12/31/bringing-californias-privacy-law-to-all-firefox-users-in-2020/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The Kenyan Data Protection and Privacy Act 2019, was signed into law last week. This GDPR-like law is the first data protection law in Kenyan history, and marks a major … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2019/11/12/mozilla-plays-role-in-kenyas-adoption-of-crucial-data-protection-law/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210928-080809/</link>
      <pubDate>Tue, 28 Sep 2021 08:08:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210928-080809/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-is-low-code/&amp;#34;&amp;gt;Low code and no code have equal amounts of hype and skepticism.  On the one hand, it’s clear low code has market traction: in April 2021, a provider of low code automation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/admin-panel-roundup/&amp;#34;&amp;gt;There are a few off the shelf options for building admin interfaces: 1. Database GUI Clients 2. Frontend admin libraries 3. Backend admin frameworks 4. 3rd-party admin tools They’re all good at specific things. Let’s see how you can decide between them:&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/nacho-iacovino-on-the-future-of-internal-tools/&amp;#34;&amp;gt;A guest post from Nacho Iacovino, developer advocate at Clerk, who recently chatted with us about the findings from our 2021 State of Internal Tools report and where he thinks internal tool development is going.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/pizza-to-the-polls-story/&amp;#34;&amp;gt;With this year’s record voter turnout, Pizza to the Polls had an even greater impact than in 2016 and they did it with the power of Retool. They raised over $1.4 million to send 66,089 pizzas to 3,267 polling places in 48 states—blowing their 2016 and 2018 numbers out of the water.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/whats-accenture/&amp;#34;&amp;gt;Accenture made $43B in 2019 - you&amp;amp;#39;ve probably heard of them, but you might not be sure what they actually do. This post will help.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/top-react-component-libraries-for-2020/&amp;#34;&amp;gt;A React component library is a collection of styled React components that you can use in your React applications to save time, add functionality, increase efficiency, and make the app look great. Here are six of our favorites for 2020.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-great-internal-tools-jeremy-edberg-ebay-netflix-reddit/&amp;#34;&amp;gt;Jeremy Edberg has been working as an engineer in the Bay Area since 1998. He’s worked on great internal tools at eBay, as the first engineering hire at Reddit, and as the first reliability engineer at Netflix.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-retool-helped-run-a-presidential-campaign/&amp;#34;&amp;gt;Sunil Sadasivan ran tech for Cory Booker&amp;amp;#39;s 2020 presidential campaign, and talked to us about the challenges of quickly scaling a team to match.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-great-internal-tools-chad-rosen-twitter-wealthfront/&amp;#34;&amp;gt;Chad Rosen has been working as a software engineer and engineering manager in the Bay Area since 2001. He has helped contribute to both the product and internal tools at companies like Good Technology, ClickShift, Twitter, and Wealthfront.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/air-travel-software/&amp;#34;&amp;gt;A lot has changed about air travel since it went mainstream in the 1930s. On-board smoking, free-flowing booze, and five-star meals have given way to baggage fees, cramped seats, and mystery meat. Through all this change, one thing has stayed the same — the software that manages it all.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210928-080753/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210928-080753/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/meet-the-discord-users-who-imagined-a-place-657325b75fa6?source=collection_home---4------8-----------------------&amp;#34;&amp;gt;Meet the Discord Users Who Imagined a Place Let’s talk about you, the community who inspired the entire Imagine a Place project and Discord — The Movie (2021).&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/how-trust-safety-addresses-violent-extremism-on-discord-c15613dae03a?source=collection_home---4------17-----------------------&amp;#34;&amp;gt;How Trust &amp;amp;amp; Safety Addresses Violent Extremism on Discord We dive into our history with violent extremists on the platform and how our response has improved since the 2017 Charlottesville incident.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cutlefish - Product Nerdery | @johncutlefish&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/flea/unthought/20210928-080753/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/flea/unthought/20210928-080753/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pandemic-and-health&amp;#34;&amp;gt;Pandemic, Teams, Health, and Self-Care ( June 29, 2020 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/50-product-lessons&amp;#34;&amp;gt;50 Short Product Lessons ( June 29, 2020 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-tweets&amp;#34;&amp;gt;Book Pre-Order ( May 16, 2020 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/mvp-and-experiment-tips&amp;#34;&amp;gt;Some MVP and Experiment Tips ( February 25, 2020 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/breaking-the-rules&amp;#34;&amp;gt;Great Teams Break the &amp;amp;#34;Rules&amp;amp;#34; All the Time ( December 17, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/promises-kept&amp;#34;&amp;gt;Small Promises Regularly Kept ( December 16, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/shape-up-review&amp;#34;&amp;gt;Review Notes: Shape Up ( December 13, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-product-managers-lose-trust&amp;#34;&amp;gt;How Product Managers Lose Trust ( September 14, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/what-is-an-mvp&amp;#34;&amp;gt;What Is an MVP? ( September 07, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-you-want-to-fix-something&amp;#34;&amp;gt;So You Want to Fix Something? ( August 19, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measure-to-learn-not-to-control&amp;#34;&amp;gt;Measuring to Control vs. Measuring to Learn and Improve ( August 16, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/small-teams-may-not-fix-the-mess&amp;#34;&amp;gt;Small Teams May Not Fix The Mess ( July 06, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-system-bites-back&amp;#34;&amp;gt;The System Bites Back ( June 18, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/making-okrs-easier&amp;#34;&amp;gt;Making OKRs Easier… ( June 16, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-fast-and-slow&amp;#34;&amp;gt;Working Fast and Slow ( June 11, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/meta-advocacy&amp;#34;&amp;gt;“Meta” Advocacy ( June 10, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-youre-hiring-a-product-manager&amp;#34;&amp;gt;So You’re Hiring a Product Manager? ( May 04, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/by-default-ship-nothing&amp;#34;&amp;gt;By Default, Ship Nothing ( April 28, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-messy-shift-to-starting-together&amp;#34;&amp;gt;The (Messy) Shift to Starting Together ( April 17, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hot-mess&amp;#34;&amp;gt;Hot Mess ( April 03, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-product-development-for-startups&amp;#34;&amp;gt;Scaling Product Development (for Startups) ( March 20, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-big-leaps&amp;#34;&amp;gt;The Big Leaps ( March 18, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-without-level-of-effort&amp;#34;&amp;gt;Prioritizing Without Level of Effort? ( March 15, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/should-we-have-deadlines&amp;#34;&amp;gt;Should We Have Deadlines? ( March 13, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now-8-ways-to-focus-your-product-team-on-impact-not-features&amp;#34;&amp;gt;Do This Now: 8 Ways to Focus your Product Team on Impact, Not Features ( February 16, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spirit-of-sprints&amp;#34;&amp;gt;(The Spirit Of…) Sprints ( February 09, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-the-time-if-it-is-important&amp;#34;&amp;gt;Make the Time (If It Is Important) ( February 02, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-things-you-should-know-about-product-managers&amp;#34;&amp;gt;15 Things You Should Know About Product Managers ( January 27, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/visualize-flow-at-a-higher-level&amp;#34;&amp;gt;Visualize Flow at a Higher Level ( January 22, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/organizational-debt&amp;#34;&amp;gt;Organizational Debt ( January 14, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/going-agile&amp;#34;&amp;gt;“Going Agile” ( January 12, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-models&amp;#34;&amp;gt;Continuous Improvement Models ( January 04, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/hybrid-boards-for-roadmapping&amp;#34;&amp;gt;Hybrid Boards For Roadmapping ( January 03, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-product-development-traps&amp;#34;&amp;gt;10 Product Development Traps ( January 02, 2019 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/resilience-the-fork-in-the-road&amp;#34;&amp;gt;Resilience: The Fork in the Road ( December 30, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/learning-or-just-delivering&amp;#34;&amp;gt;Learning? Or Just Delivering? ( December 24, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-about-change-agency-and-continuous-improvement&amp;#34;&amp;gt;15 Posts About Change Agency and Continuous Improvement ( December 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/15-posts-on-roadmaps-prioritization-and-visualizing-the-work&amp;#34;&amp;gt;15 Posts on Roadmaps, Prioritization, and Visualizing The Work ( December 20, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/do-this-now&amp;#34;&amp;gt;Do This Now! ( December 20, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-outcomes-over-outputs&amp;#34;&amp;gt;Why Outcomes Over Outputs? ( December 18, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/decision-quality-decision-velocity&amp;#34;&amp;gt;Decision Quality. Decision Velocity. ( December 11, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-cold-start-problem&amp;#34;&amp;gt;The Cold Start Problem ( December 11, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/great-one-pagers&amp;#34;&amp;gt;Great One-Pagers ( December 10, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/certainty-theater&amp;#34;&amp;gt;Certainty Theater ( December 09, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-experiment&amp;#34;&amp;gt;Why Experiment? ( December 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/from-decision-maker-to-decision-supporter&amp;#34;&amp;gt;From Decision Maker to Decision Supporter ( December 01, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/16-individual-warning-signals&amp;#34;&amp;gt;16 Individual Warning Signals ( November 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-tribe&amp;#34;&amp;gt;The [?] Tribe ( November 20, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-dont-they-trust-us&amp;#34;&amp;gt;Why Don’t They Trust Us? ( November 16, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/self-inflicted-chaos&amp;#34;&amp;gt;Self-Inflicted Chaos ( November 13, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/practice-best-practices&amp;#34;&amp;gt;Practice &amp;amp;gt; Best Practices ( November 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-do-we-do-ux-with-agile&amp;#34;&amp;gt;How Do We Do UX With Agile? ( October 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-drift-into-technical-bankruptcy&amp;#34;&amp;gt;The Drift Into Technical Bankruptcy ( October 04, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-person-assigned-to-each-story&amp;#34;&amp;gt;One Person Assigned To Each Story? ( September 28, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-tools-vs-project-management-tools&amp;#34;&amp;gt;Continuous Improvement Tools vs. Project Management Tools ( September 24, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-mvp-bait-and-switch&amp;#34;&amp;gt;The MVP Bait-and-Switch ( September 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/continuous-improvement-is-real-work&amp;#34;&amp;gt;Continuous Improvement is Real Work ( September 17, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/messy-middle&amp;#34;&amp;gt;Messy Middle ( September 13, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/amplitude&amp;#34;&amp;gt;Amplitude ( September 05, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/less-herding-more-doing&amp;#34;&amp;gt;Less Herding. More Doing. ( August 30, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/thatll-never-work-here-heretics-head-noddies-and-the-drift-into-mediocrity&amp;#34;&amp;gt;That’ll Never Work Here: Heretics, Head Noddies, and the Drift Into Mediocrity ( August 28, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pm-tip-30-seconds-answers-to-common-questions&amp;#34;&amp;gt;PM Tip: 30 Seconds Answers (to Common Questions) ( August 26, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-quarterly-okrs&amp;#34;&amp;gt;Why Quarterly OKRs? ( August 24, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/4-prioritization-lessons-using-cost-of-delay-and-cd3&amp;#34;&amp;gt;4 Prioritization Lessons (using Cost of Delay and CD3) ( August 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/not-leadership-material&amp;#34;&amp;gt;Not Leadership “Material” ( August 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/70-books-and-other-resources-for-internal-change-agents&amp;#34;&amp;gt;70 Books (and Other Resources) for Internal Change Agents ( August 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/feels-like-faster-vs-is-actually-faster&amp;#34;&amp;gt;Feels Like Faster vs. Is Actually Faster ( August 18, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/make-scrum-scrumptious&amp;#34;&amp;gt;Make Scrum Scrumptious! ( August 13, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-patient-change-agent&amp;#34;&amp;gt;The Patient Change Agent ( August 12, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-manager-and-the-change-agent&amp;#34;&amp;gt;The Manager and the Change Agent ( August 07, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/your-org-problems-are-not-unique&amp;#34;&amp;gt;Your Org Problems Are Not Unique ( August 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/is-agile-the-enemy-of-good-design&amp;#34;&amp;gt;Is Agile the Enemy (of Good Design)? ( July 28, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/whyestimates&amp;#34;&amp;gt;#WhyEstimates ( July 26, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ripple-effects-no-and-chips-on-shoulders&amp;#34;&amp;gt;Ripple Effects, No, and Chips On Shoulders… ( July 25, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-outcomes-less-drag&amp;#34;&amp;gt;Better Outcomes. Less Drag ( July 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-canary-dies&amp;#34;&amp;gt;The Canary Dies ( July 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-some-tool&amp;#34;&amp;gt;#Why[Some Tool] ( July 15, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/slack-vs-blocked&amp;#34;&amp;gt;Slack vs. Blocked ( July 13, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/invest-energy-and-focus-not-time&amp;#34;&amp;gt;Invest Energy and Focus, Not Time ( July 10, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/team-why-cant-we-go-faster&amp;#34;&amp;gt;Team! Why Can’t We Go Faster?! ( July 09, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/instant-results-guaranteed&amp;#34;&amp;gt;Instant Results! Guaranteed!* ( July 08, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/just-one-more-sprint&amp;#34;&amp;gt;Just One More Sprint!? ( July 07, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/quick-meeting-tips&amp;#34;&amp;gt;Quick Meeting Tips ( July 06, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/pms-share-outcomes-with-your-team&amp;#34;&amp;gt;PMs: Share Outcomes With Your Team ( July 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/opportunity-vs-intervention&amp;#34;&amp;gt;Opportunity vs. Intervention ( June 29, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-makes-no-sense&amp;#34;&amp;gt;Agile Makes No Sense ( June 28, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-with-naive-pragmatism&amp;#34;&amp;gt;Start With Naive Pragmatism ( June 26, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/its-products-fault-right&amp;#34;&amp;gt;It’s Product’s Fault! Right? ( June 25, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/a-single-prioritized-list-a-story&amp;#34;&amp;gt;A Single Prioritized List (a Story) ( June 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/focused-advocacy-and-improvement&amp;#34;&amp;gt;Focused Advocacy and Improvement ( June 21, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/when-you-hear-pay-attention&amp;#34;&amp;gt;When You Hear _______, Pay Attention ( June 20, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/before-adding-process&amp;#34;&amp;gt;Before Adding Process ( June 17, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/platitudes-and-brass-tacks&amp;#34;&amp;gt;Platitudes and Brass Tacks ( June 15, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-random-ticket-game&amp;#34;&amp;gt;The Random Ticket Game ( June 12, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/value-and-sequencing&amp;#34;&amp;gt;Value and Sequencing ( June 07, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-spokesperson-trap&amp;#34;&amp;gt;The Spokesperson Trap ( June 05, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/prioritizing-non-feature-work-and-continuous-improvement&amp;#34;&amp;gt;Prioritizing “Non-Feature” Work and Continuous Improvement ( June 04, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-quick-wins&amp;#34;&amp;gt;We Need Quick Wins… ( June 04, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unsuck-days&amp;#34;&amp;gt;Unsuck Days ( June 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/they-just-want-to-code-or-design-all-day&amp;#34;&amp;gt;“They Just Want To Code (or Design) All Day” ( May 30, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/three-deep-breaths&amp;#34;&amp;gt;Three Deep Breaths ( May 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/systems-and-people-behaving-badly&amp;#34;&amp;gt;Systems and People Behaving Badly ( May 17, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/good-process-vs-bad-process&amp;#34;&amp;gt;Good Process vs. Bad Process ( May 16, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/show-dont-tell&amp;#34;&amp;gt;Show Don’t Tell ( May 15, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/how-does-your-company-approach-continuous-improvement&amp;#34;&amp;gt;How Does Your Company Approach Continuous Improvement? ( May 12, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-all-care-about-congruence-right&amp;#34;&amp;gt;We All Care About Congruence. Right? ( May 10, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-outcomes-over-outputs&amp;#34;&amp;gt;Beyond “Outcomes Over Outputs” ( May 08, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/better-decisions-by-forecasting-cycle-time-as-a-team&amp;#34;&amp;gt;Better Decisions (By Forecasting Cycle Time as a Team) ( May 05, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/problem-vs-solution&amp;#34;&amp;gt;Problem vs. Solution ( April 20, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/working-with-software-developers-9-tips-for-product-managers&amp;#34;&amp;gt;Working With Software Developers (9 Tips for Product Managers) ( April 15, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/cost-per-reasonable-decision-cprd&amp;#34;&amp;gt;Cost Per Reasonable Decision (CPRD) ( April 01, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/task-story-bigger-story-bets-foundational-beliefs-drawing&amp;#34;&amp;gt;Task, Story, Bigger Story, Bets, Foundational Beliefs (Drawing) ( March 27, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/starting-without-a-solution&amp;#34;&amp;gt;Starting Without A Solution ( March 16, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/40-roadmap-item-questions&amp;#34;&amp;gt;40 Roadmap Item Questions ( March 02, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/so-that-prioritization-spreadsheet&amp;#34;&amp;gt;So That Prioritization Spreadsheet… ( February 25, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/look-before-leaping&amp;#34;&amp;gt;Look Before Leaping ( February 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/yes-but&amp;#34;&amp;gt;Yes, But… ( February 19, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/wip-it-real-good&amp;#34;&amp;gt;WIP It Real Good ( February 14, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/round-and-round&amp;#34;&amp;gt;Round and Round ( February 12, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/awesome-meh-awesome-but&amp;#34;&amp;gt;Awesome, Meh, Awesome But… ( February 03, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/start-together-finish-together&amp;#34;&amp;gt;Start Together. Finish Together ( January 31, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-need-fewer-product-managers&amp;#34;&amp;gt;We Need Fewer Product Managers ( January 29, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/lets-run-an-experiment&amp;#34;&amp;gt;“Let’s Run an Experiment!” ( January 28, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/we-cant-do-that-in-one-sprint&amp;#34;&amp;gt;We Can’t Do That In One Sprint ( January 24, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/my-idea-ism&amp;#34;&amp;gt;My-idea-ism ( January 23, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/measurement-malpractice&amp;#34;&amp;gt;Measurement Malpractice ( January 22, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/give-and-take&amp;#34;&amp;gt;Give and Take ( January 21, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agile-done-right-is-continuous-design&amp;#34;&amp;gt;Agile (Done Right) Is Continuous Design ( January 13, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/customer-facing-product-thinking-multi-product-and-other-shenanigans&amp;#34;&amp;gt;Customer-Facing, Product Thinking, “Multi-Product”, and Other Shenanigans ( January 11, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/inventory-and-integration&amp;#34;&amp;gt;Inventory and Integration ( January 11, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-hard-thing-about-not-so-hard-things&amp;#34;&amp;gt;The Hard Thing About (Not So) Hard Things ( January 10, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/story-epilogues&amp;#34;&amp;gt;Story Epilogues ( January 06, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-story-per-sprint&amp;#34;&amp;gt;One Story Per “Sprint” ( January 05, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/of-course-psychological-safety-but-how&amp;#34;&amp;gt;Of Course Psychological Safety…But How? ( January 04, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/some-totally-cliche-career-advice&amp;#34;&amp;gt;Some Totally Cliche Career Advice… ( January 03, 2018 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/our-intuition-says-instead-try&amp;#34;&amp;gt;Our Intuition Says… Instead, Try… ( December 23, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/flow-decoupling-cadences-and-fixed-length-sprints&amp;#34;&amp;gt;Flow, Decoupling Cadences, and Fixed-Length Sprints ( December 21, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/trying-something&amp;#34;&amp;gt;“Trying Something” ( December 19, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-is-the-best-thing-in-the-whole-wide-world&amp;#34;&amp;gt;Scrum is the Best Thing in the Whole Wide World ( December 19, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/100-wikipedia-articles-on-software-product-development-and-related-disciplines&amp;#34;&amp;gt;100 Wikipedia Articles on Software Product Development (and Related Disciplines) ( December 17, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/agiles-three-leaps-of-faith&amp;#34;&amp;gt;Agile’s Three Leaps of Faith ( December 16, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/fixed-length-sprints&amp;#34;&amp;gt;Fixed-Length Sprints ( December 12, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-playing-tetris-with-teams-sprints-projects-and-individuals&amp;#34;&amp;gt;Stop Playing Tetris (With Teams, Sprints, Projects, and Individuals) ( December 10, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/10-ways-the-c-suite-can-support-agility&amp;#34;&amp;gt;10 Ways the C-Suite Can Support Agility ( December 08, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/unlearning-and-relearning-agile&amp;#34;&amp;gt;Unlearning and Relearning Agile ( December 07, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/18-things-your-okrs-shouldnt-do&amp;#34;&amp;gt;18 Things Your OKRs Shouldn’t Do… ( December 06, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/responding-to-a-failed-sprint&amp;#34;&amp;gt;Responding to a “Failed” Sprint ( December 05, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-way-of-ways&amp;#34;&amp;gt;The Way of Ways ( December 04, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/work-smaller-even-if-it-makes-no-sense&amp;#34;&amp;gt;Work Smaller (Even If It Makes No Sense) ( December 04, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/sensor-responder-or-in-between&amp;#34;&amp;gt;Sensor? Responder? Or In Between? ( December 03, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scrum-prerequisites-from-the-scrum-guide&amp;#34;&amp;gt;Scrum Prerequisites (From the Scrum Guide) ( December 02, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/stop-obsessing-over-the-teams&amp;#34;&amp;gt;Stop Obsessing Over “The Teams” ( November 29, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/product-nerding-with-annie-dunham&amp;#34;&amp;gt;Product Nerding with Annie Dunham ( November 28, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/25-hints-youre-working-on-a-high-performing-team&amp;#34;&amp;gt;25 Hints You’re Working on a High Performing Team ( November 26, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/respect-expertise-and-work-together-dont-institutionalize-handoffs&amp;#34;&amp;gt;Respect Expertise and Work Together — Don’t Institutionalize Handoffs ( November 26, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-boards-are-a-design-challenge&amp;#34;&amp;gt;Kanban Boards are a Design Challenge ( November 25, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beat-the-feature-factory-video&amp;#34;&amp;gt;Beat the Feature Factory (Video) ( November 23, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/experiment-together-improve-together-win-together&amp;#34;&amp;gt;Experiment Together. Improve Together. Win Together ( November 23, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/for-meaningful-change-look-beyond-front-line-teams&amp;#34;&amp;gt;For Meaningful Change…Look Beyond Front-Line Teams ( November 23, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/interview-jared-spool-on-center-centre-real-projects-and-the-future-of-ux-education&amp;#34;&amp;gt;Interview: Jared Spool on Center Centre, Real Projects, and the Future of UX Education ( November 22, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-modern-agile-is-worth-checking-out&amp;#34;&amp;gt;Why Modern Agile is Worth Checking Out ( November 21, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/an-apple-a-day&amp;#34;&amp;gt;An Apple a Day ( November 19, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/maker-angst-job-flippers-and-do-gooders&amp;#34;&amp;gt;Maker Angst — Job Flippers and Do Gooders ( November 18, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ask-alexa-to-better-understand-your-users&amp;#34;&amp;gt;Ask Alexa (To Better Understand Your Users) ( November 17, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/backlog-roadmap-hygiene-tips&amp;#34;&amp;gt;Backlog/Roadmap Hygiene Tips ( November 17, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-trouble-with-scrum&amp;#34;&amp;gt;The Trouble With Scrum ( November 16, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/30-thoughts-on-change-org-health-and-change-agency&amp;#34;&amp;gt;30 Thoughts On Change, Org Health, and Change Agency ( November 14, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/let-teams-figure-it-out&amp;#34;&amp;gt;Let Teams Figure It Out ( November 11, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-product-system&amp;#34;&amp;gt;The Product “System” ( November 09, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-battle-for-change&amp;#34;&amp;gt;The Battle For Change ( November 02, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/question-given-this-scenario-what-does-the-product-manager-do&amp;#34;&amp;gt;Question: Given This Scenario, What Does The Product Manager Do? ( October 30, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-one-week-product-management-challenge&amp;#34;&amp;gt;The One Week Product Management Challenge ( October 30, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/ways&amp;#34;&amp;gt;Ways ( October 29, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/faster-faster-faster&amp;#34;&amp;gt;Faster. Faster. Faster. ( October 27, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-work-is-never-done&amp;#34;&amp;gt;The Work Is Never Done ( October 21, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-backlog-aka-wishing-well&amp;#34;&amp;gt;The Backlog (aka Wishing Well) ( October 20, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/now-that-would-be-bad&amp;#34;&amp;gt;Now That Would Be Bad… ( October 19, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/the-psychological-safety-dance&amp;#34;&amp;gt;The (Psychological) Safety Dance ( October 18, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/why-isnt-agile-working&amp;#34;&amp;gt;Why Isn’t Agile Working? ( October 05, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/scaling-without-imploding&amp;#34;&amp;gt;Scaling Without Imploding ( October 03, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/beyond-features-and-projects-it-arena-2017-lviv-ukraine&amp;#34;&amp;gt;Beyond Features and Projects (IT Arena 2017— Lviv, Ukraine) ( September 30, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/one-day-sprints&amp;#34;&amp;gt;One Day Sprints ( September 25, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/play-it-again-sam&amp;#34;&amp;gt;Play It Again Sam! ( September 25, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/forcing-functions-and-continuous-improvement&amp;#34;&amp;gt;Forcing Functions and Continuous Improvement ( September 24, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/kanban-cantban-and-risky-visualizations&amp;#34;&amp;gt;Kanban, Can’tban, and Risky Visualizations ( September 22, 2017 )&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cutle.fish/blog/competition-fitness-change-and-front-line-angst&amp;#34;&amp;gt;Competition, Fitness, …&amp;lt;/a&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210928-080734/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210928-080734/</guid>
      <description>14 Sep 2021&amp;lt;br&amp;gt;
25 Aug 2021&amp;lt;br&amp;gt;
20 Apr 2021&amp;lt;br&amp;gt;
16 Feb 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog by Jared Nelsen</title>
      <link>https://www.whatsupup.com/blog/baldish/wince/20210928-080731/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/baldish/wince/20210928-080731/</guid>
      <description>October 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/category/tutorials/&amp;#34;&amp;gt;Tutorials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
February 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/category/industry/&amp;#34;&amp;gt;Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ferns</title>
      <link>https://www.whatsupup.com/blog/incremental/comte/20210928-080723/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/incremental/comte/20210928-080723/</guid>
      <description>May 10, 2021&amp;lt;br&amp;gt;
Dec 26, 2020&amp;lt;br&amp;gt;
Feb 12, 2020&amp;lt;br&amp;gt;
Oct 26, 2019&amp;lt;br&amp;gt;
Jun 30, 2019&amp;lt;br&amp;gt;
Jan 31, 2019&amp;lt;br&amp;gt;
Nov 9, 2017&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20210928-080709/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20210928-080709/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Portalware_DIS21.pdf&amp;#34;&amp;gt;Portalware: Exploring Free-Hand AR Drawing with a Dual-Display Smartphone-Wearable Paradigm&amp;lt;/a&amp;gt; Jing Qian, Tongyu Zhou, Meredith Young-Ng, Jiaju Ma, Angel Cheung, Xiangyu Li, Ian Gonsher, Jeff Huang DIS 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SelfE_CHI21.pdf&amp;#34;&amp;gt;Self-E: Smartphone-Supported Guidance for Customizable Self-Experimentation&amp;lt;/a&amp;gt; Nediyana Daskalova, Eindra Kyi, Kevin Ouyang, Arthur Borem, Sally Chen, Sung Hyun Park, Nicole Nugent, Jeff Huang CHI 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://selfe.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Sochiatrist_CSCW20.pdf&amp;#34;&amp;gt;Sochiatrist: Signals of Affect in Messaging Data&amp;lt;/a&amp;gt; Talie Massachi, Grant Fong, Varun Mathur, Sachin Pendse, Gabriela Hoefer, Jessica Fu, Chong Wang, Nikita Ramoji, Nicole Nugent, Megan Ranney, Daniel Dickstein, Michael Armey, Ellie Pavlick, Jeff Huang CSCW 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sochiatrist.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Sketchy_CSCW20.pdf&amp;#34;&amp;gt;Sketchy: Drawing Inspiration from the Crowd&amp;lt;/a&amp;gt; Shaun Wallace, Brendan Le, Luis Leiva, Aman Haq, Ari Kintisch, Gabrielle Bufrem, Linda Chang, Jeff Huang CSCW 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sketchy.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SleepBandits_CHI20.pdf&amp;#34;&amp;gt;SleepBandits: Guided Flexible Self-Experiments for Sleep&amp;lt;/a&amp;gt; Nediyana Daskalova, Jina Yoon, Yibing Wang, Cintia Araujo, Guillermo Beltran, Nicole Nugent, John McGeary, Joseph Jay Williams, Jeff Huang CHI 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sleepcoacher.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Portalble_UIST19.pdf&amp;#34;&amp;gt;Portal-ble: Intuitive Free-Hand Manipulation in Unbounded Smartphone-based Augmented Reality&amp;lt;/a&amp;gt; Jing Qian, Jiaju Ma, Xiangyu Li, Benjamin Attal, Haoming Lai, James Tompkin, John Hughes, Jeff Huang UIST 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://portalble.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Rewind_IMWUT18.pdf&amp;#34;&amp;gt;Rewind: Automatically Reconstructing Everyday Memories with First-Person Perspectives&amp;lt;/a&amp;gt; Neille-Ann Tan, Han Sha, Eda Celen, Phucanh Tran, Kelly Wang, Gifford Cheung, Philip Hinch, Jeff Huang IMWUT 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Remotion_IMWUT18.pdf&amp;#34;&amp;gt;Remotion: A Motion-Based Capture and Replay Platform of Mobile Device Interaction for Remote Usability Testing&amp;lt;/a&amp;gt; Jing Qian, Arielle Chapin, Alexandra Papoutsaki, Fumeng Yang, Klaas Nelissen, Jeff Huang IMWUT 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://remotion.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/EyeTyper_ETRA18.pdf&amp;#34;&amp;gt;The Eye of the Typer: A Benchmark and Analysis of Gaze Behavior during Typing&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Aaron Gokaslan, James Tompkin, Yuze He, Jeff Huang ETRA 2018 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/data/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SelfExperiments_IMWUT17.pdf&amp;#34;&amp;gt;Lessons Learned from Two Cohorts of Personal Informatics Self-Experiments&amp;lt;/a&amp;gt; Nediyana Daskalova, Karthik Desingh, Alexandra Papoutsaki, Diane Schulze, Han Sha, Jeff Huang IMWUT 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Drafty_HCOMP17.pdf&amp;#34;&amp;gt;Drafty: Enlisting Users to be Editors who Maintain Structured Data&amp;lt;/a&amp;gt; Shaun Wallace, Lucy van Kleunen, Marianne Aubin-Le Quere, Abraham Peterkin, Yirui Huang, Jeff Huang HCOMP 2017 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drafty.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SearchGazer_CHIIR17.pdf&amp;#34;&amp;gt;SearchGazer: Webcam Eye Tracking for Remote Studies of Web Search&amp;lt;/a&amp;gt; Alexandra Papoutsaki, James Laskey, Jeff Huang CHIIR 2017    (Best Paper Finalist) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/search/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/MasterMaker_TOPICS17.pdf&amp;#34;&amp;gt;Master Maker: Understanding Gaming Skill through Practice and Habit from Gameplay Behavior&amp;lt;/a&amp;gt; Jeff Huang, Eddie Yan, Gifford Leung, Nachiappan Nagappan, Thomas Zimmermann topiCS (Topics in Cognitive Science), 9(2), 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SleepCoacher_UIST16.pdf&amp;#34;&amp;gt;SleepCoacher: A Personalized Automated Self-Experimentation System for Sleep Recommendations&amp;lt;/a&amp;gt; Nediyana Daskalova, Danaë Metaxa, Adrienne Tran, Nicole Nugent, Julie Boergers, John McGeary, Jeff Huang UIST 2016 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sleepcoacher.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/WebGazer_IJCAI16.pdf&amp;#34;&amp;gt;WebGazer: Scalable Webcam Eye Tracking Using User Interactions&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Patsorn Sangkloy, James Laskey, Nediyana Daskalova, Jeff Huang, James Hays IJCAI 2016 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webgazer.cs.brown.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/CrowdsourcingNovices_HCOMP15.pdf&amp;#34;&amp;gt;Crowdsourcing from Scratch: A Pragmatic Experiment in Data Collection by Novice Requesters&amp;lt;/a&amp;gt; Alexandra Papoutsaki, Hua Guo, Danaë Metaxa, Connor Gramazio, Jeff Rasley, Wenting Xie, Guan Wang, Jeff Huang HCOMP 2015    (Best Paper Finalist)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/MastersOfControl_CHI15.pdf&amp;#34;&amp;gt;Masters of Control: Behavioral Patterns of Simultaneous Unit Group Manipulation in StarCraft 2&amp;lt;/a&amp;gt; Eddie Yan, Jeff Huang, Gifford Cheung CHI 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/HaloLearning_CHI13.pdf&amp;#34;&amp;gt;Mastering the Art of War: How Patterns of Gameplay Influence Skill in Halo&amp;lt;/a&amp;gt; Jeff Huang, Thomas Zimmermann, Nachiappan Nagappan, Charles Harrison, Bruce Phillips CHI 2013    (Best Paper Finalist)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/RevMiner_UIST12.pdf&amp;#34;&amp;gt;RevMiner: An Extractive Interface for Navigating Reviews on a Smartphone&amp;lt;/a&amp;gt; Jeff Huang, Oren Etzioni, Luke Zettlemoyer, Kevin Clark, Christian Lee UIST 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/CursorModel_SIGIR12.pdf&amp;#34;&amp;gt;Improving Searcher Models Using Mouse Cursor Activity&amp;lt;/a&amp;gt; Jeff Huang, Ryen White, Georg Buscher, Kuansan Wang SIGIR 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/GazeCursor_CHI12.pdf&amp;#34;&amp;gt;User See, User Point: Gaze and Cursor Alignment in Web Search&amp;lt;/a&amp;gt; Jeff Huang, Ryen White, Georg Buscher CHI 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Branching_WSDM12.pdf&amp;#34;&amp;gt;No Search Result Left Behind: Branching Behavior with Browser Tabs&amp;lt;/a&amp;gt; Jeff Huang, Thomas Lin, Ryen White WSDM 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/InteractionDifferences_WSDM12.pdf&amp;#34;&amp;gt;Large-Scale Analysis of Individual and Task Differences in Search Result Page Examination Strategies&amp;lt;/a&amp;gt; Georg Buscher, Ryen White, Susan Dumais, Jeff Huang WSDM 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/RuleVariants_CSCW12.pdf&amp;#34;&amp;gt;Remix and Play: Lessons from Rule Variants in Texas Hold&amp;#39;em and Halo 2&amp;lt;/a&amp;gt; Gifford Cheung and Jeff Huang CSCW 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/DifficultQueries_ECIR12.pdf&amp;#34;&amp;gt;Interactive Search Support for Difficult Web Queries&amp;lt;/a&amp;gt; Abdigani Diriye, Giridhar Kumaran, Jeff Huang ECIR 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/CursorBehavior_CHI11.pdf&amp;#34;&amp;gt;No Clicks, No Problem: Using Cursor Movements to Understand and Improve Search&amp;lt;/a&amp;gt; Jeff Huang, Ryen White, and Susan Dumais CHI 2011    (Best Paper Finalist)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/StarcraftSpectator_CHI11.pdf&amp;#34;&amp;gt;Starcraft from the Stands: Understanding the Game Spectator&amp;lt;/a&amp;gt; Gifford Cheung and Jeff Huang CHI 2011&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/ReviewingSearchResults_AAAI10.pdf&amp;#34;&amp;gt;Optimal Strategies for Reviewing Search Results&amp;lt;/a&amp;gt; Jeff Huang and Anna Kazeykina AAAI 2010&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/EvaluatingTrails_SIGIR10.pdf&amp;#34;&amp;gt;Assessing the Scenic Route: Measuring the Value of Search Trails in Web Logs&amp;lt;/a&amp;gt; Ryen White and Jeff Huang SIGIR 2010    (Best Paper Award)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Trailfinding_SIGIR10.pdf&amp;#34;&amp;gt;Studying Trailfinding Algorithms for Enhanced Web Search&amp;lt;/a&amp;gt; Adish Singla, Ryen White, and Jeff Huang SIGIR 2010&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/TwitterTagging_HT10.pdf&amp;#34;&amp;gt;Conversational Tagging in Twitter&amp;lt;/a&amp;gt; Jeff Huang, Katherine Thornton, and Efthimis Efthimiadis Hypertext 2010 short paper&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/ParallelBrowsing_HT10.pdf&amp;#34;&amp;gt;Parallel Browsing Behavior on the Web&amp;lt;/a&amp;gt; Jeff Huang and Ryen White Hypertext 2010 short paper&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Reformulation_CIKM09.pdf&amp;#34;&amp;gt;Analyzing and Evaluating Query Reformulation Strategies in Web Search Logs&amp;lt;/a&amp;gt; Jeff Huang and Efthimis Efthimiadis CIKM 2009    (Best Student Paper Finalist)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Graphstract_UIST07.pdf&amp;#34;&amp;gt;Graphstract: Minimal Graphical Help for Computers&amp;lt;/a&amp;gt; Jeff Huang and Michael Twidale UIST 2007&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/PanZoom_CHI19.pdf&amp;#34;&amp;gt;Evaluating Pan and Zoom Timelines and Sliders&amp;lt;/a&amp;gt; Michail Schwab, Sicheng Hao, Olga Vitek, James Tompkin, Jeff Huang, Michelle Borkin CHI 2019 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://multiscale-timelines.ccs.neu.edu/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/EasyPZ_VIS2019.pdf&amp;#34;&amp;gt;EasyPZ.js: Interaction Binding For Pan and Zoom Visualizations&amp;lt;/a&amp;gt; Michail Schwab, James Tompkin, Jeff Huang, Michelle Borkin VIS 2019 short paper &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://easypz.io/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SleepCohorts_IMWUT18.pdf&amp;#34;&amp;gt;Investigating the Effectiveness of Cohort-Based Sleep Recommendations&amp;lt;/a&amp;gt; Nediyana Daskalova, Bongshin Lee, Jeff Huang, Chester Ni, Jessica Lundin IMWUT 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/SEEDE_ASE18.pdf&amp;#34;&amp;gt;SEEDE: Simultaneous Execution and Editing in a Development Environment&amp;lt;/a&amp;gt; Steven Reiss, Qi Xin, Jeff Huang ASE 2018&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://doi.org/10.1109/TVCG.2017.2734659&amp;#34;&amp;gt;An Analysis of Automated Visual Analysis Classification: Interactive Visualization Task Inference of Cancer Genomics Domain Experts&amp;lt;/a&amp;gt; Connor Gramazio, Jeff Huang, David Laidlaw TVCG (Transactions on Visualization and Computer Graphics), 24(8), 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dx.doi.org/10.1016/j.ipm.2016.04.005&amp;#34;&amp;gt;Strokes of Insight: User Intent Detection and Kinematic Compression of Mouse Cursor Trails&amp;lt;/a&amp;gt; Daniel Martín-Albo, Luis Leiva, Jeff Huang, Réjean Plamondond IPM (Information Processing &amp;amp;amp; Management), 52(6), 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://link.springer.com/article/10.1007/s10458-015-9283-7&amp;#34;&amp;gt;Learning Behaviors via Human-Delivered Discrete Feedback&amp;lt;/a&amp;gt; Robert Loftin, Bei Peng, James MacGlashan, Michael Littman, Matthew Taylor, Jeff Huang, David Roberts JAAMAS (Autonomous Agents and Multi-Agent Systems), 30(1), 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dx.doi.org/10.1109/TVCG.2015.2424872&amp;#34;&amp;gt;Representing Uncertainty in Graph Edges: An Evaluation of Paired Visual Variables&amp;lt;/a&amp;gt; Hua Guo, Jeff Huang, David Laidlaw TVCG (Transactions on Visualization and Computer Graphics), 21(10), 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dx.doi.org/10.1016/j.ipm.2014.10.005&amp;#34;&amp;gt;Building a Better Mousetrap: Compressing Mouse Cursor Activity for Web Analytics&amp;lt;/a&amp;gt; Luis Leiva, Jeff Huang IPM (Information Processing &amp;amp;amp; Management), 51(2), 2015 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hci.brown.edu/mousetrap/&amp;#34;&amp;gt;[website]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/StrategyAwareLearning_AAAI14.pdf&amp;#34;&amp;gt;A Strategy-Aware Technique for Learning Behaviors from Discrete Human Feedback&amp;lt;/a&amp;gt; Robert Loftin, James MacGlashan, Bei Peng, Matthew Taylor, Michael Littman, Jeff Huang, David Roberts AAAI 2014&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/HumanFeedback_ROMAN14.pdf&amp;#34;&amp;gt;Learning Something from Nothing: Leveraging Implicit Human Feedback Strategies&amp;lt;/a&amp;gt; Robert Loftin, Bei Peng, James MacGlashan, Michael Littman, Matthew Taylor, Jeff Huang, David Roberts RO-MAN 2014&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/HaloSkill_CHIGUR13.pdf&amp;#34;&amp;gt;Influence of Gameplay on Skill in Halo Reach&amp;lt;/a&amp;gt; Jeff Huang, Thomas Zimmermann, Nachiappan Nagappan, Charles Harrison, Bruce Phillips CHI Games User Research Workshop 2013&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/TouchTracking_HCIR12.pdf&amp;#34;&amp;gt;Web User Interaction Mining from Touch-Enabled Mobile Devices&amp;lt;/a&amp;gt; Jeff Huang and Abdigani Diriye HCIR Workshop 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/PageLevelInteractions_HCIR11.pdf&amp;#34;&amp;gt;On the Value of Page-Level Interactions in Web Search&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.org&amp;#34;&amp;gt;Jeff Huang&amp;lt;/a&amp;gt; HCIR Workshop 2011&amp;lt;br&amp;gt;
245 CIT 115 Waterman Street Providence RI 02912 401-863-5808 &amp;lt;a href=&amp;#34;mailto:home@jeffhuang.com&amp;#34;&amp;gt;home@jeffhuang.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/&amp;#34;&amp;gt;User Interfaces&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1950i/&amp;#34;&amp;gt;Fall 2013&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2014/&amp;#34;&amp;gt;Fall 2014&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2015/&amp;#34;&amp;gt;Fall 2015&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2016/&amp;#34;&amp;gt;Fall 2016&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2017/&amp;#34;&amp;gt;Fall 2017&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2018/&amp;#34;&amp;gt;Fall 2018&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/fall2019/&amp;#34;&amp;gt;Fall 2019&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1300/&amp;#34;&amp;gt;Fall 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2300/&amp;#34;&amp;gt;HCI Seminar&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2951-l/&amp;#34;&amp;gt;Spring 2014&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2300/spring2015/&amp;#34;&amp;gt;Spring 2015&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2300/spring2018/&amp;#34;&amp;gt;Spring 2018&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2300/&amp;#34;&amp;gt;Spring 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1301/&amp;#34;&amp;gt;Livestreaming Reimagined&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci1301/&amp;#34;&amp;gt;Spring 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Computer Science Research Methods Spring 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2951-r/&amp;#34;&amp;gt;Personal Informatics Seminar&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.brown.edu/courses/csci2951-r/&amp;#34;&amp;gt;Spring 2016&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://courses.washington.edu/ir2010/&amp;#34;&amp;gt;Information Retrieval&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://courses.washington.edu/ir2010/&amp;#34;&amp;gt;Fall 2010 (University of Washington)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.pomona.edu/~apapoutsaki/&amp;#34;&amp;gt;Dr. Alexandra Papoutsaki&amp;lt;/a&amp;gt; (2017) &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://blog.cs.brown.edu/2017/03/13/alexandra-papoutsaki-lands-dream-job-pomona-college/&amp;#34;&amp;gt;landed her dream position&amp;lt;/a&amp;gt; as Assistant Professor at Pomona College&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nediyana.github.io/&amp;#34;&amp;gt;Dr. Nediyana Daskalova&amp;lt;/a&amp;gt; (2020) was a pioneer for flexible self-experimentation systems, and became a research scientist at Spotify&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20210928-080702/</link>
      <pubDate>Tue, 28 Sep 2021 08:07:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20210928-080702/</guid>
      <description>Welcome to part 1 of this narrative series about writing a complete video game from scratch, using the PICO -8.  This is actually the second part, because in this house (unlike Lua) we index from 0, so if you’re new here you may want to consult the introductory stuff and table of contents in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2020/11/30/gamedev-from-scratch-0-groundwork/&amp;#34;&amp;gt;part zero&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
GitHub has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/eevee/anise-cheezball-rising/releases&amp;#34;&amp;gt;intermittent prebuilt ROMs&amp;lt;/a&amp;gt; , or you can get them a week early &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.patreon.com/eevee/posts?tag=cheezball%20rising&amp;#34;&amp;gt;on Patreon&amp;lt;/a&amp;gt; if you pledge $4.  More details in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/eevee/anise-cheezball-rising&amp;#34;&amp;gt;README&amp;lt;/a&amp;gt; !&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/blog/2021/01/24/eevee-gained-3367-experience-points/&amp;#34;&amp;gt;Eevee gained 3367 experience points&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog - Parsers</title>
      <link>https://www.whatsupup.com/blog/nonspecific/thinkably/20210928-080657/</link>
      <pubDate>Tue, 28 Sep 2021 08:06:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nonspecific/thinkably/20210928-080657/</guid>
      <description>Let’s consider what advanced analytics and advanced data management are, how they are related to business digitalization, and why Gartner research bureau included these technologies in the TOP 10 of the most promising trends of 2020. What is advanced Analytics &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/why-you-need-advanced-big-data-analytics-and-how-to-get-it/&amp;#34;&amp;gt;Read more…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/2020/09/&amp;#34;&amp;gt;September 2020&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Parsers, Inc. 220 East 23rd Street, Suite 400, New York, NY, 10010 support@parsers.me Operation mode: Monday to Friday 12:00PM - 6:00PM (US Pacific Time Zone)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20210928-080637/</link>
      <pubDate>Tue, 28 Sep 2021 08:06:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20210928-080637/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;#34;&amp;gt;[Guest Writer] My Thoughts On Afghanistan As A Member Of The US Military&amp;lt;/a&amp;gt; August 18, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/29/stop-politicizing-medicine/&amp;#34;&amp;gt;STOP POLITICIZING MEDICINE: Facts vs. Myths of the Frontline Doctors Video&amp;lt;/a&amp;gt; July 29, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2020/07/15/facebook-sucks/&amp;#34;&amp;gt;Facebook is a disease.&amp;lt;/a&amp;gt; July 15, 2020&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brad Fitzpatrick [bradfitz.com]</title>
      <link>https://www.whatsupup.com/blog/cashbox/snarler/20210928-080618/</link>
      <pubDate>Tue, 28 Sep 2021 08:06:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/cashbox/snarler/20210928-080618/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.danga.com/&amp;#34;&amp;gt;Danga&amp;lt;/a&amp;gt; : 1998-2005, company I started, developed a lot of software: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://memcached.org/&amp;#34;&amp;gt;memcached&amp;lt;/a&amp;gt; ,
MogileFS, Perlbal, etc.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.livejournal.com/&amp;#34;&amp;gt;LiveJournal&amp;lt;/a&amp;gt; : 1999-2007, blogging, social networking, forums, feed aggregator. Sold to Six Apart, later sold to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://sup.ru&amp;#34;&amp;gt;SUP&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Six_Apart&amp;#34;&amp;gt;Six Apart&amp;lt;/a&amp;gt; : 2005-2007, &amp;amp;quot;Chief Architect&amp;amp;quot; (for backend infrastructure), &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://plus.google.com/u/0/115863474911002159675/posts/5jVttEPvjKD&amp;#34;&amp;gt;created&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://openid.net/&amp;#34;&amp;gt;OpenID&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://gearman.org/&amp;#34;&amp;gt;Gearman&amp;lt;/a&amp;gt; , djabberd, ..&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.google.com/&amp;#34;&amp;gt;Google&amp;lt;/a&amp;gt; : 2007 - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bradfitz.com/2020/01/27/leaving-google&amp;#34;&amp;gt;2020&amp;lt;/a&amp;gt; . Public stuff includes:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://webfinger.net/&amp;#34;&amp;gt;WebFinger&amp;lt;/a&amp;gt; , with tons of Internet people, since ~2006. Added gmail support. Not finished.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://golang.org/&amp;#34;&amp;gt;Go Programming Language&amp;lt;/a&amp;gt; , 2010-2020; so refreshingly simple and productive. makes me giddy about writing code again after years of hating the major trade-offs between different languages.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Steve Klabnik&#39;s personal website</title>
      <link>https://www.whatsupup.com/blog/eastward/homogenized/20210928-080617/</link>
      <pubDate>Tue, 28 Sep 2021 08:06:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/eastward/homogenized/20210928-080617/</guid>
      <description>&amp;lt;p&amp;gt;October	16, 2020&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
On December 18, 2009[1](a&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/thoughts-on-rust-in-2019&amp;#34;&amp;gt;Thoughts on Rust in 2019&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/2-sup-5&amp;#34;&amp;gt;0b100000&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/looking-back-at-rust-in-2018&amp;#34;&amp;gt;Looking back at Rust in 2018&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/2013--year-in-review&amp;#34;&amp;gt;2013: year in review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/resque-1-25-0-pre-has-been-released&amp;#34;&amp;gt;Resque 1.25.0.pre has been released&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/draper-1-0-0-beta2-release&amp;#34;&amp;gt;Draper 1.0.0.beta2 release&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
My [last blog post](/2011&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://steveklabnik.com/writing/goals-for-2011&amp;#34;&amp;gt;Goals for 2011&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210928-080610/</link>
      <pubDate>Tue, 28 Sep 2021 08:06:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210928-080610/</guid>
      <description>&amp;lt;p&amp;gt;In October 2016, media outlets reported that data collected by some of the world’s most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank , one of Russia’s largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as well as a series of lawsuits and investigations that culminated last week with the indictment of the same former federal cybercrime prosecutor who brought the data to the attention of the FBI five years ago.&amp;lt;br&amp;gt;
The first page of Alfa Bank’s 2020 complaint.&amp;lt;br&amp;gt;
Since 2018, access to an exhaustive report commissioned by the U.S. Senate Armed Services Committee on data that prompted those experts to seek out the FBI has been limited to a handful of Senate committee leaders, Alfa Bank, and special prosecutors appointed to look into the origins of the FBI investigation on alleged ties between Trump and Russia.&amp;lt;br&amp;gt;
That report is now public, ironically thanks to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justsecurity.org/72262/the-trump-alfa-bank-server-mystery-resurfaces/&amp;#34;&amp;gt;a pair of lawsuits filed by Alfa Bank&amp;lt;/a&amp;gt; , which doesn’t directly dispute the information collected by the researchers. Rather, it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/09/alfacomplaint.png&amp;#34;&amp;gt;claims&amp;lt;/a&amp;gt; that the data they found was the result of a “highly sophisticated cyberattacks against it in 2016 and 2017” intended “to fabricate apparent communications” between Alfa Bank and the Trump Organization.&amp;lt;br&amp;gt;
The DNS strangeness was first identified in 2016 by a group of security experts who told reporters they were alarmed at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks&amp;#34;&amp;gt;hacking of the Democratic National Committee&amp;lt;/a&amp;gt; , and grew concerned that the same attackers might also target Republican leaders and institutions.&amp;lt;br&amp;gt;
Scrutinizing the Trump Organization’s online footprint, the researchers determined that for several months during the spring and summer of 2016, Internet servers at Alfa Bank in Russia, Spectrum Health in Michigan, and Heartland Payment Systems in New Jersey accounted for nearly all of the several thousand DNS lookups for a specific Trump Organization server (mail1.trump-email.com).&amp;lt;br&amp;gt;
This chart from a court filing Sept. 14, 2021 shows the top sources of traffic to the Trump Organization email server over a four month period in the spring and summer of 2016. DNS lookups from Alfa Bank constituted the majority of those requests.&amp;lt;br&amp;gt;
As recounted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.newyorker.com/magazine/2018/10/15/was-there-a-connection-between-a-russian-bank-and-the-trump-campaign&amp;#34;&amp;gt;this 2018 New Yorker story&amp;lt;/a&amp;gt; , New York Times journalist Eric Lichtblau met with FBI officials in late September 2016 to discuss the researchers’ findings. The bureau asked him to hold the story because publishing might disrupt an ongoing investigation. On Sept. 21, 2016, Lichtblau reportedly shared the DNS data with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bgrdc.com/&amp;#34;&amp;gt;B.G.R.&amp;lt;/a&amp;gt; , a Washington lobbying firm that worked with Alfa Bank.&amp;lt;br&amp;gt;
Lichtblau’s reporting on the DNS findings ended up buried in an October 31, 2016 story titled “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2016/11/01/us/politics/fbi-russia-election-donald-trump.html&amp;#34;&amp;gt;Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia&amp;lt;/a&amp;gt; ,” which stated that the FBI “ultimately concluded that there could be an innocuous explanation, like marketing email or spam,” that might explain the unusual DNS connections.&amp;lt;br&amp;gt;
Foer wrote that The Times hadn’t yet been in touch with the Trump campaign about the DNS data when the Trump email domain suddenly went offline.  Odder still, four days later the Trump Organization created a new host — trump1.contact-client.com — and the very first DNS lookup to that new domain came from servers at Alfa Bank.&amp;lt;br&amp;gt;
A jury in California today reached a guilty verdict in the trial of Matthew Gatrel , a St. Charles, Ill. man charged in 2018 with operating two online services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against Internet users and websites. Gatrel’s conviction comes roughly two weeks after his co-conspirator pleaded guilty to criminal charges related to running the services.&amp;lt;br&amp;gt;
On Sept. 14, KrebsOnSecurity heard from a reader who passed on an internal message apparently sent by TTEC to certain employees regarding the status of a widespread system outage that began on Sunday, Sept. 12.&amp;lt;br&amp;gt;
TTEC has not responded to requests for comment. A phone call placed to the media contact number listed on an August 2021 TTEC earnings release produced a message saying it was a non-working number.&amp;lt;br&amp;gt;
Top of the critical heap is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444&amp;#34;&amp;gt;CVE-2021-40444&amp;lt;/a&amp;gt; , which affects the “MSHTML” component of Internet Explorer (IE) on Windows 10 and many Windows Server versions. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-attackers-exploiting-windows-zero-day-flaw/&amp;#34;&amp;gt;a security advisory last week&amp;lt;/a&amp;gt; , Microsoft warned attackers already are exploiting the flaw through Microsoft Office applications as well as IE.&amp;lt;br&amp;gt;
The critical bug &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36965&amp;#34;&amp;gt;CVE-2021-36965&amp;lt;/a&amp;gt; is interesting, as it involves a remote code execution flaw in “WLAN AutoConfig,” the component in Windows 10 and many Server versions that handles auto-connections to Wi-Fi networks. One mitigating factor here is that the attacker and target would have to be on the same network, although many systems are configured to auto-connect to Wi-Fi network names with which they have previously connected.&amp;lt;br&amp;gt;
Allan Liska , senior security architect at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.recordedfuture.com&amp;#34;&amp;gt;Recorded Future&amp;lt;/a&amp;gt; , said a similar vulnerability — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28316&amp;#34;&amp;gt;CVE-2021-28316&amp;lt;/a&amp;gt; — was announced in April.&amp;lt;br&amp;gt;
“CVE-2021-28316 was a security bypass vulnerability, not remote code execution, and it has never been reported as publicly exploited,” Liska said. “That being said, the ubiquity of systems deployed with WLAN AutoConfig enabled could make it an attractive target for exploitation.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-patch-tuesday-september-2021-edition/#more-56909&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In its Aug. 19 writeup, Cloudflare neglected to assign a name to the botnet behind the attack. But on Thursday DDoS protection firm Qrator Labs &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/&amp;#34;&amp;gt;identified the culprit&amp;lt;/a&amp;gt; — “Meris” — a new monster that first emerged at the end of June 2021.&amp;lt;br&amp;gt;
While last night’s Meris attack on this site was far smaller than the recent Cloudflare DDoS, it was far larger than &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/&amp;#34;&amp;gt;the Mirai DDoS attack&amp;lt;/a&amp;gt; in 2016 that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/&amp;#34;&amp;gt;held KrebsOnSecurity offline for nearly four days&amp;lt;/a&amp;gt; . The traffic deluge from Thursday’s attack on this site was more than four times what Mirai threw at this site five years ago. This latest attack involved more than two million requests-per-second. By comparison, the 2016 Mirai DDoS generated approximately 450,000 requests-per-second.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444&amp;#34;&amp;gt;a security advisory&amp;lt;/a&amp;gt; from Redmond, the security hole &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://us-cert.cisa.gov/ncas/current-activity/2021/09/07/microsoft-releases-mitigations-and-workarounds-cve-2021-40444&amp;#34;&amp;gt;CVE-2021-40444&amp;lt;/a&amp;gt; affects the “MSHTML” component of Internet Explorer (IE) on Windows 10 and many Windows Server versions. IE been slowly abandoned for more recent Windows browsers like Edge , but the same vulnerable component also is used by Microsoft Office applications for rendering web-based content.&amp;lt;br&amp;gt;
Microsoft has not yet released a patch for CVE-2021-40444, but says users can mitigate the threat from this flaw by disabling the installation of all ActiveX controls in IE. Microsoft says the vulnerability is currently being used in targeted attacks, although its advisory credits three different entities with reporting the flaw.&amp;lt;br&amp;gt;
On of the researchers credited — EXPMON — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/EXPMON_/status/1435310341689331721&amp;#34;&amp;gt;said on Twitter&amp;lt;/a&amp;gt; that it had reproduced the attack on the latest Office 2019 / Office 365 on Windows 10.&amp;lt;br&amp;gt;
In May 2015, KrebsOnSecurity briefly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/05/phishing-gang-is-audacious-manipulator/&amp;#34;&amp;gt;profiled&amp;lt;/a&amp;gt; “ The Manipulaters ,” the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range of services for crafting, hosting and deploying malicious email. Six years later, a review of the social media postings from this group shows they are prospering, while rather poorly hiding their activities behind a software development firm in Lahore that has secretly enabled an entire generation of spammers and scammers.&amp;lt;br&amp;gt;
The Web site in 2015 for the “Manipulaters Team,” a group of Pakistani hackers behind the dark web identity “Saim Raza,” who sells spam and malware tools and services.&amp;lt;br&amp;gt;
For years leading up to 2015, “ &amp;lt;a href=&amp;#34;mailto:admin@manipulaters.com&amp;#34;&amp;gt;admin@manipulaters.com&amp;lt;/a&amp;gt; ” was the name on the registration records for thousands of scam domains that spoofed some of the world’s top banks and brand names, but particularly Apple and Microsoft. When confronted about this, The Manipulaters founder Madih-ullah Riaz replied, “We do not deliberately host or allow any phishing or any other abusive website. Regarding phishing, whenever we receive complaint, we remove the services immediately. Also we are running business since 2006.”&amp;lt;br&amp;gt;
The IT network of The Manipulaters, circa 2013. Image: Facebook&amp;lt;br&amp;gt;
Two years later, KrebsOnSecurity received an email from Riaz asking to have his name and that of his business partner removed from the 2015 story, saying it had hurt his company’s ability to maintain stable hosting for their stable of domains.&amp;lt;br&amp;gt;
“We run web hosting business and due to your post we got very serious problems especially no data center was accepting us,” Riaz wrote in a May 2017 email. “I can see you post on hard time criminals we are not criminals, at least it was not in our knowledge.”&amp;lt;br&amp;gt;
Phishing domain names registered to The Manipulaters included an address in Karachi, with the phone number 923218912562 . That same phone number is shared in the WHOIS records for 4,000&#43; domains registered through domainprovider[.]work , a domain controlled by The Manipulaters that appears to be a reseller of another domain name provider.&amp;lt;br&amp;gt;
As I noted in 2015, The Manipulaters Team used domain name service (DNS) settings from another blatantly fraudulent service called ‘ FreshSpamTools[.]eu ,’ which was offered by a fellow Pakistani who also conveniently sold phishing toolkits targeting a number of big banks.&amp;lt;br&amp;gt;
“A number of health insurance companies have wellness programs to encourage employees to exercise more, where if you sign up and pledge to 30 push-ups a day for the next few months or something you’ll get five wellness points towards a $10 Starbucks gift card, which requires 1000 wellness points,” Bill explained. “They’re actually automating the process of replying saying you completed this activity so they can bump up your point balance and get your gift card.”&amp;lt;br&amp;gt;
The domain Vip72[.]org was originally registered in 2006 to “ Corpse ,” the handle adopted by a Russian-speaking hacker who gained infamy several years prior for creating and selling an extremely sophisticated online banking trojan …&amp;lt;/p&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20210928-080548/</link>
      <pubDate>Tue, 28 Sep 2021 08:05:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20210928-080548/</guid>
      <description>&amp;lt;p&amp;gt;2021/07/30&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/02/22/cloud-services.html&amp;#34;&amp;gt;Cloud services, winter 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/11/02/eoa.html&amp;#34;&amp;gt;The essence of anticipation (2016)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/07/02/cloud-services.html&amp;#34;&amp;gt;Cloud services, summer 2016&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>List of posts - &lt;antirez&gt;</title>
      <link>https://www.whatsupup.com/blog/zipping/kathartic/20210928-080546/</link>
      <pubDate>Tue, 28 Sep 2021 08:05:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/zipping/kathartic/20210928-080546/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://antirez.com/news/126&amp;#34;&amp;gt;An update about Redis developments in 2019&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Yesterday a concerned Redis user wrote the following on Hacker News:
&amp;lt;p&amp;gt;— &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news.ycombinator.com/item?id=19204436&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://news.ycombinator.com/item?id=19204436&amp;#34;&amp;gt;https://news.ycombinator.com/item?id=19204436&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; —
I love Redis, but I&amp;#39;m a bit skeptical of some of the changes that are currently in development. The respv3 protocol has some features that, while they sound neat, also could significantly complicate client library code. There&amp;#39;s also a lot of work going into a granular acl. I can&amp;#39;t imagine why this would be necessary, or a higher priority than other changes like multi-thread support, better persistence model, data-types, etc.&amp;lt;br&amp;gt;
[EDIT! I&amp;#39;m reconsidering all this because Marc Gravell
from Stack Overflow suggested that we could just switch protocol for backward compatibility per-connection, sending a command to enable RESP3. That means no longer need for a global configuration that switches the behavior of the server. Put in that way it is a lot more acceptable for me, and I&amp;#39;m reconsidering the essence of the blog post]&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;A few weeks after the release of Redis 5, I’m here starting to implement RESP3, and after a few days of work it feels very well to see this finally happening. RESP3 is the new client-server protocol that Redis will use starting from Redis 6. The specification at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/antirez/resp3&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/antirez/resp3&amp;#34;&amp;gt;https://github.com/antirez/resp3&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; should explain in clear terms how this evolution of our old protocol, RESP2, should improve the Redis ecosystem. But let’s say that the most important thing is that RESP3 is more “semantic” than RESP2. For instance it has the concept of maps, sets (unordered lists of elements), attributes of the returned data, that may augment the reply with auxiliary information, and so forth. The final goal is to make new Redis clients have less work to do for us, that is, just deciding a set of fixed rules in order to convert every reply type from RESP3 to a given appropriate type of the client library programming language.&amp;lt;br&amp;gt;
[This blog post is also experimentally available on Medium: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/antirez/a-short-tale-of-a-read-overflow-b9210d339cff&amp;#34;&amp;gt;https://medium.com/antirez/a-short-tale-of-a-read-overflow-b9210d339cff&amp;lt;/a&amp;gt; ]&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;When a long running process crashes, it is pretty uncool. More so if the process happens to take a lot of state in memory. This is why I love web programming frameworks that are able, without major performance overhead, to create a new interpreter and a new state for each page view, and deallocate every resource used at the end of the page generation. It is an inherently more reliable programming paradigm, where memory leaks, descriptor leaks, and even random crashes from time to time do not constitute a serious issue. However system software like Redis is at the other side of the spectrum, a side populated by things that should never crash.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://antirez.com/news/108&amp;#34;&amp;gt;Writing an editor in less than 1000 lines of code, just for fun&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WARNING: Long pretty useless blog post. TLDR is that I wrote, just for fun, a text editor in less than 1000 lines of code that does not depend on ncurses and has support for syntax highlight and search feature. The code is here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://github.com/antirez/kilo&amp;#34;&amp;gt;http://github.com/antirez/kilo&amp;lt;/a&amp;gt; .
&amp;lt;p&amp;gt;Screencast here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://asciinema.org/a/90r2i9bq8po03nazhqtsifksb&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://asciinema.org/a/90r2i9bq8po03nazhqtsifksb&amp;#34;&amp;gt;https://asciinema.org/a/90r2i9bq8po03nazhqtsifksb&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; For the sentimentalists, keep reading…&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;A couple weeks ago there was this news about the Nano editor no longer being part of the GNU project. My first reaction was, wow people still really care about an old editor which is a clone of an editor originally part of a terminal based EMAIL CLIENT. Let’s say this again, “email client”. The notion of email client itself is gone at this point, everything changed. And yet I read, on Hacker News, a number of people writing how they were often saved by the availability of nano on random systems, doing system administrator tasks, for example. Nano is also how my son wrote his first program in C. It’s an acceptable experience that does not require past experience editing files.&amp;lt;br&amp;gt;
Yesterday night I was re-reading Redlock analysis Martin Kleppmann wrote ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;#34;&amp;gt;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; ). At some point Martin wonders if there is some good way to generate monotonically increasing IDs with Redis.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;This apparently simple problem can be more complex than it looks at a first glance, considering that it must ensure that, in all the conditions, there is a safety property which is always guaranteed: the ID generated is always greater than all the past IDs generated, and the same ID cannot be generated multiple times. This must hold during network partitions and other failures. The system may just become unavailable if there are less than the majority of nodes that can be reached, but never provide the wrong answer (note: as we&amp;#39;ll see this algorithm has another liveness issue that happens during high load of requests).&amp;lt;br&amp;gt;
Martin Kleppmann, a distributed systems researcher, yesterday published an analysis of Redlock ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://redis.io/topics/distlock&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://redis.io/topics/distlock&amp;#34;&amp;gt;http://redis.io/topics/distlock&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; ), that you can find here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;#34;&amp;gt;http://martin.kleppmann.com/2016/02/08/how-to-do-distributed-locking.html&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; Redlock is a client side distributed locking algorithm I designed to be used with Redis, but the algorithm orchestrates, client side, a set of nodes that implement a data store with certain capabilities, in order to create a multi-master fault tolerant, and hopefully safe, distributed lock with auto release capabilities.&amp;lt;br&amp;gt;
Lua scripting is probably the most successful Redis feature, among the ones introduced when Redis was already pretty popular: no surprise that a few of the things users really want are about scripting. The following two features were suggested multiple times over the last two years, and many people tried to focus my attention into one or the other during the Redis developers meeting, a few weeks ago.&amp;lt;/p&amp;gt;
&amp;lt;ol&amp;gt;
&amp;lt;li&amp;gt;A proper debugger for Redis Lua scripts.&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Replication, and storage on the AOF, of Lua scripts as a set of write commands materializing the &amp;lt;em&amp;gt;effects&amp;lt;/em&amp;gt; of the script, instead of replicating the script itself as we normally do.&amp;lt;br&amp;gt;
I’m just back from the Redis Dev meeting 2015. We spent two incredible days talking about Redis internals in many different ways. However while I’m waiting to receive private notes from other attenders, in order to summarize in a blog post what happened and what were the most important ideas exposed during the meetings, I’m going to touch a different topic here. I took the non trivial decision to move the Redis mailing list, consisting of 6700 members, to Reddit.&amp;lt;/li&amp;gt;
&amp;lt;/ol&amp;gt;
&amp;lt;p&amp;gt;This looks like a crazy ideas probably in some way, and “to move” is probably not the right verb, since the ML will still exist. However it will only be used in order to receive announcements of new releases, critical informations like security related ones, and from time to time, links to very important discussions that are happening on Reddit.&amp;lt;br&amp;gt;
If you know me, you know I’m not the kind of guy that considers competing products a bad thing. I actually love the users to have choices, so I rarely do anything like comparing Redis with other technologies.
However it is also true that in order to pick the right solution users must be correctly informed.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;This post was triggered by reading a blog post published by Mike Perham, that you may know as the author of a popular library called Sidekiq, that happens to use Redis as backend. So I would not consider Mike a person which is “against” Redis at all. Yet in his blog post that you can find at the URL &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.mikeperham.com/2015/09/24/storing-data-with-redis/&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;http://www.mikeperham.com/2015/09/24/storing-data-with-redis/&amp;#34;&amp;gt;http://www.mikeperham.com/2015/09/24/storing-data-with-redis/&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; he states that, for caching, “you should probably use Memcached instead [of Redis]”. So Mike simply really believes Redis is not good for caching, and he arguments his thesis in this way:&amp;lt;br&amp;gt;
Everybody knows Redis is single threaded. The best informed ones will tell you that, actually, Redis is &amp;lt;em&amp;gt;kinda&amp;lt;/em&amp;gt; single threaded, since there are threads in order to perform certain slow operations on disk. So far threaded operations were so focused on I/O that our small library to perform asynchronous tasks on a different thread was called bio.c: Background I/O, basically.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;However some time ago I opened an issue where I promised a new Redis feature that many wanted, me included, called “lazy free”. The original issue is here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/antirez/redis/issues/1748&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://github.com/antirez/redis/issues/1748&amp;#34;&amp;gt;https://github.com/antirez/redis/issues/1748&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Yesterday Amplitude published an article about scaling analytics, in the context of using the Set data type. The blog post is here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amplitude.com/blog/2015/08/25/scaling-analytics-at-amplitude/&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://amplitude.com/blog/2015/08/25/scaling-analytics-at-amplitude/&amp;#34;&amp;gt;https://amplitude.com/blog/2015/08/25/scaling-analytics-at-amplitude/&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; On Hacker News people asked why not using Redis instead: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news.ycombinator.com/item?id=10118413&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://news.ycombinator.com/item?id=10118413&amp;#34;&amp;gt;https://news.ycombinator.com/item?id=10118413&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; Amplitude developers have their set of reasons for not using Redis, and in general if you have a very specific problem and want to scale it in the best possible way, it makes sense to implement your vertical solution. I’m not adverse to reinventing the wheel, you want your very specific wheel sometimes, that a general purpose system may not be able to provide. Moreover creating your solution gives you control on what you did, boosts your creativity and your confidence in what you, as a developer can do, makes you able to debug whatever bug may arise in the future without external help.&amp;lt;br&amp;gt;
I’m back from Paris, DotScale 2015 was a very interesting conference. Before leaving I was working on Sentinel in the context of the unstable branch: the work was mainly about connection sharing. In short, it is the ability of a few Sentinels to scale, monitoring many masters. Before to leave, and now that I’m back, I tried to “secure” a set of features that will be the basis for Redis 3.2. In the next weeks I’ll be focusing developing these features, so I thought it’s worth to share the list with you ASAP.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://antirez.com/news/87&amp;#34;&amp;gt;Redis Conference 2015&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I’m back home, after a non easy trip, since to travel from San Francisco to Sicily is kinda NP complete: there are no solutions involving less than three flights. However it was definitely worth it, because the Redis Conference 2015 was very good, SF was wonderful as usually and I was able to meet with many interesting people. Here I’ll limit myself to writing a short account of the conference, but the trip was also an incredible …</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210927-192225/</link>
      <pubDate>Mon, 27 Sep 2021 19:22:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210927-192225/</guid>
      <description>September 27, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/27/Let-distros-do-their-job.html&amp;#34;&amp;gt;Developers: Let distros do their job&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210927-082029/</link>
      <pubDate>Mon, 27 Sep 2021 08:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210927-082029/</guid>
      <description>German conservatives, Social Democrats tied in vote to decide Angela Merkel&amp;#39;s successor as chancellor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/germans-vote-close-election-decide-merkel-successor-2021-09-25/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210927-081625/</link>
      <pubDate>Mon, 27 Sep 2021 08:16:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210927-081625/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/19/Blueskid-demo&amp;#34;&amp;gt;Blueskid Demo&amp;lt;/a&amp;gt; · I’ve been in the conversation around Twitter’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/bluesky&amp;#34;&amp;gt;@bluesky&amp;lt;/a&amp;gt; project, and last December I posted &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2020/12/01/Bluesky-Identity&amp;#34;&amp;gt;@bluesky Identity&amp;lt;/a&amp;gt; , a proposal for mapping between     social-media identities based on public keys and signatures.  Recently @bluesky announced the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blueskyweb.org/satellite&amp;#34;&amp;gt;Satellite&amp;lt;/a&amp;gt; contest, whose goal is to take identities on three or more online     properties and “Link them in a way that anyone can verify you are the author/owner of all.” Which is more or less what @bluesky     Identity is all about. So I pulled together a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/timbray/blueskidgo&amp;#34;&amp;gt;working demo called “Blueskid” (GitHub)&amp;lt;/a&amp;gt; . This is a quick walk-through of     Blueskid &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/19/Blueskid-demo&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210927-081412/</link>
      <pubDate>Mon, 27 Sep 2021 08:14:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210927-081412/</guid>
      <description>Threader &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/threader_app&amp;#34;&amp;gt;@threader_app&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
@mcnalg Hey, the thread is ready and compiled. You can read the whole version here: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/kDzD2KzMgv&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/kDzD2KzMgv&amp;#34;&amp;gt;https://t.co/kDzD2KzMgv&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Chris Dixon &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/cdixon&amp;#34;&amp;gt;@cdixon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Web 3 offers a new way that combines the best aspects of the previous eras. It’s very early in this movement and a great time to get involved.&amp;lt;br&amp;gt;
Before Web 3, users and builders had to choose between the limited functionality of Web 1 or the corporate, centralized model of Web 2.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210925-201741/</link>
      <pubDate>Sat, 25 Sep 2021 20:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210925-201741/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/codeforces/&amp;#34;&amp;gt;Codeforces&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/solutions/&amp;#34;&amp;gt;solutions&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/21/competitive-programming-in-haskell-codeforces-educational-round-114/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210925-201531/</link>
      <pubDate>Sat, 25 Sep 2021 20:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210925-201531/</guid>
      <description>&amp;#39;I felt like my voice wasn&amp;#39;t important&amp;#39;: Mother seeks justice for Navajo daughter after Petito case gains global attention &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/amid-attention-petito-case-native-mother-seeks-justice-2021-09-25/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210925-121747/</link>
      <pubDate>Sat, 25 Sep 2021 12:17:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210925-121747/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/codeforces/&amp;#34;&amp;gt;Codeforces&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/solutions/&amp;#34;&amp;gt;solutions&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/21/competitive-programming-in-haskell-codeforces-educational-round-114/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210925-121540/</link>
      <pubDate>Sat, 25 Sep 2021 12:15:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210925-121540/</guid>
      <description>Exclusive: Under U.S. sanctions, Iran and Venezuela strike oil export deal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/energy/exclusive-under-us-sanctions-iran-venezuela-strike-oil-export-deal-sources-2021-09-25/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-201756/</link>
      <pubDate>Fri, 24 Sep 2021 20:17:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-201756/</guid>
      <description>Exclusive: The White House will announce that millions of federal contractors must be vaccinated against COVID-19 by Dec. 8 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-white-house-wants-millions-government-contractors-vaccinated-by-dec-8-2021-09-24/?utm_source=banner&amp;amp;utm_medium=mobile&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210924-162012/</link>
      <pubDate>Fri, 24 Sep 2021 16:20:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210924-162012/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/projects/&amp;#34;&amp;gt;projects&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/game/&amp;#34;&amp;gt;game&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/programming/&amp;#34;&amp;gt;programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/resource/&amp;#34;&amp;gt;resource&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/robot/&amp;#34;&amp;gt;robot&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/swarm/&amp;#34;&amp;gt;Swarm&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2009/01/12/abstraction-intuition-and-the-monad-tutorial-fallacy/&amp;#34;&amp;gt;Abstraction, intuition, and the &amp;amp;quot;monad tutorial fallacy&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-161738/</link>
      <pubDate>Fri, 24 Sep 2021 16:17:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-161738/</guid>
      <description>U.S. House approves bill protecting abortion rights in response to new state restrictions &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-house-passes-abortion-rights-bill-expected-fail-senate-2021-09-24/?utm_source=banner&amp;amp;utm_medium=mobile&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210924-082024/</link>
      <pubDate>Fri, 24 Sep 2021 08:20:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210924-082024/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/&amp;#34;&amp;gt;Swarm: preview and call for collaboration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210924-042044/</link>
      <pubDate>Fri, 24 Sep 2021 04:20:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210924-042044/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/&amp;#34;&amp;gt;Swarm: preview and call for collaboration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
For about a month now I have been working on building a game &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com#fn1&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; , tentatively titled &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm&amp;#34;&amp;gt;Swarm&amp;lt;/a&amp;gt; . It’s nowhere near finished, but it has at least reached a point where I’m not embarrassed to show it off. I would love to hear feedback, and I would especially love to have others contribute! Read on for more details.&amp;lt;br&amp;gt;
Swarm is a 2D tile-based resource gathering game, but with a twist: the only way you can interact with the world is by building and programming robots. And there’s another twist: the kinds of commands your robots can execute, and the kinds of programming language features they can interpret, depends on what devices they have installed; and you can create new devices only by gathering resources. So you start out with only very basic capabilities and have to bootstrap your way into more sophisticated forms of exploration and resource collection.&amp;lt;br&amp;gt;
I guess you could say it’s kind of like a cross between Minecraft, Factorio, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Karel_(programming_language)&amp;#34;&amp;gt;Karel the Robot&amp;lt;/a&amp;gt; , but with a much cooler programming language (lambda calculus &#43; polymorphism &#43; recursion &#43; exceptions &#43; a command monad for first-class imperative programs &#43; a bunch of other stuff).&amp;lt;br&amp;gt;
The game is far from complete, and especially needs a lot more depth in terms of the kinds of devices and levels of abstraction you can build. But for me at least, it has already crossed the line into something that is actually somewhat fun to play.&amp;lt;br&amp;gt;
If it sounds interesting to you, give it a spin! Take a look at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/blob/main/README.md&amp;#34;&amp;gt;README&amp;lt;/a&amp;gt; and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/blob/main/TUTORIAL.md&amp;#34;&amp;gt;tutorial&amp;lt;/a&amp;gt; . If you’re interested in contributing to development, check out the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/blob/main/CONTRIBUTING.md&amp;#34;&amp;gt;CONTRIBUTING&amp;lt;/a&amp;gt; file and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/swarm/issues&amp;#34;&amp;gt;GitHub issue tracker&amp;lt;/a&amp;gt; , which I have populated with a plethora of tasks of varying difficulty. This could be a great project to contribute to especially if you’re relatively new to Haskell; I try to keep everything well-organized and well-commented, and am happy to help guide new contributors.&amp;lt;br&amp;gt;
Can you tell I am on sabbatical?&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/projects/&amp;#34;&amp;gt;projects&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/game/&amp;#34;&amp;gt;game&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/programming/&amp;#34;&amp;gt;programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/resource/&amp;#34;&amp;gt;resource&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/robot/&amp;#34;&amp;gt;robot&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/swarm/&amp;#34;&amp;gt;Swarm&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/23/swarm-preview-and-call-for-collaboration/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/game/&amp;#34;&amp;gt;game&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-001818/</link>
      <pubDate>Fri, 24 Sep 2021 00:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210924-001818/</guid>
      <description>U.S. House Select Committee probing Jan. 6 Capitol riot subpoenas ex-Trump advisers including Mark Meadows and Steve Bannon &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/congressional-probe-us-capitol-riot-subpoenas-bannon-meadows-2021-09-23/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-expressvpn/expressvpn-employees-complain-about-ex-spys-top-role-at-company-idUSKBN2GJ1V9&amp;#34;&amp;gt;ExpressVPN employees complain about ex-spy&amp;#39;s top role at company&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -When a senior executive at virtual private network company ExpressVPN admitted to working on behalf of a foreign intelligence service to hack American machines last week, it stunned employees at his new company, according to interviews and electronic records.&amp;lt;br&amp;gt;
SAN FRANCISCO, Sept 23 When a senior executive
at virtual private network company ExpressVPN admitted to
working on behalf of a foreign intelligence service to hack
American machines last week, it stunned employees at his new
company, according to interviews and electronic records.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210924-001747/</link>
      <pubDate>Fri, 24 Sep 2021 00:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210924-001747/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/completely-running-blind-apples-power&amp;#34;&amp;gt;“Completely Running Blind.” Apple’s Power Move To Kneecap Facebook Ads Is Working.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/completely-running-blind-apples-power&amp;#34;&amp;gt;Facebook can survive its scandals, but Apple’s anti-tracking initiative is doing meaningful damage to its business, according to the company and its advertisers.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210923-200947/</link>
      <pubDate>Thu, 23 Sep 2021 20:09:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210923-200947/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/introducing-modules/&amp;#34;&amp;gt;Today, we’re excited to introduce Modules, a new way for Retool customers to reuse groups of components and queries between applications.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/introducing-our-new-chart-component/&amp;#34;&amp;gt;We’re excited to announce our new chart component is generally available for all customers. Now you can bring custom and interactive visualizations to every Retool app.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/when-bi-tools-fall-short-our-own-marketing-dashboards/&amp;#34;&amp;gt;If you’ve ever had to wrangle a maze of marketing, sales, and BI tools—just to end up plugging it all into a spreadsheet—this article is for you. We’ll go over the three core dashboards and explain why we treat our analytics as a product rather than a static dashboard.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210923-200715/</link>
      <pubDate>Thu, 23 Sep 2021 20:07:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210923-200715/</guid>
      <description>As recounted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.newyorker.com/magazine/2018/10/15/was-there-a-connection-between-a-russian-bank-and-the-trump-campaign&amp;#34;&amp;gt;this 2018 New Yorker story&amp;lt;/a&amp;gt; , New York Times journalist Eric Lichtblau met with FBI officials in late September 2016 to discuss the researchers’ findings. The bureau asked him to hold the story because publishing might disrupt an ongoing investigation. On Sept. 21, 2016, Lichtblau reportedly shared the DNS data with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bgrdc.com/&amp;#34;&amp;gt;B.G.R.&amp;lt;/a&amp;gt; , a Washington lobbying firm that worked with Alfa Bank.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210923-162139/</link>
      <pubDate>Thu, 23 Sep 2021 16:21:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210923-162139/</guid>
      <description>September 23, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/23/Nitter-and-other-internet-reclamation-projects.html&amp;#34;&amp;gt;Nitter and other Internet reclamation projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210923-160737/</link>
      <pubDate>Thu, 23 Sep 2021 16:07:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210923-160737/</guid>
      <description>In October 2016, media outlets reported that data collected by some of the world’s most renowned cybersecurity experts had identified frequent and unexplained communications between an email server used by the Trump Organization and Alfa Bank , one of Russia’s largest financial institutions. Those publications set off speculation about a possible secret back-channel of communications, as well as a series of lawsuits and investigations that culminated last week with the indictment of the same former federal cybercrime prosecutor who brought the data to the attention of the FBI five years ago.&amp;lt;br&amp;gt;
The first page of Alfa Bank’s 2020 complaint.&amp;lt;br&amp;gt;
Since 2018, access to an exhaustive report commissioned by the U.S. Senate Armed Services Committee on data that prompted those experts to seek out the FBI has been limited to a handful of Senate committee leaders, Alfa Bank, and special prosecutors appointed to look into the origins of the FBI investigation on alleged ties between Trump and Russia.&amp;lt;br&amp;gt;
That report is now public, ironically thanks to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justsecurity.org/72262/the-trump-alfa-bank-server-mystery-resurfaces/&amp;#34;&amp;gt;a pair of lawsuits filed by Alfa Bank&amp;lt;/a&amp;gt; , which doesn’t directly dispute the information collected by the researchers. Rather, it &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/09/alfacomplaint.png&amp;#34;&amp;gt;claims&amp;lt;/a&amp;gt; that the data they found was the result of a “highly sophisticated cyberattacks against it in 2016 and 2017” intended “to fabricate apparent communications” between Alfa Bank and the Trump Organization.&amp;lt;br&amp;gt;
The data at issue refers to communications traversing the Domain Name System (DNS), a global database that maps computer-friendly coordinates like Internet addresses (e.g., 8.8.8.8) to more human-friendly domain names (example.com). Whenever an Internet user gets online to visit a website or send an email, the user’s device sends a query through the Domain Name System.&amp;lt;br&amp;gt;
Many different entities capture and record this DNS data as it traverses the public Internet, allowing researchers to go back later and see which Internet addresses resolved to what domain names, when, and for how long. Sometimes the metadata generated by these lookups can be used to identify or infer persistent network connections between different Internet hosts.&amp;lt;br&amp;gt;
The DNS strangeness was first identified in 2016 by a group of security experts who told reporters they were alarmed at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks&amp;#34;&amp;gt;hacking of the Democratic National Committee&amp;lt;/a&amp;gt; , and grew concerned that the same attackers might also target Republican leaders and institutions.&amp;lt;br&amp;gt;
Scrutinizing the Trump Organization’s online footprint, the researchers determined that for several months during the spring and summer of 2016, Internet servers at Alfa Bank in Russia, Spectrum Health in Michigan, and Heartland Payment Systems in New Jersey accounted for nearly all of the several thousand DNS lookups for a specific Trump Organization server (mail1.trump-email.com).&amp;lt;br&amp;gt;
This chart from a court filing Sept. 14, 2021 shows the top sources of traffic to the Trump Organization email server over a four month period in the spring and summer of 2016. DNS lookups from Alfa Bank constituted the majority of those requests.&amp;lt;br&amp;gt;
The researchers said they couldn’t be sure what kind of communications between those servers had caused the DNS lookups, but concluded that the data would be extremely difficult to fabricate.&amp;lt;br&amp;gt;
As recounted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.newyorker.com/magazine/2018/10/15/was-there-a-connection-between-a-russian-bank-and-the-trump-campaign&amp;#34;&amp;gt;this 2018 New Yorker story&amp;lt;/a&amp;gt; , New York Times journalist Eric Lichtblau met with FBI officials in late September 2016 to discuss the researchers’ findings, and that the bureau asked him to hold the story because publishing might disrupt an ongoing investigation. On Sept. 21, 2016, Lichtblau reportedly shared the DNS data with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bgrdc.com/&amp;#34;&amp;gt;B.G.R.&amp;lt;/a&amp;gt; , a Washington lobbying firm that worked with Alfa Bank.&amp;lt;br&amp;gt;
Lichtblau’s reporting on the DNS findings ended up buried in an October 31, 2016 story titled “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2016/11/01/us/politics/fbi-russia-election-donald-trump.html&amp;#34;&amp;gt;Investigating Donald Trump, F.B.I. Sees No Clear Link to Russia&amp;lt;/a&amp;gt; ,” which stated that the FBI “ultimately concluded that there could be an innocuous explanation, like marketing email or spam,” that might explain the unusual DNS connections.&amp;lt;br&amp;gt;
But that same day, Slate’s Franklin Foer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slate.com/articles/news_and_politics/cover_story/2016/10/was_a_server_registered_to_the_trump_organization_communicating_with_russia.html&amp;#34;&amp;gt;published a story&amp;lt;/a&amp;gt; based on his interactions with the researchers. Foer noted that roughly two days after Lichtblau shared the DNS data with B.G.R., the Trump Organization email server domain vanished from the Internet — its domain effectively decoupled from its Internet address.&amp;lt;br&amp;gt;
Foer wrote that The Times hadn’t yet been in touch with the Trump campaign about the DNS data when the Trump email domain suddenly went offline.  Odder still, four days later the Trump Organization created a new host — trump1.contact-client.com — and the very first DNS lookup to that new domain came from servers at Alfa Bank.&amp;lt;br&amp;gt;
The researchers concluded that the new domain enabled communication to the very same server via a different route.&amp;lt;br&amp;gt;
“When a new host name is created, the first communication with it is never random,” Foer wrote. “To reach the server after the resetting of the host name, the sender of the first inbound mail has to first learn of the name somehow. It’s simply impossible to randomly reach a renamed server.”&amp;lt;br&amp;gt;
“That party had to have some kind of outbound message through SMS, phone, or some noninternet channel they used to communicate [the new configuration],” DNS expert Paul Vixie told Foer. “The first attempt to look up the revised host name came from Alfa Bank. If this was a public server, we would have seen other traces. The only look-ups came from this particular source.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/lawsuits-indictments-revive-trump-alfa-bank-story/#more-57039&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/lawsuits-indictments-revive-trump-alfa-bank-story/&amp;#34;&amp;gt;Indictment, Lawsuits Revive Trump-Alfa Bank Story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210923-122114/</link>
      <pubDate>Thu, 23 Sep 2021 12:21:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210923-122114/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/09/23/espanol/hongo-pilobolus-espacio.html&amp;#34;&amp;gt;Allá afuera Lo que un hongo revela sobre el programa espacial El Pilobolus crece mayormente en el excremento y parece saber cuándo debe buscar nuevos territorios. Su comportamiento sirve como metáfora de la exploración humana en el espacio. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210923-082221/</link>
      <pubDate>Thu, 23 Sep 2021 08:22:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210923-082221/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/mike-isaac#after-top&amp;#34;&amp;gt;Continue reading the main story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210923-041915/</link>
      <pubDate>Thu, 23 Sep 2021 04:19:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210923-041915/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02578-4&amp;#34;&amp;gt;Will NASA’s Moon rover find enough of the ice it seeks?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
News of VIPER’s future landing site sparks concern about its exploration plan.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210923-002335/</link>
      <pubDate>Thu, 23 Sep 2021 00:23:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210923-002335/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/22/technology/facebook-cto-step-down-mike-schroepfer.html&amp;#34;&amp;gt;Facebook’s Chief Technology Officer to Step Down in 2022 Mike Schroepfer, who leads the company’s artificial intelligence and other technical efforts, said he planned to transition into a role as a senior fellow. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210923-002102/</link>
      <pubDate>Thu, 23 Sep 2021 00:21:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210923-002102/</guid>
      <description>The U.S. FDA authorizes booster shots of the Pfizer COVID-19 vaccine for those aged 65 and older and adults at high risk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/healthcare-pharmaceuticals/us-fda-authorize-third-dose-pfizer-covid-19-vaccine-older-americans-bloomberg-2021-09-22/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210923-002031/</link>
      <pubDate>Thu, 23 Sep 2021 00:20:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210923-002031/</guid>
      <description>Big Technology is on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://substack.com&amp;#34;&amp;gt;Substack&amp;lt;/a&amp;gt; – the place for independent writing&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210923-001411/</link>
      <pubDate>Thu, 23 Sep 2021 00:14:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210923-001411/</guid>
      <description>I&amp;#39;m discussing “One On One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Today, Sep 22 RIGHT NOW in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/kiTdAiuf7P&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/kiTdAiuf7P&amp;#34;&amp;gt;https://t.co/kiTdAiuf7P&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210922-201955/</link>
      <pubDate>Wed, 22 Sep 2021 20:19:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210922-201955/</guid>
      <description>Federal Reserve looks toward reducing monthly bond purchases &amp;#39;soon,&amp;#39; signals possible rate hike in 2022 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/finance/fed-likely-open-bond-buying-taper-door-hedge-outlook-2021-09-22/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210922-201549/</link>
      <pubDate>Wed, 22 Sep 2021 20:15:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210922-201549/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/09/Savannah-Hunter-Thorn&amp;#34;&amp;gt;Saving þ&amp;lt;/a&amp;gt; · Herewith a lost-pet story with (spoiler) a happy ending, starring a real bloodhound.  Soon to be a major motion picture, I bet &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/09/Savannah-Hunter-Thorn&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210922-201320/</link>
      <pubDate>Wed, 22 Sep 2021 20:13:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210922-201320/</guid>
      <description>Hugo Barra &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/hbarra&amp;#34;&amp;gt;@hbarra&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Here are the Top 10 most fascinating stats about LatAm Tech in 2021 from Atlantico founding partner @JulioV and our team at @AtlanticoPart &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Q4WOMcZGZq&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Q4WOMcZGZq&amp;#34;&amp;gt;https://t.co/Q4WOMcZGZq&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210922-162422/</link>
      <pubDate>Wed, 22 Sep 2021 16:24:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210922-162422/</guid>
      <description>Yesterday morning I competed in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574&amp;#34;&amp;gt;Educational Round 114&amp;lt;/a&amp;gt; on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://codeforces.com/&amp;#34;&amp;gt;codeforces.com&amp;lt;/a&amp;gt; , using only Haskell. It is somewhat annoying since it does not support as many Haskell libraries as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://open.kattis.com&amp;#34;&amp;gt;Open Kattis&amp;lt;/a&amp;gt; ( e.g. no&amp;lt;br&amp;gt;
solve :: Set [ Int ] -&amp;amp;gt; [ [ Int ] ] -&amp;amp;gt; [ Int ] solve forbidden = head . filter ( &amp;lt;code&amp;gt;S.notMember&amp;lt;/code&amp;gt; forbidden ) . sortOn ( Down . sum ) . sequence&amp;lt;br&amp;gt;
We can think of the tuples as forming a lattice, where the children of a tuple are all the tuples obtained by downgrading exactly one slot of to the next smaller choice. Then the intended solution is to realize that the largest non-forbidden tuple must either be the top element of the lattice (the tuple with the maximum possible value for every slot), OR a child of one of the forbidden tuples (it is easy to see this by contradiction—any tuple which is not the child of a forbidden tuple has at least one parent which has a greater total value). So we can just iterate over all the forbidden tuples (there are at most ), generate all possible children (at most 10) for each one, and take the maximum.&amp;lt;br&amp;gt;
sortOn (Down . sum) . sequence&amp;lt;br&amp;gt;
more efficiently, by interleaving the sorting and the generation. If it can be done lazily enough, then we could just search through the beginning of the generated ordered list of tuples for the first non-forbidden one, without having to actually generate the entire list. Indeed, this reminded me very much of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cs.hmc.edu/~oneill/papers/Sieve-JFP.pdf&amp;#34;&amp;gt;Richard Bird’s implementation of the Sieve of Eratosthenes&amp;lt;/a&amp;gt; (see p. 11 of that PDF). The basic idea is to make a function which takes a list of choices for a slot, and a (recursively generated) list of tuples sorted by decreasing sum, and combines each choice with every tuple, merging the results so they are still sorted. However, the key is that when combining the best possible choice for the slot with the largest tuple in the list, we can just immediately return the resulting tuple as the first (best) tuple in the output list, without needing to involve it in any merging operation. This affords just enough laziness to get the whole thing off the ground. I’m not going to explain it in more detail than that; you can study the code below if you like.&amp;lt;br&amp;gt;
I’m quite pleased that this worked, though it’s definitely an instance of me making things more complicated than necessary.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210922-161817/</link>
      <pubDate>Wed, 22 Sep 2021 16:18:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210922-161817/</guid>
      <description>&amp;lt;p&amp;gt;Posted by Priya Wadhwa and Appu Goundan, Google Open Source Security Team&amp;lt;br&amp;gt;
A few months ago we announced that we started &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html&amp;#34;&amp;gt;signing all distroless images with cosign&amp;lt;/a&amp;gt; , which allows users to verify that they have the correct image before starting the build process. Signing our images was our first step towards fully securing the distroless supply chain. Since then, we’ve implemented even more accountability in our supply chain and are excited to announce that distroless builds have achieved &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/levels.md#level-requirements&amp;#34;&amp;gt;SLSA 2&amp;lt;/a&amp;gt; . SLSA is a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/&amp;#34;&amp;gt;security framework&amp;lt;/a&amp;gt; for increasing supply chain security, and Level 2 ensures that the build service is tamper resistant. This means that in addition to a signature, each distroless image now has an associated signed provenance. This provenance is an in-toto attestation and includes information around how each image was built, what command was run, and what build system was used. It also includes any special parameters that were passed in, the exact commit the images were built at, and more. This provenance is a useful tool for builds that need to be audited in the future.&amp;lt;br&amp;gt;
SLSA 2 Requirement&amp;lt;br&amp;gt;
Distroless&amp;lt;br&amp;gt;
Source - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#version-controlled&amp;#34;&amp;gt;Version controlled&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Source code in Github&amp;lt;br&amp;gt;
Build - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#scripted-build&amp;#34;&amp;gt;Scripted build&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Build script exists as a Tekton Pipeline, invoked as a Google Cloud Build step&amp;lt;br&amp;gt;
Build - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#build-service&amp;#34;&amp;gt;Build service&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
All steps run on Kubernetes with Tekton&amp;lt;br&amp;gt;
Provenance - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#available&amp;#34;&amp;gt;Available&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Provenance is available in the rekor transparency log as an in-toto attestation&amp;lt;br&amp;gt;
Provenance - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#authenticated&amp;#34;&amp;gt;Authenticated&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Provenance is signed with the distroless GCP KMS key&amp;lt;br&amp;gt;
Provenance - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/docs/requirements.md#service-generated&amp;#34;&amp;gt;Service generated&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Provenance is generated by Tekton Chains from a Tekton TaskRun&amp;lt;br&amp;gt;
Achieving SLSA 2 required some changes to the distroless build pipeline: we set up Tekton Pipelines and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/tektoncd/chains&amp;#34;&amp;gt;Tekton Chains&amp;lt;/a&amp;gt; in a GKE cluster to automate building images and generating provenance. Every time a pull request is merged to the distroless Github repo, a Tekton Pipeline is triggered. This Pipeline builds the distroless images, and Tekton Chains is responsible for generating signed provenance for each image. Tekton Chains stores the signed provenance alongside the image in an OCI registry and also stores a record of the provenance in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/rekor&amp;#34;&amp;gt;rekor&amp;lt;/a&amp;gt; transparency log. Don&amp;#39;t trust us? You can try the build yourself. Because distroless builds are reproducible, all the information to replicate the build is in the provenance, and you or a trusted third party can build the image yourselves and verify the build is correct by matching image digests. You can verify an attestation for a distroless image with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/cosign&amp;#34;&amp;gt;cosign&amp;lt;/a&amp;gt; and the distroless &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://raw.githubusercontent.com/GoogleContainerTools/distroless/main/cosign.pub&amp;#34;&amp;gt;public key&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
$ cosign verify-attestation -key cosign.pub gcr.io/distroless/base@sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;lt;br&amp;gt;
Verification for gcr.io/distroless/base@sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91 &amp;amp;ndash;&amp;lt;br&amp;gt;
The following checks were performed on each of these signatures:&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li&amp;gt;The cosign claims were validated&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;The signatures were verified against the specified public key&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;li&amp;gt;Any certificates were verified against the Fulcio roots.&amp;lt;br&amp;gt;
&amp;amp;hellip;&amp;lt;br&amp;gt;
And you can find the provenance for the image in the rekor transparency log with the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/sigstore/rekor/releases/&amp;#34;&amp;gt;rekor-cli&amp;lt;/a&amp;gt; tool. For example, you could find the provenance for the above image by using the image’s digest and running:&amp;lt;br&amp;gt;
$ rekor-cli search &amp;amp;ndash;sha sha256:4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;lt;br&amp;gt;
af7a9687d263504ccdb2759169c9903d8760775045c6e7554e365ec2bf29f6f8&amp;lt;br&amp;gt;
$ rekor-cli get &amp;amp;ndash;uuid af7a9687d263504ccdb2759169c9903d8760775045c6e7554e365ec2bf29f6f8 &amp;amp;ndash;format json | jq -r .Attestation | base64 &amp;amp;ndash;decode | jq&amp;lt;br&amp;gt;
&amp;amp;quot;_type&amp;amp;quot;: &amp;amp;quot;distroless-provenance&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;predicateType&amp;amp;quot;: &amp;amp;quot;https://tekton.dev/chains/provenance&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;subject&amp;amp;quot;: [&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/base&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;digest&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;703a4726aedc9ec7a7e32251087565246db117bb9a141a7993d1c4bb4036660d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;d322ed16d530596c37eee3eb57a039677502aa71f0e4739b0272b1ebd8be9bce&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;2dfdd5bf591d0da3f67a25f3fc96d929b256d5be3e0af084db10952e5da2c661&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;4f8aa0aba190e375a5a53bb71a303c89d9734c817714aeaca9bb23b82135ed91&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;dc0a793d83196a239abf3ba035b3d1a0c7a24184856c2649666e84bc82fc5980&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/base-debian10&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;c9507268813f235b11e63a7ae01526b180c94858bd718d6b4746c9c0e8425f7a&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/cc&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;4af613acf571a1b86b1d3c50682caada0b82024e566c1c4c2fe485a70f3af47d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;2c4bb6b7236db0a55ec54ba8845e4031f5db2be957ac61867872bf42e56c4deb&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/cc-debian10&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/java&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;deb41661be772c6256194eb1df6b526cc95a6f60e5f5b740dda2769b20778c51&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/nodejs&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;927dd07e7373e1883469c95f4ecb31fe63c3acd104aac1655e15cfa9ae0899bf&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;f106757268ab4e650b032e78df0372a35914ed346c219359b58b3d863ad9fb58&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/nodejs-debian10&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/python3&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;aa8a0358b2813e8b48a54c7504316c7dcea59d6ae50daa0228847de852c83878&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/python3-debian10&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/static&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;9acfd1fdf62b26cbd4f3c31422cf1edf3b7b01a9ecee00a499ef8b7e3536914d&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;sha256&amp;amp;quot;: &amp;amp;quot;e50641dbb871f78831f9aa7ffa59ec8f44d4cc33ae4ee992c9f4b046040e97f2&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;name&amp;amp;quot;: &amp;amp;quot;gcr.io/distroless/static-debian10&amp;amp;quot;,&amp;lt;br&amp;gt;
],&amp;lt;br&amp;gt;
&amp;amp;quot;predicate&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;invocation&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;parameters&amp;amp;quot;: [&amp;lt;br&amp;gt;
&amp;amp;quot;MANIFEST_SUBSECTION={string 0 []}&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;CHAINS-GIT_COMMIT={string 976c1c9bc178ac0371d8888d69893145c3df09f0 []}&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;CHAINS-GIT_URL={string https://github.com/GoogleContainerTools/distroless []}&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;recipe_uri&amp;amp;quot;: &amp;amp;quot;task://distroless-provenance&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;event_id&amp;amp;quot;: &amp;amp;quot;531c282f-806e-41e4-b3ad-b596c4283381&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;builder.id&amp;amp;quot;: &amp;amp;quot;tekton-chains&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;recipe&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;steps&amp;amp;quot;: [&amp;lt;br&amp;gt;
&amp;amp;quot;entryPoint&amp;amp;quot;: &amp;amp;quot;#!/bin/sh\nset -ex\n\n# get the digests for a subset of images built, and store in the IMAGES result\ngo run provenance/provenance.go images $(params.MANIFEST_SUBSECTION) &amp;amp;gt; $(results.IMAGES.path)\n&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;arguments&amp;amp;quot;: null,&amp;lt;br&amp;gt;
&amp;amp;quot;environment&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;container&amp;amp;quot;: &amp;amp;quot;provenance&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;image&amp;amp;quot;: &amp;amp;quot;docker.io/library/golang@sha256:cb1a7482cb5cfc52527c5cdea5159419292360087d5249e3fe5472f3477be642&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;annotations&amp;amp;quot;: null&amp;lt;br&amp;gt;
]&amp;lt;br&amp;gt;
&amp;amp;quot;metadata&amp;amp;quot;: {&amp;lt;br&amp;gt;
&amp;amp;quot;buildStartedOn&amp;amp;quot;: &amp;amp;quot;2021-09-16T00:03:04Z&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;buildFinishedOn&amp;amp;quot;: &amp;amp;quot;2021-09-16T00:04:36Z&amp;amp;quot;&amp;lt;br&amp;gt;
&amp;amp;quot;materials&amp;amp;quot;: [&amp;lt;br&amp;gt;
&amp;amp;quot;uri&amp;amp;quot;: &amp;amp;quot;https://github.com/GoogleContainerTools/distroless&amp;amp;quot;,&amp;lt;br&amp;gt;
&amp;amp;quot;revision&amp;amp;quot;: &amp;amp;quot;976c1c9bc178ac0371d8888d69893145c3df09f0&amp;amp;quot;&amp;lt;br&amp;gt;
As you might guess, our next step is getting distroless to SLSA 3, which will require adding non-falsifiable provenance and isolated builds to the distroless supply chain. Stay tuned for more!&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Open%20Source&amp;#34;&amp;gt;Open Source&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/supply%20chain&amp;#34;&amp;gt;supply chain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/li&amp;gt;
&amp;lt;/ul&amp;gt;
</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210922-122059/</link>
      <pubDate>Wed, 22 Sep 2021 12:20:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210922-122059/</guid>
      <description>Backers of Trump&amp;#39;s false fraud claims seek to control next election &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/backers-trumps-false-fraud-claims-seek-control-next-us-elections-2021-09-22/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210922-042359/</link>
      <pubDate>Wed, 22 Sep 2021 04:23:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210922-042359/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/21/competitive-programming-in-haskell-codeforces-educational-round-114/&amp;#34;&amp;gt;Competitive programming in Haskell: Codeforces Educational Round 114&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Yesterday morning I competed in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574&amp;#34;&amp;gt;Educational Round 114&amp;lt;/a&amp;gt; on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://codeforces.com/&amp;#34;&amp;gt;codeforces.com&amp;lt;/a&amp;gt; , using only Haskell. It is a somewhat annoying since it does not support as many Haskell libraries as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://open.kattis.com&amp;#34;&amp;gt;Open Kattis&amp;lt;/a&amp;gt; ( e.g. no&amp;lt;br&amp;gt;
unordered-containers&amp;lt;br&amp;gt;
split&amp;lt;br&amp;gt;
, or&amp;lt;br&amp;gt;
vector&amp;lt;br&amp;gt;
); but on the other hand, a lot of really top competitive programmers are active there, and I enjoy occasionally participating in a timed contest like this when I am able.&amp;lt;br&amp;gt;
WARNING : here be spoilers! Stop reading now if you’d like to try solving the contest problems yourself. (However, Codeforces has an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/blog/entry/95188&amp;#34;&amp;gt;editorial with explanations and solutions&amp;lt;/a&amp;gt; already posted, so I’m not giving anything away that isn’t already public.) I’m going to post my (unedited) code for each problem, but without all the imports and&amp;lt;br&amp;gt;
extensions and whatnot; hopefully that stuff should be easy to infer.&amp;lt;br&amp;gt;
Problem A – Regular Bracket Sequences&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574/problem/A&amp;#34;&amp;gt;this problem&amp;lt;/a&amp;gt; , we are given a number and asked to produce any distinct balanced bracket sequences of length . I immediately just coded up a simple recursive function to generate all possible bracket sequences of length , and then called&amp;lt;br&amp;gt;
take n&amp;lt;br&amp;gt;
on it. Thanks to laziness this works great. I missed that there is an even simpler solution: just generate the list&amp;lt;br&amp;gt;
()()()()...&amp;lt;br&amp;gt;
(())()()...&amp;lt;br&amp;gt;
((()))()...&amp;lt;br&amp;gt;
, i.e. where the th bracket sequence starts with nested pairs of brackets followed by singleton pairs. However, I solved it in only four minutes anyway so it didn’t really matter!&amp;lt;br&amp;gt;
readB = C.unpack &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; read main = C.interact $ C.lines &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; drop 1 &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; concatMap ( readB &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.unlines bracketSeqs 0 = [ &amp;amp;#34;&amp;amp;#34; ] bracketSeqs n = [ &amp;amp;#34;(&amp;amp;#34; &#43;&#43; s1 &#43;&#43; &amp;amp;#34;)&amp;amp;#34; &#43;&#43; s2 | k &amp;amp;lt;- [ 0 .. n - 1 ] , s1 &amp;amp;lt;- bracketSeqs k , s2 &amp;amp;lt;- bracketSeqs ( n - k - 1 ) ] solve n = map C.pack . take n $ bracketSeqs n&amp;lt;br&amp;gt;
Problem B – Combinatorics Homework&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574/problem/B&amp;#34;&amp;gt;this problem&amp;lt;/a&amp;gt; , we are given numbers , , , and , and asked whether it is possible to create a string of&amp;lt;br&amp;gt;
A&amp;lt;br&amp;gt;
’s,&amp;lt;br&amp;gt;
B&amp;lt;br&amp;gt;
’s, and&amp;lt;br&amp;gt;
C&amp;lt;br&amp;gt;
’s, such that there are exactly adjacent pairs of equal letters. This problem requires doing a little bit of combinatorial analysis to come up with a simple Boolean expression in terms of , , , and ; there’s not much to say about it from a Haskell point of view. You can refer to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/blog/entry/95188&amp;#34;&amp;gt;editorial posted on Codeforces&amp;lt;/a&amp;gt; if you want to understand the solution.&amp;lt;br&amp;gt;
readB = C.unpack &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; read main = C.interact $ C.lines &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; drop 1 &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map ( C.words &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map readB &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; bool &amp;amp;#34;NO&amp;amp;#34; &amp;amp;#34;YES&amp;amp;#34; ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.unlines solve :: [ Int ] -&amp;amp;gt; Bool solve [ a , b , c , m ] = a &#43; b &#43; c - m &amp;amp;gt;= 3 &amp;amp;amp;&amp;amp;amp; m &amp;amp;gt;= z - ( x &#43; y ) - 1 where [ x , y , z ] = sort [ a , b , c ]&amp;lt;br&amp;gt;
Problem C – Slay the Dragon&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574/problem/C&amp;#34;&amp;gt;This problem&amp;lt;/a&amp;gt; was super annoying and I still haven’t solved it. The idea is that you have a bunch of “heroes”, each with a numeric strength, and there is a dragon described by two numbers: its attack level and its defense level. You have to pick one hero to fight the dragon, whose strength must be greater than or equal to the dragon’s defense; all the rest of the heroes will stay behind to defend your castle, and their combined strength must be greater than the dragon’s attack. This might not be possible, of course, so you can first spend money to level up any of your heroes, at a rate of one coin per strength point; the task is to find the minimum amount of money you must spend.&amp;lt;br&amp;gt;
The problem hinges on doing some case analysis. It took me a good while to come up with something that I think is correct. I spent too long trying to solve it just by thinking hard; I really should have tried &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Bird%E2%80%93Meertens_formalism&amp;#34;&amp;gt;formal program derivation&amp;lt;/a&amp;gt; much earlier. It’s easy to write down a formal specification of the correct answer which involves looping over every hero and taking a minimum, and this can be manipulated into a form that doesn’t need to do any looping.&amp;lt;br&amp;gt;
In the end it comes down to (for example) finding the hero with the smallest strength greater than or equal to the dragon’s defense, and the hero with the largest strength less than or equal to it (though one of these may not exist). The intended way to solve the problem is to sort the heroes by strength and use binary search; instead, I put all the heroes in an&amp;lt;br&amp;gt;
IntSet&amp;lt;br&amp;gt;
and used the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/containers-0.6.5.1/docs/Data-IntSet.html#v:lookupGE&amp;#34;&amp;gt;lookupGE and lookupLE functions&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
However, besides my floundering around getting the case analysis wrong at first, I got tripped up by two other things: first, it turns out that on the Codeforces judging hardware,&amp;lt;br&amp;gt;
is only 32 bits, which is not big enough for this problem! I know this because my code was failing on the third test case, and when I changed it to use&amp;lt;br&amp;gt;
Int64&amp;lt;br&amp;gt;
(which means I also had to switch to&amp;lt;br&amp;gt;
Data.Set&amp;lt;br&amp;gt;
Data.IntSet&amp;lt;br&amp;gt;
), it failed on the sixth test case instead. The other problem is that my code was too slow: in fact, it timed out on the sixth test case rather than getting it wrong per se. I guess&amp;lt;br&amp;gt;
just have too much overhead.&amp;lt;br&amp;gt;
Anyway, here is my code, which I think is correct, but is too slow.&amp;lt;br&amp;gt;
data TC = TC { heroes :: ! [ Int64 ] , dragons :: ! [ Dragon ] } data Dragon = Dragon { defense :: ! Int64 , attack :: ! Int64 } main = C.interact $ runScanner tc &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map ( show &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.pack ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.unlines tc :: Scanner TC tc = do hs &amp;amp;lt;- numberOf int64 ds &amp;amp;lt;- numberOf ( Dragon &amp;amp;lt;$&amp;amp;gt; int64 &amp;amp;lt;*&amp;amp;gt; int64 ) return $ TC hs ds solve :: TC -&amp;amp;gt; [ Int64 ] solve ( TC hs ds ) = map fight ds where heroSet = S.fromList hs total = foldl&amp;amp;#39; ( &#43; ) 0 hs fight ( Dragon df atk ) = minimum $ [ max 0 ( atk - ( total - hero ) ) | Just hero &amp;amp;lt;- [ mheroGE ] ] &#43;&#43; [ df - hero &#43; max 0 ( atk - ( total - hero ) ) | Just hero &amp;amp;lt;- [ mheroLE ] ] where mheroGE = S.lookupGE df heroSet mheroLE = S.lookupLE df heroSet&amp;lt;br&amp;gt;
I’d like to come back to this later. Using something like&amp;lt;br&amp;gt;
to sort and then do binary search on the heroes would probably be faster, but&amp;lt;br&amp;gt;
is not supported on Codeforces. I’ll probably end up manually implementing binary search on top of something like&amp;lt;br&amp;gt;
Data.Array.Unboxed&amp;lt;br&amp;gt;
. Doing a binary search on an array also means we can get away with doing only a single search, since the two heroes we are looking for must be right next to each other in the array.&amp;lt;br&amp;gt;
Edited to add : I tried creating an unboxed array and implementing my own binary search over it; however, my solution is still too slow. At this point I think the problem is the sorting. Instead of calling&amp;lt;br&amp;gt;
sort&amp;lt;br&amp;gt;
on the list of heroes, we probably need to implement our own quicksort or something like that over a mutable array. That doesn’t really sound like much fun so I’m probably going to forget about it for now.&amp;lt;br&amp;gt;
Problem D – The Strongest Build&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeforces.com/contest/1574/problem/D&amp;#34;&amp;gt;this problem&amp;lt;/a&amp;gt; , we consider a set of -tuples, where the value for each slot in a tuple is chosen from among a list of possible values unique to that slot (the values for a slot are given to us in sorted order). For example, perhaps the first slot has the possible values , the second slot has possible values , and the third slot has possible values . In this case there would be possible tuples, ranging from up to . We are also given a list of forbidden tuples, and then asked to find a non-forbidden tuple with the largest possible sum.&amp;lt;br&amp;gt;
If the list of slot options is represented as a list of lists, with the first list representing the choices for the first slot, and so on, then we could use&amp;lt;br&amp;gt;
sequence&amp;lt;br&amp;gt;
to turn this into the list of all possible tuples. Hence, a naive solution could look like this:&amp;lt;br&amp;gt;
solve :: Set [ Int ] -&amp;amp;gt; [ [ Int ] ] -&amp;amp;gt; [ Int ] solve forbidden = head . filter ( `S.notMember` forbidden ) . sortOn sum . sequence&amp;lt;br&amp;gt;
Of course, this is much too slow. The problem is that although (the size of the tuples) is limited to at most , there can be up to choices for each slot (the choices themselves can be up to ). The list of all possible tuples could thus be truly enormous; in theory, there could be up to ), and generating then sorting them all is out of the question.&amp;lt;br&amp;gt;
We can think of the tuples as forming a lattice, where the children of a tuple are all the tuples obtained by downgrading exactly one slot of to the next smaller choice. Then the intended solution is to realize that the solution must either be the top element of the lattice (the tuple with the maximum possible value for every slot), OR the child of one of the forbidden tuples (it is easy to see this by contradiction—any tuple which is not the child of a banned tuple has at least one parent which has a greater total value). So we can just iterate over all the forbidden tuples (there are at most ), generate all possible children for each one, and take the maximum.&amp;lt;br&amp;gt;
However, that’s not how I solved it! I started thinking from the naive solution above, and wondered whether there is a way to do&amp;lt;br&amp;gt;
sortOn sum . sequence&amp;lt;br&amp;gt;
more efficiently, by interleaving the sorting and the generation. If it can be done lazily enough, then we could just search through the beginning of the generated ordered list of tuples for the first non-forbidden one, without having to actually generate the entire list. Indeed, this reminded me very much of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cs.hmc.edu/~oneill/papers/Sieve-JFP.pdf&amp;#34;&amp;gt;Richard Bird’s implementation of the Sieve of Eratosthenes&amp;lt;/a&amp;gt; (see p. 11). The basic idea is to make a function which takes a list of choices for a slot, and a (recursively generated) list of tuples sorted by decreasing sum, and combines each choice with every tuple, merging the results so they are still sorted. However, the key is that when combining the best possible choice for the slot with the largest tuple in the list, we can just immediately return the resulting tuple as the first (best) tuple in the output list, without needing to involve it in any merging operation. This affords just enough laziness to get the whole thing off the ground. I’m not going to explain it in more detail than that; you can study the code below if you really want.&amp;lt;br&amp;gt;
I’m quite pleased that this worked, though it’s probably an instance of me making things too complicated.&amp;lt;br&amp;gt;
data TC = TC { …</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210922-041000/</link>
      <pubDate>Wed, 22 Sep 2021 04:09:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210922-041000/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/&amp;#34;&amp;gt;Homepage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com&amp;#34;&amp;gt;Open in app&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/m/signin?redirect=https%3A%2F%2Fblog.discord.com%2F&amp;amp;source=--------------------------nav_reg&amp;amp;operation=login&amp;#34;&amp;gt;Sign in&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com&amp;#34;&amp;gt;Get started&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/@discordnelly&amp;#34;&amp;gt;Nelly&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/@jasoncitron&amp;#34;&amp;gt;Jason Citron&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210922-002323/</link>
      <pubDate>Wed, 22 Sep 2021 00:23:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210922-002323/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/21/technology/zuckerberg-facebook-project-amplify.html&amp;#34;&amp;gt;No More Apologies: Inside Facebook’s Push to Defend Its Image Mark Zuckerberg, the chief executive, has signed off on an effort to show users pro-Facebook stories and to distance himself from scandals. By Ryan Mac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Please Wait... | Cloudflare</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210922-000945/</link>
      <pubDate>Wed, 22 Sep 2021 00:09:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210922-000945/</guid>
      <description>Please wait&amp;amp;hellip;&amp;lt;br&amp;gt;
We are checking your browser&amp;amp;hellip; medium.com&amp;lt;br&amp;gt;
Why do I have to complete a CAPTCHA?&amp;lt;br&amp;gt;
Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.&amp;lt;br&amp;gt;
What can I do to prevent this in the future?&amp;lt;br&amp;gt;
If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.&amp;lt;br&amp;gt;
If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.&amp;lt;br&amp;gt;
Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chrome.google.com/webstore/detail/privacy-pass/ajhmfdgkijocedmfjonnpjfojldioehi&amp;#34;&amp;gt;Chrome Web Store&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210921-201627/</link>
      <pubDate>Tue, 21 Sep 2021 20:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210921-201627/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/09/an-update-on-memory-safety-in-chrome.html&amp;#34;&amp;gt;An update on Memory Safety in Chrome&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Adrian Taylor, Andrew Whalley, Dana Jansens and Nasko Oskov, Chrome security team&amp;lt;br&amp;gt;
Security is a cat-and-mouse game. As attackers innovate, browsers always have to mount new defenses to stay ahead, and Chrome has invested in ever-stronger multi-process architecture built on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromium.googlesource.com/chromium/src/&#43;/refs/heads/main/docs/design/sandbox.md&amp;#34;&amp;gt;sandboxing&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/Home/chromium-security/site-isolation&amp;#34;&amp;gt;site isolation&amp;lt;/a&amp;gt; . Combined with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromium.googlesource.com/chromium/src/&#43;/HEAD/testing/libfuzzer/README.md&amp;#34;&amp;gt;fuzzing&amp;lt;/a&amp;gt; , these are still our primary lines of defense, but they &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.usenix.org/conference/enigma2021/presentation/palmer&amp;#34;&amp;gt;are reaching their limits&amp;lt;/a&amp;gt; , and we can no longer solely rely on this strategy to defeat &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/p/0day.html&amp;#34;&amp;gt;in-the-wild attacks&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Last year, we showed that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/Home/chromium-security/memory-safety&amp;#34;&amp;gt;more than 70% of our severe security bugs are memory safety problems&amp;lt;/a&amp;gt; . That is, mistakes with pointers in the C or C&#43;&#43; languages which cause memory to be misinterpreted.&amp;lt;br&amp;gt;
This sounds like a problem! And, certainly, memory safety is an issue which needs to be taken seriously by the global software engineering community. Yet it’s also an opportunity because many bugs have the same sorts of root-causes, meaning we may be able to squash a high proportion of our bugs in one step.&amp;lt;br&amp;gt;
Chrome has been exploring three broad avenues to seize this opportunity:&amp;lt;br&amp;gt;
Make C&#43;&#43; safer through compile-time checks that pointers are correct.&amp;lt;br&amp;gt;
Make C&#43;&#43; safer through runtime checks that pointers are correct.&amp;lt;br&amp;gt;
Investigating use of a memory safe language for parts of our codebase.&amp;lt;br&amp;gt;
“Compile-time checks” mean that safety is guaranteed during the Chrome build process, before Chrome even gets to your device. “Runtime” means we do checks whilst Chrome is running on your device.&amp;lt;br&amp;gt;
Runtime checks have a performance cost. Checking the correctness of a pointer is an infinitesimal cost in memory and CPU time. But with millions of pointers, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=rHIkrotSwcc&amp;#34;&amp;gt;it adds up&amp;lt;/a&amp;gt; . And since Chrome performance is important to billions of users, many of whom are using low-power mobile devices without much memory, an increase in these checks would result in a slower web.&amp;lt;br&amp;gt;
Ideally we’d choose option 1 - make C&#43;&#43; safer, at compile time. Unfortunately, the language just isn’t designed that way. You can learn more about the investigation we&amp;amp;#39;ve done in this area in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/document/d/e/2PACX-1vSt2VB1zQAJ6JDMaIA9PlmEgBxz2K5Tx6w2JqJNeYCy0gU4aoubdTxlENSKNSrQ2TXqPWcuwtXe6PlO/pub&amp;#34;&amp;gt;Borrowing Trouble: The Difficulties Of A C&#43;&#43; Borrow-Checker&amp;lt;/a&amp;gt; that we&amp;amp;#39;re also publishing today.&amp;lt;br&amp;gt;
So, we’re mostly left with options 2 and 3 - &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/document/d/e/2PACX-1vRZr-HJcYmf2Y76DhewaiJOhRNpjGHCxliAQTBhFxzv1QTae9o8mhBmDl32CRIuaWZLt5kVeH9e9jXv/pub&amp;#34;&amp;gt;make C&#43;&#43; safer&amp;lt;/a&amp;gt; (but slower!) or start to use a different language. Chrome Security is experimenting with both of these approaches.&amp;lt;br&amp;gt;
You’ll see major investments in C&#43;&#43; safety solutions - such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromium.googlesource.com/chromium/src/&#43;/ddc017f9569973a731a574be4199d8400616f5a5/base/memory/raw_ptr.md&amp;#34;&amp;gt;MiraclePtr&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://crbug.com/1072380&amp;#34;&amp;gt;ABSL/STL hardened modes&amp;lt;/a&amp;gt; . In each case, we hope to eliminate a sizable fraction of our exploitable security bugs, but we also expect some performance penalty. For example, MiraclePtr prevents use-after-free bugs by quarantining memory that may still be referenced. On many mobile devices, memory is very precious and it’s hard to spare some for a quarantine. Nevertheless, MiraclePtr stands a chance of eliminating over 50% of the use-after-free bugs in the browser process - an enormous win for Chrome security, right now.&amp;lt;br&amp;gt;
In parallel, we’ll be exploring whether we can use a memory safe language for parts of Chrome in the future. The leading contender is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.rust-lang.org/&amp;#34;&amp;gt;Rust&amp;lt;/a&amp;gt; , invented by our friends at Mozilla. This is (largely) compile-time safe; that is, the Rust compiler spots mistakes with pointers before the code even gets to your device, and thus there’s no performance penalty. Yet there are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/Home/chromium-security/memory-safety/rust-and-c-interoperability&amp;#34;&amp;gt;open questions about whether we can make C&#43;&#43; and Rust work well enough together&amp;lt;/a&amp;gt; . Even if we started writing new large components in Rust tomorrow, we’d be unlikely to eliminate a significant proportion of security vulnerabilities for many years. And can we make the language boundary clean enough that we can write parts of existing components in Rust? We don’t know yet. We’ve started to land limited, non-user-facing Rust experiments in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.chromium.org/chromium/chromium/src/&#43;/main:build/config/rust.gni&amp;#34;&amp;gt;Chromium source code tree&amp;lt;/a&amp;gt; , but we’re not yet using it in production versions of Chrome - we remain in an experimental phase.&amp;lt;br&amp;gt;
That’s why we’re pursuing both strategies in parallel. Watch this space for updates on our adventures in making C&#43;&#43; safer, and efforts to experiment with a new language in Chrome.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/C%2B%2B&amp;#34;&amp;gt;C&#43;&#43;&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/chrome&amp;#34;&amp;gt;chrome&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/chrome%20security&amp;#34;&amp;gt;chrome security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210921-201324/</link>
      <pubDate>Tue, 21 Sep 2021 20:13:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210921-201324/</guid>
      <description>Looking for the inside story on COVID? This is the book: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0plS2EAF3P&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0plS2EAF3P&amp;#34;&amp;gt;https://t.co/0plS2EAF3P&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; by @ScottGottliebMD &amp;amp;ndash; also listen to our interview with Scott &amp;amp;ndash; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/OL2Mzl7WAv&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/OL2Mzl7WAv&amp;#34;&amp;gt;https://t.co/OL2Mzl7WAv&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210921-122001/</link>
      <pubDate>Tue, 21 Sep 2021 12:20:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210921-122001/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://forms.themarkup.org/summer-2021/&amp;#34;&amp;gt;We need your input: Consider our survey&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/people/julia-angwin#content&amp;#34;&amp;gt;Skip navigation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/09/21/facebook-rolls-out-news-feed-change-that-blocks-watchdogs-from-gathering-data&amp;#34;&amp;gt;Citizen Browser Facebook Rolls Out News Feed Change That Blocks Watchdogs from Gathering Data The tweak, which targets the code in accessibility features for visually impaired users, drew ire from researchers and those who monitor the platform September 21, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210921-082105/</link>
      <pubDate>Tue, 21 Sep 2021 08:21:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210921-082105/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/21/science/fungus-pilobolus-space-astronauts.html&amp;#34;&amp;gt;Out There What a Fungus Reveals About the Space Program One thing’s for sure: Escaping the dung heap doesn’t come cheap. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Sept. 21, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210921-041952/</link>
      <pubDate>Tue, 21 Sep 2021 04:19:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210921-041952/</guid>
      <description>Prime Minister Justin Trudeau&amp;#39;s Liberals on track to win the Canadian election, according to TV networks &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas/canadas-trudeau-may-cling-power-election-looks-unlikely-secure-majority-2021-09-20/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210921-002255/</link>
      <pubDate>Tue, 21 Sep 2021 00:22:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210921-002255/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/09/19/espanol/lentes-ray-ban-facebook.html&amp;#34;&amp;gt;Lentes inteligentes: Facebook le da una oportunidad a la tecnología que hizo quedar mal a Google Nuestro reportero probó unas gafas hechas en colaboración con Ray-Ban capaces de hacer fotos, grabar videos, responder a llamadas telefónicas y reproducir pódcast. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210921-001343/</link>
      <pubDate>Tue, 21 Sep 2021 00:13:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210921-001343/</guid>
      <description>I&amp;#39;m discussing “One On One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Wednesday, Sep 22 at 5:00 PM PDT in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/kiTdAiuf7P&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/kiTdAiuf7P&amp;#34;&amp;gt;https://t.co/kiTdAiuf7P&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Ben Horowitz @bhorowitz and I will be back with our Clubhouse @Clubhouse show, &amp;amp;quot;One On One with A &amp;amp;amp; Z&amp;amp;quot;, Wednesday, September 22 at 5:00 PM PST. Please note new day and time. Please suggest great questions for us to answer by replying to this tweet!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210921-000950/</link>
      <pubDate>Tue, 21 Sep 2021 00:09:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210921-000950/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discover-the-next-great-community-in-stage-discovery-8ad0b95fca46?source=collection_home---4------14-----------------------&amp;#34;&amp;gt;Discover the Next Great Community in Stage Discovery Our blog has moved to our main website! Check us out on discord.com/blog to stay in the loop about future posts.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210921-000754/</link>
      <pubDate>Tue, 21 Sep 2021 00:07:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210921-000754/</guid>
      <description>It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. Or maybe it isn’t entirely clear who should get the report when remote access to an organization’s internal network is being sold in the cybercrime underground.&amp;lt;br&amp;gt;
In a bid to minimize these scenarios, a growing number of major companies are adopting “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://securitytxt.org/&amp;#34;&amp;gt;Security.txt&amp;lt;/a&amp;gt; ,” a proposed new Internet standard that helps organizations describe their vulnerability disclosure practices and preferences.&amp;lt;br&amp;gt;
An example of a security.txt file. Image: Securitytxt.org.&amp;lt;br&amp;gt;
The idea behind Security.txt is straightforward: The organization places a file called security.txt in a predictable place — such as example.com/security.txt, or example.com/.well-known/security.txt. What’s in the security.txt file varies somewhat, but most include links to information about the entity’s vulnerability disclosure policies and a contact email address.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.usaa.com/.well-known/security.txt&amp;#34;&amp;gt;security.txt file&amp;lt;/a&amp;gt; made available by USAA , for example, includes links to its bug bounty program; an email address for disclosing security related matters; its public encryption key and vulnerability disclosure policy; and even a link to a page where USAA thanks researchers who have reported important cybersecurity issues.&amp;lt;br&amp;gt;
Other security.txt disclosures are less verbose, as in the case of HCA Healthcare , which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gotsecuritytxt.com/query/hcahealthcare.com&amp;#34;&amp;gt;lists&amp;lt;/a&amp;gt; a contact email address, and a link to HCA’s “responsible disclosure” policies. Like USAA and many other organizations that have published security.txt files, HCA Healthcare also includes a link to information about IT security job openings at the company.&amp;lt;br&amp;gt;
Having a security.txt file can make it easier for organizations to respond to active security threats. For example, just this morning a trusted source forwarded me the VPN credentials for a major clothing retailer that were stolen by malware and made available to cybercriminals. Finding no security.txt file at the retailer’s site using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gotsecuritytxt.com/query/amazon.com&amp;#34;&amp;gt;gotsecuritytxt.com&amp;lt;/a&amp;gt; (which checks a domain for the presence of this contact file), KrebsonSecurity sent an alert to its “security@” email address for the retailer’s domain.&amp;lt;br&amp;gt;
Many organizations have long unofficially used (if not advertised) the email address security@[companydomain] to accept reports about security incidents or vulnerabilities. Perhaps this particular retailer also did so at one point, however my message was returned with a note saying the email had been blocked. KrebsOnSecurity also sent a message to the retailer’s chief information officer (CIO) — the only person in a C-level position at the retailer who was in my immediate LinkedIn network. I still have no idea if anyone has read it.&amp;lt;br&amp;gt;
Although security.txt is not yet an official Internet standard as approved by the Internet Engineering Task Force (IETF), its basic principles have so far been adopted by at least eight percent of the Fortune 100 companies. According to a review of the domain names for the latest Fortune 100 firms via gotsecuritytxt.com, those include &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/.well-known/security.txt&amp;#34;&amp;gt;Alphabet&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amazon.com/security.txt&amp;#34;&amp;gt;Amazon&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/.well-known/security.txt&amp;#34;&amp;gt;Facebook&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hcahealthcare.com/.well-known/security.txt&amp;#34;&amp;gt;HCA Healthcare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.kroger.com/.well-known/security.txt&amp;#34;&amp;gt;Kroger&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.pg.com/.well-known/security.txt&amp;#34;&amp;gt;Procter &amp;amp;amp; Gamble&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.usaa.com/.well-known/security.txt&amp;#34;&amp;gt;USAA&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.walmart.com/.well-known/security.txt&amp;#34;&amp;gt;Walmart&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
There may be another good reason for consolidating security contact and vulnerability reporting information in one, predictable place. Alex Holden , founder of the Milwaukee-based consulting firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.holdsecurity.com&amp;#34;&amp;gt;Hold Security&amp;lt;/a&amp;gt; , said it’s not uncommon for malicious hackers to experience problems getting the attention of the proper people within the very same organization they have just hacked.&amp;lt;br&amp;gt;
“In cases of ransom, the bad guys try to contact the company with their demands,” Holden said. “You have no idea how often their messages get caught in filters, get deleted, blocked or ignored.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/does-your-organization-have-a-security-txt-file/#more-56912&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/does-your-organization-have-a-security-txt-file/&amp;#34;&amp;gt;Does Your Organization Have a Security.txt File?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210920-202123/</link>
      <pubDate>Mon, 20 Sep 2021 20:21:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210920-202123/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/09/19/espanol/lentes-ray-ban-facebook.html&amp;#34;&amp;gt;Lentes inteligentes: Facebook le da una oportunidad a la tecnología que hizo quedar mal a Google Nuestro reportero probó unas gafas hechas en colaboración con Ray-Ban capaces de hacer fotos, grabar videos, responder a llamadas telefónicas y reproducir pódcasts. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210920-201654/</link>
      <pubDate>Mon, 20 Sep 2021 20:16:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210920-201654/</guid>
      <description>Edit 2021-09-20 : The version of Swift for Windows used in this project was from January 2021, when I first started working on it. Since version 5.4, Swift Package Manager is supported on Windows, so building Swift code should be much easier now. Additionally, static linking is supported for C/C&#43;&#43; code.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210920-163347/</link>
      <pubDate>Mon, 20 Sep 2021 16:33:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210920-163347/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/logistics/&amp;#34;&amp;gt;logistics and infrastructure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/vaccines/&amp;#34;&amp;gt;vaccines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210920-163131/</link>
      <pubDate>Mon, 20 Sep 2021 16:31:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210920-163131/</guid>
      <description>The story of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-09-06/zfs-is-mysteriously-eating-my-cpu.html&amp;#34;&amp;gt;ZFS Is Mysteriously Eating My CPU&amp;lt;/a&amp;gt; including a hard-to-believe flame graph.&amp;lt;br&amp;gt;
Rough notes for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-08-30/high-rate-of-paging.html&amp;#34;&amp;gt;Analyzing a High Rate of Paging&amp;lt;/a&amp;gt; , using a mix of traditional, Ftrace, and BPF performance tools.&amp;lt;br&amp;gt;
Rough notes for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-08-27/slack-crashes-secret-stderr.html&amp;#34;&amp;gt;Slack&amp;#39;s Secret STDERR Messages&amp;lt;/a&amp;gt; , where I used eBPF and other tools to debug Slack&amp;#39;s mysterious crashes (2021).&amp;lt;br&amp;gt;
Slides for my eBPF Summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-ebpf-getting-started-2021&amp;#34;&amp;gt;Performance Wins with eBPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-ebpf-getting-started-2021&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/eBPFSummit2021_eBPF_performance_getting_started.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bGAVrtb_tFs&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
The story of the most surprising software demo I&amp;#39;ve been given: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-04/an-unbelievable-demo.html&amp;#34;&amp;gt;An Unbelievable Demo&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Video for my eBPF Summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bGAVrtb_tFs&amp;#34;&amp;gt;Performance Wins with eBPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=bGAVrtb_tFs&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-ebpf-getting-started-2021&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (17 mins) (2021).&amp;lt;br&amp;gt;
Last updated: 20-Sep-2021 Created: 2001 About this site, and email address: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/email.html&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; Copyright 2021 Brendan Gregg, all rights reserved&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210920-081904/</link>
      <pubDate>Mon, 20 Sep 2021 08:19:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210920-081904/</guid>
      <description>One desperate moment: Migrants collecting food try to evade law enforcement at U.S.-Mexico border &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/trapped-migrants-collecting-food-try-evade-law-enforcement-us-mexico-border-2021-09-20/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210920-041306/</link>
      <pubDate>Mon, 20 Sep 2021 04:13:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210920-041306/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://future.a16z.com/podcasts/uncontrolled-spread-gottlieb-book-science-policy-institutions-technology-infrastructure-public-private-pandemic-emergency-beyond&amp;#34;&amp;gt;a16z Podcast: Uncontrolled Spread: Science, Policy, Institutions, Infrastructure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/scott-gottlieb/&amp;#34;&amp;gt;Scott Gottlieb&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/vineeta-agarwala/&amp;#34;&amp;gt;Vineeta Agarwala&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/marc-andreessen/&amp;#34;&amp;gt;Marc Andreessen&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/author/vijay-pande/&amp;#34;&amp;gt;Vijay Pande&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/category/policy/&amp;#34;&amp;gt;policy &amp;amp;amp; regulation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/book-launches/&amp;#34;&amp;gt;book launches (and book pods)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://a16z.com/tag/coronavirus/&amp;#34;&amp;gt;coronavirus &amp;amp;amp; the COVID-19 pandemic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We were/are at an inflection point with COVID: between old &amp;amp;amp; new tech, science, institutions, public health, policy, regulations. @ScottGottliebMD reveals behind scenes stories in his new book &amp;amp;amp; debates probing, tricky Qs w @pmarca @vintweeta @vijaypande: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/nbb5ioHZRb&amp;#34;&amp;gt;https://t.co/nbb5ioHZRb&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210920-040928/</link>
      <pubDate>Mon, 20 Sep 2021 04:09:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210920-040928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-an-email-sender-app-with-retool-and-sendgrid/&amp;#34;&amp;gt;This tutorial is going to walk through how to build a Retool app that uses the SendGrid API to send emails to your customers – in just under an hour (yes, one hour).&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210920-001928/</link>
      <pubDate>Mon, 20 Sep 2021 00:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210920-001928/</guid>
      <description>Exclusive: U.S. opens probe into 30 million vehicles over air bag inflators &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/autos-transportation/exclusive-us-opens-probe-into-30-million-vehicles-over-air-bag-inflators-2021-09-19/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210919-161859/</link>
      <pubDate>Sun, 19 Sep 2021 16:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210919-161859/</guid>
      <description>A volcano erupted on La Palma in the Canary Islands, sending lava fountains and a plume of smoke and ash into the air &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/people-evacuated-spanish-island-la-palma-after-volcano-eruption-warning-2021-09-19/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210919-122238/</link>
      <pubDate>Sun, 19 Sep 2021 12:22:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210919-122238/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/09/19/espanol/lentes-ray-ban-facebook.html&amp;#34;&amp;gt;¿Lentes inteligentes? Facebook le da una oportunidad a la tecnología que hizo quedar mal a Google Nuestro reportero probó unas gafas hechas en colaboración con Ray-Ban capaces de hacer fotos, grabar videos, responder a llamadas telefónicas y reproducir pódcasts. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210919-042007/</link>
      <pubDate>Sun, 19 Sep 2021 04:20:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210919-042007/</guid>
      <description>SpaceX capsule safely splashes down off Florida coast with first all-civilian crew ever in orbit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/science/spacex-capsule-with-worlds-first-all-civilian-orbital-crew-set-splashdown-2021-09-18/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20210919-040844/</link>
      <pubDate>Sun, 19 Sep 2021 04:08:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20210919-040844/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sites.google.com/view/zainabiftikhar/home&amp;#34;&amp;gt;Zainab Iftikhar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210918-121754/</link>
      <pubDate>Sat, 18 Sep 2021 12:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210918-121754/</guid>
      <description>Not gone yet: Why Angela Merkel still has a large role to play despite not seeking re-election as Germany&amp;#39;s chancellor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe/not-gone-yet-merkel-hang-active-caretaker-2021-09-16/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210918-082044/</link>
      <pubDate>Sat, 18 Sep 2021 08:20:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210918-082044/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/cache/&amp;#34;&amp;gt;cache&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/lens/&amp;#34;&amp;gt;lens&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/record/&amp;#34;&amp;gt;record&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/view/&amp;#34;&amp;gt;view&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/17/automatically-updated-cached-views-with-lens/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210918-081709/</link>
      <pubDate>Sat, 18 Sep 2021 08:17:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210918-081709/</guid>
      <description>Real estate heir Robert Durst convicted in murder of his best friend Susan Berman in Beverly Hills, California in 2000 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/real-estate-heir-robert-durst-convicted-murder-california-2021-09-17/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210918-001942/</link>
      <pubDate>Sat, 18 Sep 2021 00:19:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210918-001942/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/cache/&amp;#34;&amp;gt;cache&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/lens/&amp;#34;&amp;gt;lens&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/record/&amp;#34;&amp;gt;record&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/view/&amp;#34;&amp;gt;view&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/17/automatically-updated-cached-views-with-lens/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210917-202019/</link>
      <pubDate>Fri, 17 Sep 2021 20:20:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210917-202019/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/teaching/&amp;#34;&amp;gt;teaching&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/hindley-milner/&amp;#34;&amp;gt;Hindley-Milner&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/inference/&amp;#34;&amp;gt;inference&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/types/&amp;#34;&amp;gt;types&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/unification/&amp;#34;&amp;gt;unification&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/08/implementing-hindley-milner-with-the-unification-fd-library/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/17/automatically-updated-cached-views-with-lens/&amp;#34;&amp;gt;Automatically updated, cached views with lens&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210917-201740/</link>
      <pubDate>Fri, 17 Sep 2021 20:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210917-201740/</guid>
      <description>U.S. FDA advisory committee votes against approving Pfizer booster shots for people 16 and older &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/fda-advisers-vote-oppose-pfizerbiontech-covid-19-vaccine-booster-2021-09-17/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210917-201447/</link>
      <pubDate>Fri, 17 Sep 2021 20:14:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210917-201447/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implicit-move&amp;#34;&amp;gt;implicit-move&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Here’s a puzzle for you: How do you write a class without a copy constructor? …&amp;lt;br&amp;gt;
, part 2&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210917-162043/</link>
      <pubDate>Fri, 17 Sep 2021 16:20:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210917-162043/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/17/automatically-updated-cached-views-with-lens/&amp;#34;&amp;gt;Automatically updated, cached views with lens&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Recently I discovered a nice way to deal with records where certain fields of the record cache some expensive function of other fields, using the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/lens&amp;#34;&amp;gt;lens library&amp;lt;/a&amp;gt; . I very highly doubt I am the first person to ever think of this, but I don’t think I’ve seen it written down anywhere. I’d be very happy to be learn of similar approaches elsewhere.&amp;lt;br&amp;gt;
The problem&amp;lt;br&amp;gt;
Suppose we have some kind of record data structure, and an expensive-to-calculate function which computes some kind of “view”, or summary value, for the record. Like this:&amp;lt;br&amp;gt;
data Record = Record { field1 :: A , field2 :: B , field3 :: C } expensiveView :: A -&amp;amp;gt; B -&amp;amp;gt; C -&amp;amp;gt; D expensiveView = ...&amp;lt;br&amp;gt;
(Incidentally, I went back and forth on whether to put real code or only pseudocode in this post; in the end, I decided on pseudocode. Hopefully it should be easy to apply in real situations.)&amp;lt;br&amp;gt;
If we need to refer to the summary value often, we might like to cache the result of the expensive function in the record:&amp;lt;br&amp;gt;
data Record = Record { field1 :: A , field2 :: B , field3 :: C , cachedView :: D } expensiveView :: A -&amp;amp;gt; B -&amp;amp;gt; C -&amp;amp;gt; D expensiveView = ...&amp;lt;br&amp;gt;
However, this has several drawbacks:&amp;lt;br&amp;gt;
Every time we produce a new&amp;lt;br&amp;gt;
Record&amp;lt;br&amp;gt;
value by updating one or more fields, we have to remember to also update the cached view. This is easy to miss, especially in a large codebase, and will most likely result in bugs that are very difficult to track down.&amp;lt;br&amp;gt;
Actually, it gets worse: what if we already have a large codebase that is creating updated&amp;lt;br&amp;gt;
values in various places? We now have to comb through the codebase looking for such places and modifying them to update the&amp;lt;br&amp;gt;
cachedExpensive&amp;lt;br&amp;gt;
field too. Then we cross our fingers and hope we didn’t miss any.&amp;lt;br&amp;gt;
Finally, there is nothing besides comments and naming conventions to prevent us from accidentally modifying the&amp;lt;br&amp;gt;
field directly.&amp;lt;br&amp;gt;
The point is that our&amp;lt;br&amp;gt;
type now has an associated invariant, and invariants which are not automatically enforced by the API and/or type system are Bad ™ .&amp;lt;br&amp;gt;
Lens to the rescue&amp;lt;br&amp;gt;
If you don’t want to use&amp;lt;br&amp;gt;
lens&amp;lt;br&amp;gt;
, you can stop reading now. (Honestly, given the title, I’m not even sure why you read this far.) In my case, I was already using it heavily, and I had a lightbulb moment when I realized how I could leverage it to add a safe cached view to a data type without modifying the rest of my codebase at all!&amp;lt;br&amp;gt;
The basic idea is this:&amp;lt;br&amp;gt;
Add a field to hold the cached value as before.&amp;lt;br&amp;gt;
Don’t use&amp;lt;br&amp;gt;
’s TemplateHaskell utilites to automatically derive lenses for all the fields. Instead, declare them manually, such that they automatically update the cached field on every&amp;lt;br&amp;gt;
set&amp;lt;br&amp;gt;
operation.&amp;lt;br&amp;gt;
For the field with the cached value itself, declare a&amp;lt;br&amp;gt;
Getter&amp;lt;br&amp;gt;
, not a&amp;lt;br&amp;gt;
Lens&amp;lt;br&amp;gt;
Do not export the constructor or field projections for your data type; export only the type and the lenses.&amp;lt;br&amp;gt;
In pseudocode, it looks something like this:&amp;lt;br&amp;gt;
module Data.Record ( Record , field1 , field2 , field3 , cachedView ) where import Control.Lens data Record = Record { _field1 :: A , _field2 :: B , _field3 :: C , _cachedView :: D } expensiveView :: A -&amp;amp;gt; B -&amp;amp;gt; C -&amp;amp;gt; D expensiveView = ... recache :: Record -&amp;amp;gt; Record recache r = r { _cachedView = expensiveView ( _field1 r ) ( _field2 r ) ( _field3 r ) } cachingLens :: ( Record -&amp;amp;gt; a ) -&amp;amp;gt; ( Record -&amp;amp;gt; a -&amp;amp;gt; Record ) -&amp;amp;gt; Lens&amp;amp;#39; Record a cachingLens get set = lens get ( \ r a -&amp;amp;gt; recache $ set r a ) field1 :: Lens&amp;amp;#39; Record A field1 = cachingLens _field1 ( \ r x -&amp;amp;gt; r { _field1 = x } ) field2 :: Lens&amp;amp;#39; Record B field2 = cachingLens _field2 ( \ r x -&amp;amp;gt; r { _field2 = x } ) field3 :: Lens&amp;amp;#39; Record C field3 = cachingLens _field3 ( \ r x -&amp;amp;gt; r { _field3 = x } ) cachedView :: Getter Record D cachedView = to _cachedView&amp;lt;br&amp;gt;
This solves all the problems! (1) We never have to remember to update the cached field; using a lens to modify the value of another field will automatically cause the cached view to be recomputed as well. (3) We can’t accidentally set the cached field, since it only has a&amp;lt;br&amp;gt;
. In fact, this even solves (2), the problem of having to update the rest of our codebase: if we are already using&amp;lt;br&amp;gt;
to access fields in the record (as I was), then the rest of the codebase doesn’t have to change at all! And if we aren’t using&amp;lt;br&amp;gt;
already, then the typechecker will infallibly guide us to all the places we have to fix; once our code typechecks again, we know we have caught every single access to the record in the codebase.&amp;lt;br&amp;gt;
Variant for only a few fields&amp;lt;br&amp;gt;
What if we have a large record, and the cached summary value only depends on a few of the fields? In that case, we can save a bit of work for ourselves by getting&amp;lt;br&amp;gt;
to auto-generate lenses for the other fields, and only handcraft lenses for the fields that are actually involved. Like this:&amp;lt;br&amp;gt;
{-# LANGUAGE TemplateHaskell #-} data Record = Record { _field1 :: A , _field2 :: B , _cachedView :: C , ... } expensiveView :: A -&amp;amp;gt; B -&amp;amp;gt; C expensiveView = ... let exclude = [ &amp;amp;#39; _field1 , &amp;amp;#39; _field2 , &amp;amp;#39; _cachedView ] in makeLensesWith ( lensRules &amp;amp;amp; lensField . mapped . mapped %~ \ fn n -&amp;amp;gt; if n `elem` exclude then [] else fn n ) &amp;amp;#39; &amp;amp;#39; Record field1 :: Lens&amp;amp;#39; Record A field1 = ... similar to before ... field2 :: Lens&amp;amp;#39; Record B field2 = ... cachedView :: Getter Record C cachedView = to _cachedView&amp;lt;br&amp;gt;
But what about the lens laws?&amp;lt;br&amp;gt;
You might worry that having a lens for one field automatically update the value of another field might break &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/lens-5.0.1/docs/Control-Lens-Combinators.html#t:Lens&amp;#34;&amp;gt;the lens laws&amp;lt;/a&amp;gt; somehow, but it’s perfectly legal, as we can check.&amp;lt;br&amp;gt;
view l (set l v s) ≡ v&amp;lt;br&amp;gt;
clearly holds: setting the&amp;lt;br&amp;gt;
cachedView&amp;lt;br&amp;gt;
on the side doesn’t change the fact that we get back out whatever we put into, say,&amp;lt;br&amp;gt;
field1&amp;lt;br&amp;gt;
set l v&amp;amp;#39; (set l v s) ≡ set l v&amp;amp;#39; s&amp;lt;br&amp;gt;
also clearly holds. On the left-hand side, the cached summary value will simply get overwritten in the same way that the other field does.&amp;lt;br&amp;gt;
set l (view l s) s ≡ s&amp;lt;br&amp;gt;
is actually a bit more subtle. If we view the value of&amp;lt;br&amp;gt;
, then&amp;lt;br&amp;gt;
it with the same value again, how do we know the value of the overall record&amp;lt;br&amp;gt;
doesn’t change? In particular, could we end up with a different&amp;lt;br&amp;gt;
even though&amp;lt;br&amp;gt;
is the same? But in fact, in this specific scenario (putting the same value back into a field that we just read), the value of the&amp;lt;br&amp;gt;
won’t change. This depends on two facts: first, that the&amp;lt;br&amp;gt;
expensiveView&amp;lt;br&amp;gt;
is a deterministic function which always returns the same summary value for the same input record. Of course this is guaranteed by the fact that it’s a pure function. Second, we must maintain the invariant that the&amp;lt;br&amp;gt;
is always up-to-date, so that recomputing the summary value after setting a field to the same value it already had will simply produce the same summary value again, because we know the summary value was correct to begin with. And of course, maintaining this invariant is the whole point; it’s guaranteed by the way we only export the lenses (and only a&amp;lt;br&amp;gt;
for the&amp;lt;br&amp;gt;
) and not the record constructor.&amp;lt;br&amp;gt;
And that’s it! I’ve been using this approach very successfully in a current project (the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/08/implementing-hindley-milner-with-the-unification-fd-library/&amp;#34;&amp;gt;same project that got me to implement Hindley-Milner with unification-fd&amp;lt;/a&amp;gt; —watch this space for an announcement soon!). If you know of similar approaches that have been written about elsewhere, or if you end up using this technique in your own project, I’d love to hear about it.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/cache/&amp;#34;&amp;gt;cache&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/lens/&amp;#34;&amp;gt;lens&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/record/&amp;#34;&amp;gt;record&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/view/&amp;#34;&amp;gt;view&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/17/automatically-updated-cached-views-with-lens/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210917-041852/</link>
      <pubDate>Fri, 17 Sep 2021 04:18:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210917-041852/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebooks-survival-dilemma&amp;#34;&amp;gt;Facebook’s Survival Dilemma&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/facebooks-survival-dilemma&amp;#34;&amp;gt;Facebook is the most vulnerable of all Big Tech companies. What does it take to survive?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210917-040711/</link>
      <pubDate>Fri, 17 Sep 2021 04:07:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210917-040711/</guid>
      <description>A jury in California today reached a guilty verdict in the trial of Matthew Gatrel , a St. Charles, Ill. man charged in 2018 with operating two online services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against Internet users and websites. Gatrel’s conviction comes roughly two weeks after his co-conspirator pleaded guilty to criminal charges related to running the services.&amp;lt;br&amp;gt;
The user interface for Downthem[.]org.&amp;lt;br&amp;gt;
Prosecutors for the Central District of California charged Gatrel, 32, and his business partner Juan “Severon” Martinez of Pasadena, Calif. with operating two DDoS-for-hire or “booter” services — downthem[.]org and ampnode[.]com .&amp;lt;br&amp;gt;
Despite admitting to FBI agents that he ran these booter services (and turning over plenty of incriminating evidence in the process), Gatrel opted to take his case to trial, defended the entire time by public defenders. Facing the prospect of a hefty sentence if found guilty at trial, Martinez pleaded guilty on Aug. 26 to one count of unauthorized impairment of a protected computer.&amp;lt;br&amp;gt;
Gatrel was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/usao-cdca/pr/illinois-man-convicted-federal-criminal-charges-operating-subscription-based-computer&amp;#34;&amp;gt;convicted&amp;lt;/a&amp;gt; on all three charges of violating the Computer Fraud and Abuse Act, including conspiracy to commit unauthorized impairment of a protected computer, conspiracy to commit wire fraud, and unauthorized impairment of a protected computer.&amp;lt;br&amp;gt;
Investigators say Downthem helped some 2,000 customers launch debilitating digital assaults at more than 200,000 targets, including many government, banking, university and gaming Web sites.&amp;lt;br&amp;gt;
Prosecutors alleged that in addition to running and marketing Downthem, the defendants sold huge, continuously updated lists of Internet addresses tied to devices that could be used by other booter services to make attacks far more powerful and effective. In addition, other booter services also drew firepower and other resources from Ampnode. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/trial-ends-in-guilty-verdict-for-ddos-for-hire-boss/#more-57016&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/trial-ends-in-guilty-verdict-for-ddos-for-hire-boss/&amp;#34;&amp;gt;Trial Ends in Guilty Verdict for DDoS-for-Hire Boss&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210916-202131/</link>
      <pubDate>Thu, 16 Sep 2021 20:21:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210916-202131/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;Why Podcasts Are My New Wikipedia —the  Perfect Informal Learning Resource Sept. 9, 2021 · In this article, I explain why podcasts replaced a lot of my Wikipedia usage for informal learning. I also talk about how I listen to five-plus hours of podcasts every day! Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210916-201908/</link>
      <pubDate>Thu, 16 Sep 2021 20:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210916-201908/</guid>
      <description>September 16, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/09/16/Mark-Rober-and-capitalist-manipulation.gmi&amp;#34;&amp;gt;Mark Rober and the manipulation of children for profit&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210916-201220/</link>
      <pubDate>Thu, 16 Sep 2021 20:12:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210916-201220/</guid>
      <description>&amp;lt;p&amp;gt;.@pmarca compares the theory of how Empires rise and fall to the life-cycle of companies today.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;A financial history themed conversation on barbarians, pirates, railroad tycoons, venture capital and so much more&amp;amp;hellip;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;What else could one want?! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/OOqSDjzY1v&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/OOqSDjzY1v&amp;#34;&amp;gt;https://t.co/OOqSDjzY1v&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210916-161721/</link>
      <pubDate>Thu, 16 Sep 2021 16:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210916-161721/</guid>
      <description>Facebook says it is targeting users who coordinate on harmful activities with the same strategy it uses on fake accounts &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-facebook-target-harmful-coordination-by-real-accounts-using-playbook-2021-09-16/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210916-121425/</link>
      <pubDate>Thu, 16 Sep 2021 12:14:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210916-121425/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/09/fuzzing-closed-source-javascript.html&amp;#34;&amp;gt;Fuzzing Closed-Source JavaScript Engines with Cove&amp;amp;hellip;&amp;lt;/a&amp;gt; (Sep)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20210916-120638/</link>
      <pubDate>Thu, 16 Sep 2021 12:06:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20210916-120638/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com&amp;#34;&amp;gt;Follow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210916-082004/</link>
      <pubDate>Thu, 16 Sep 2021 08:20:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210916-082004/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2007/08/16/mapping-over-a-nested-functor/&amp;#34;&amp;gt;Mapping over a nested functor?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>the mango zone</title>
      <link>https://www.whatsupup.com/blog/canton/ricketier/20210916-081314/</link>
      <pubDate>Thu, 16 Sep 2021 08:13:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/canton/ricketier/20210916-081314/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://darknetdiaries.com/episode/84/&amp;#34;&amp;gt;Darknet Diaries episode 84: Jet-setters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I talk about my exemplary performance in the Do Not Get Arrested Challenge 2020, and share some tips and tricks for future participants. Not a talk video, I&amp;amp;#39;m a fraud.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210916-041146/</link>
      <pubDate>Thu, 16 Sep 2021 04:11:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210916-041146/</guid>
      <description>&amp;lt;p&amp;gt;In my conversation with @pmarca , he demonstrates how the &amp;amp;quot;Golden Age of Piracy&amp;amp;quot; has parallels to the world of venture capital and startups.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;amp;quot;I&amp;#39;m a venture capitalist now, and my day job is basically to fund the pirates.&amp;amp;quot; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/WOW4hj1WXm&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/WOW4hj1WXm&amp;#34;&amp;gt;https://t.co/WOW4hj1WXm&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210916-041105/</link>
      <pubDate>Thu, 16 Sep 2021 04:11:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210916-041105/</guid>
      <description>An article for opensource.com: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https:///opensource.com/article/19/8/introduction-bpftrace&amp;#34;&amp;gt;An introduction to bpftrace for Linux&amp;lt;/a&amp;gt; , summarizing the syntax and including a one-liners tutorial ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/opensource_An_introduction_to_bpftrace.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2019).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.com/article/17/11/bccbpf-performance&amp;#34;&amp;gt;7 tools for analyzing performance in Linux with bcc/BPF&amp;lt;/a&amp;gt; for opensource.com, which is also my first post on eBPF for the Fedora/Red Hat family of operating systems ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/opensource_7_useful_bcc_BPF_perf_tools.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) (2017).&amp;lt;br&amp;gt;
Contributed documentation on the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wiki.freebsd.org/DTrace&amp;#34;&amp;gt;DTrace on FreeBSD&amp;lt;/a&amp;gt; wiki page: the initial &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wiki.freebsd.org/DTrace/One-Liners&amp;#34;&amp;gt;one-liners&amp;lt;/a&amp;gt; list ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/FreeBSDwiki_DTrace_One-Liners_2014.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ) and a 12 part &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wiki.freebsd.org/DTrace/Tutorial&amp;#34;&amp;gt;tutorial&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Articles/FreeBSDwiki_DTrace_Tutorial_2014.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
My post &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2014-09-15/the-msrs-of-ec2.html&amp;#34;&amp;gt;The MSRs of EC2&amp;lt;/a&amp;gt; was the first to show that CPU Model Specific Registers were available in the cloud and could be used to measure interesting details such as the real CPU clock rate and temperature of instances (Xen guests). Weeks after my post (and possibly inspired by it) a security researcher found an MSR vulnerability in EC2 that required a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theregister.com/2014/09/25/amazon_readies_global_glory_reboot/&amp;#34;&amp;gt;cloud-wide reboot&amp;lt;/a&amp;gt; (2014).&amp;lt;br&amp;gt;
My &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/zones.html&amp;#34;&amp;gt;Solaris 10 Zones&amp;lt;/a&amp;gt; page from 2005, where I developed models for configuring Zones with Resource Controls. This was pioneering work for the performance isolation of containers (nowadays the realm of Linux cgroups). I was not a Sun employee at the time. Sun later based their official docs on my work, without attribution (they were not allowed to include my home page URL in the official Sun references).&amp;lt;br&amp;gt;
I&amp;#39;ve also developed software as a professional kernel engineer, which isn&amp;#39;t listed below (e.g., the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2008-07-22/zfs-l2arc.html&amp;#34;&amp;gt;ZFS L2ARC&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210916-001740/</link>
      <pubDate>Thu, 16 Sep 2021 00:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210916-001740/</guid>
      <description>LIVE: SpaceX launches all-civilian spaceflight, the first attempt at orbit around the Earth without professional astronauts &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=2RiiIh2ZwwY&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210916-001725/</link>
      <pubDate>Thu, 16 Sep 2021 00:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210916-001725/</guid>
      <description>Sep 9 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;9&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-newsletter-network-effect/comments&amp;#34;&amp;gt;Comment 1&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210916-001154/</link>
      <pubDate>Thu, 16 Sep 2021 00:11:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210916-001154/</guid>
      <description>&amp;lt;p&amp;gt;Launch Day Thrilled to share the second Investor Amnesia Course:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;#39;Imperial Finance: A History of Empires&amp;#39;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;8&#43; hours of content taught by legendary investors, history experts, and bestselling authors.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Learn more and preview the course: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Lezvvbdxvs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Lezvvbdxvs&amp;#34;&amp;gt;https://t.co/Lezvvbdxvs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Catch @pmarca in a wide-ranging series of interviews on the history of empires, finance, production, and lots more in the latest @InvestorAmnesia course launching today &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/N0Tkr79vd2&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/N0Tkr79vd2&amp;#34;&amp;gt;https://t.co/N0Tkr79vd2&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210916-001108/</link>
      <pubDate>Thu, 16 Sep 2021 00:11:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210916-001108/</guid>
      <description>This page lists everything: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com#Documentation&amp;#34;&amp;gt;Documentation&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com#Videos&amp;#34;&amp;gt;Videos&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com#Software&amp;#34;&amp;gt;Software&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com#Misc&amp;#34;&amp;gt;Misc&amp;lt;/a&amp;gt; .
For a short selection of most popular content, see my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/overview.html&amp;#34;&amp;gt;Overview&amp;lt;/a&amp;gt; page.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/dtrace.html&amp;#34;&amp;gt;DTrace&amp;lt;/a&amp;gt; where I shared the first publicly available DTrace tools and later my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/dtracetoolkit.html&amp;#34;&amp;gt;DTraceToolkit&amp;lt;/a&amp;gt; . I created this page in 2004 and it was also the first public website on DTrace.&amp;lt;br&amp;gt;
I had two prior professional blogs (see my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/archive.html&amp;#34;&amp;gt;blog archive&amp;lt;/a&amp;gt; for archived posts): &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://blogs.oracle.com/brendan&amp;#34;&amp;gt;blogs.oracle.com/brendan&amp;lt;/a&amp;gt; (formally &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://web.archive.org/web/*/blogs.sun.com/brendan&amp;#34;&amp;gt;blogs.sun.com/brendan&amp;lt;/a&amp;gt; ), where I discussed performance, DTrace, and the ZFS storage appliance (2006-2010); and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://dtrace.org/blogs/brendan&amp;#34;&amp;gt;dtrace.org/blogs/brendan&amp;lt;/a&amp;gt; , where I continued posting about cloud performance and DTrace (2010-2014). Posts from my prior personal blog at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://bdgregg.blogspot.com&amp;#34;&amp;gt;bdgregg.blogspot.com&amp;lt;/a&amp;gt; is also in the archive.&amp;lt;br&amp;gt;
My old and unmaintained Unix and Sun Solaris material is labeled as being in my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/crypt.html&amp;#34;&amp;gt;Crypt&amp;lt;/a&amp;gt; , and kept online for historical interest only. The Crypt containers a few extra things not listed above. (circa 2003-2005.)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210916-000854/</link>
      <pubDate>Thu, 16 Sep 2021 00:08:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210916-000854/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-a-mongodb-gui-in-minutes/&amp;#34;&amp;gt;Here is how to build a simple yet powerful admin panel for your MongoDB instance. We’ll demonstrate how to query data, build tables and components, and use inline JavaScript to customize them.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210916-000833/</link>
      <pubDate>Thu, 16 Sep 2021 00:08:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210916-000833/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/weve-moved-visit-our-new-blog-home-at-discord-com-blog-dab8e173e577?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;We’ve Moved! Visit Our New Blog Home at discord.com/blog We’ve got some exciting plans for the future of our blog. Follow us at discord.com/blog to stay in the loop about future posts.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210916-000648/</link>
      <pubDate>Thu, 16 Sep 2021 00:06:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210916-000648/</guid>
      <description>TTEC , [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/finance/quote/TTEC:NASDAQ?sa=X&amp;amp;ved=2ahUKEwjXwqSy4oHzAhWdElkFHTMhCVQQ3ecFegQIDBAS&amp;#34;&amp;gt;NASDAQ: TTEC&amp;lt;/a&amp;gt; ], a company used by some of the world’s largest brands to help manage customer support and sales online and over the phone, is dealing with disruptions from a network security incident resulting from a ransomware attack, KrebsOnSecurity has learned.&amp;lt;br&amp;gt;
While many companies have been laying off or furloughing workers in response to the Coronavirus pandemic, TTEC has been &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wsj.com/articles/millions-of-jobs-have-been-lost-but-hiring-is-booming-at-these-companies-11602768600&amp;#34;&amp;gt;massively hiring&amp;lt;/a&amp;gt; . Formerly TeleTech Holdings Inc., Englewood, Co.-based TTEC now has nearly 60,000 employees, most of whom work from home and answer customer support calls on behalf of a large number of name-brand companies, like Bank of America , Best Buy , Credit Karma , Dish Network , Kaiser Permanente , USAA and Verizon .&amp;lt;br&amp;gt;
On Sept. 14, KrebsOnSecurity heard from a reader who passed on an internal message apparently sent by TTEC to certain employees regarding the status of a widespread system outage that began on Sunday, Sept. 12.&amp;lt;br&amp;gt;
“We’re continuing to address the system outage impacting access to the network, applications and customer support,” reads an internal message sent by TTEC to certain employees.&amp;lt;br&amp;gt;
TTEC has not responded to requests for comment. A phone call placed to the media contact number listed on an August 2021 TTEC earnings release produced a message saying it was a non-working number.&amp;lt;br&amp;gt;
[ Update, 6:20 p.m. ET: TTEC confirmed a ransomware attack. See the update at the end of this piece for their statement]&amp;lt;br&amp;gt;
TTEC’s own message to employees suggests the company’s network may have been hit by the ransomware group “Ragnar Locker,” (or else by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/&amp;#34;&amp;gt;a rival ransomware gang pretending to be Ragnar&amp;lt;/a&amp;gt; ). The message urged employees to avoid clicking on a file that suddenly may have appeared in their Windows start menu called “!RA!G!N!A!R!”&amp;lt;br&amp;gt;
“DO NOT click on this file,” the notice read. “It’s a nuisance message file and we’re working on removing it from our systems.”&amp;lt;br&amp;gt;
Ragnar Locker is an aggressive ransomware group that typically demands millions of dollars worth of cryptocurrency in ransom payments. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/ransomware-gang-threatens-to-leak-data-if-victim-contacts-fbi-police/&amp;#34;&amp;gt;an announcement published on the group’s darknet leak site this week&amp;lt;/a&amp;gt; , the group threatened to publish the full data of victims who seek help from law enforcement and investigative agencies following a ransomware attack.&amp;lt;br&amp;gt;
One of the messages texted to TTEC employees included a link to a Zoom videoconference line at ttec.zoom.us . Clicking that link opened a Zoom session in which multiple TTEC employees who were sharing their screens took turns using the company’s Global Service Desk, an internal TTEC system for tracking customer support tickets.&amp;lt;br&amp;gt;
The TTEC employees appear to be using the Zoom conference line to report the status of various customer support teams, most of which are reporting “unable to work” at the moment.&amp;lt;br&amp;gt;
For example, TTEC’s Service Desk reports that hundreds of TTEC employees assigned to work with Bank of America’s prepaid services are unable to work because they can’t remotely connect to TTEC’s customer service tools. More than 1,000 TTEC employees are currently unable to do their normal customer support work for Verizon, according to the Service Desk data. Hundreds of employees assigned to handle calls for Kaiser Permanente also are unable to work.&amp;lt;br&amp;gt;
“They’ve been radio silent all week except to notify employees to take another day off,” said the source who passed on the TTEC messages, who spoke to KrebsOnSecurity on condition of anonymity. “As far as I know, all low-level employees have another day off today.”&amp;lt;br&amp;gt;
The extent and severity of the incident at TTEC remains unknown. It is common for companies to disconnect critical systems in the event of a network intrusion, as part of a larger effort to stop the badness from spreading elsewhere. Sometimes disconnecting everything actually does help, or at least helps to keep the attack from spreading to partner networks. But it is those same connections to partner companies that raises concern in the case of TTEC’s ongoing outage.&amp;lt;br&amp;gt;
In the meantime, if you’re unlucky enough to need to make a customer service call today, there’s a better-than-even chance you will experience….wait for it…longer-than-usual hold times.&amp;lt;br&amp;gt;
This is a developing story. Further details or updates will be noted here with a date and time stamp.&amp;lt;br&amp;gt;
Update, 5:37 p.m. ET: TTEC responded with the following statement:&amp;lt;br&amp;gt;
TTEC is committed to cyber security, and to protecting the integrity of our clients’ systems and data. We recently became aware of a cybersecurity incident that has affected certain TTEC systems.  Although as a result of the  incident, some of our data was encrypted and business activities at several facilities have been temporarily disrupted, the company continuous to serve its global clients. TTEC immediately activated its information security incident response business continuity protocols, isolated the systems involved, and took other appropriate measures to contain the incident. We are now in the process of  carefully and deliberately restoring the systems that have been involved.&amp;lt;br&amp;gt;
We also launched an investigation, typical under the circumstances, to determine the potential impacts.  In serving our clients TTEC, generally, does not maintain our clients’ data, and the investigation to date has not identified compromise to clients’ data. That investigation is on-going and we will take additional action, as appropriate, based on the investigation’s results. This is all the information we have to share until our investigation is complete.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/customer-care-giant-ttec-hit-by-ransomware/&amp;#34;&amp;gt;Customer Care Giant TTEC Hit By Ransomware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210915-201745/</link>
      <pubDate>Wed, 15 Sep 2021 20:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210915-201745/</guid>
      <description>Olympians Biles, Raisman, Nichols and Maroney blast FBI, USA Gymnastics for enabling Nassar sex abuse &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports/gymnasts-simone-biles-aly-raisman-testify-us-senate-sex-abuse-probe-2021-09-15/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210915-201455/</link>
      <pubDate>Wed, 15 Sep 2021 20:14:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210915-201455/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/09/google-supports-open-source-technology.html&amp;#34;&amp;gt;Google Supports Open Source Technology Improvement Fund&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Kaylin Trychon, Google Open Source Security Team&amp;lt;br&amp;gt;
We &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/&amp;#34;&amp;gt;recently pledged&amp;lt;/a&amp;gt; to provide $100 million to support third-party foundations that manage open source security priorities and help fix vulnerabilities. As part of this commitment, we are excited to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ostif.org/google-is-partnering-with-open-source-technology-improvement-fund-inc-to-sponsor-security-reviews-of-critical-open-source-software/&amp;#34;&amp;gt;announce&amp;lt;/a&amp;gt; our support of the Open Source Technology Improvement Fund (OSTIF) to improve security of eight open-source projects. Google’s support will allow OSTIF to launch the Managed Audit Program (MAP), which will expand in-depth security reviews to critical projects vital to the open source ecosystem. The eight libraries, frameworks and apps that were selected for this round are those that would benefit the most from security improvements and make the largest impact on the open-source ecosystem that relies on them. The projects include:&amp;lt;br&amp;gt;
Git - de facto version control software used in modern DevOps.&amp;lt;br&amp;gt;
Lodash - a modern JavaScript utility library with over 200 functions to facilitate web development, can be found in most environments that support JavaScript, which is most of the world wide web.&amp;lt;br&amp;gt;
Laravel - a php web application framework that is used by many modern, full-stack web applications, including integrations with Google Cloud.&amp;lt;br&amp;gt;
Slf4j - a logging facade for various Java logging frameworks.&amp;lt;br&amp;gt;
Jackson-core &amp;amp;amp; Jackson-databind - a JSON for Java, Streaming API, and extra shared components and the base for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/FasterXML/jackson-databind&amp;#34;&amp;gt;Jackson data-bind&amp;lt;/a&amp;gt; package.&amp;lt;br&amp;gt;
Httpcomponents-core &amp;amp;amp; Httpcomponents-client - these projects are responsible for creating and maintaining a toolset of low-level Java components focused on HTTP and associated protocols.&amp;lt;br&amp;gt;
We are excited to help OSTIF build a safer open source environment for everyone. If you are interested in getting involved or learning more &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ostif.org/google-is-partnering-with-open-source-technology-improvement-fund-inc-to-sponsor-security-reviews-of-critical-open-source-software/&amp;#34;&amp;gt;please visit the OSTIF blog&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Open%20Source&amp;#34;&amp;gt;Open Source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210915-200818/</link>
      <pubDate>Wed, 15 Sep 2021 20:08:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210915-200818/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/weve-moved-visit-our-new-blog-home-at-discord-com-blog-dab8e173e577?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;We’ve Moved! Visit Our New Blog Home at discord.com/blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/weve-moved-visit-our-new-blog-home-at-discord-com-blog-dab8e173e577?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;We’ve Moved! Visit Our New Blog Home at discord.com/blog We’ve got some exciting plans for the future of our blog. Follow us at https://discord.com/blog to stay in the loop about future posts.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210915-200717/</link>
      <pubDate>Wed, 15 Sep 2021 20:07:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210915-200717/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/use-the-swiss-cheese-method-to-defeat-procrastination&amp;#34;&amp;gt;Use the Swiss Cheese Method to defeat procrastination&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210915-081149/</link>
      <pubDate>Wed, 15 Sep 2021 08:11:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210915-081149/</guid>
      <description>Norm Macdonald &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/normmacdonald&amp;#34;&amp;gt;@normmacdonald&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
At times, the joy that life attacks me with is unbearable and leads to gasping hysterical laughter. I find myself completely out of control and wonder how could life could surprise me again and again and again, so completely. How could a man be a cynic? It is a sin.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210915-041106/</link>
      <pubDate>Wed, 15 Sep 2021 04:11:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210915-041106/</guid>
      <description>My &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.slideshare.net/brendangregg/analyzing-os-x-systems-performance-with-the-use-method&amp;#34;&amp;gt;Analyzing OS X Systems Performance with the USE Method&amp;lt;/a&amp;gt; talk at MacIT 2014 ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/analyzing-os-x-systems-performance-with-the-use-method&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/MacIT2014_Analyzing_OSX_Perf_USE_Method.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
Slides for the OSCON 2007 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/OSCON2007_Observability_DTrace_Twitter.pdf&amp;#34;&amp;gt;Observability Matters: How DTrace Helped Twitter&amp;lt;/a&amp;gt; by Adam Leventhal and myself. At the time, Twitter was a one-year old startup running on Solaris with crippling performance issues, and Sun&amp;#39;s top engineering team (including Adam and myself) visited the SF headquarters to help. This summaries findings by the team (2007).&amp;lt;br&amp;gt;
A 233-slide deck for a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/dtrace_workshop01_slides.pdf&amp;#34;&amp;gt;DTrace workshop&amp;lt;/a&amp;gt; that I developed and delivered in London, that summarized Solaris performance and DTrace analysis. As part of this workshop I created performance labs for the students to solve (not included in the slides) (2006).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210915-001232/</link>
      <pubDate>Wed, 15 Sep 2021 00:12:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210915-001232/</guid>
      <description>&amp;lt;p&amp;gt;Jamie Catherwood &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/InvestorAmnesia&amp;#34;&amp;gt;@InvestorAmnesia&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Launching September 15th. The second Investor Amnesia Course:&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;&amp;#39;Imperial Finance: A History of Empires&amp;#39;&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;World Wars, The Bolshevik Revolution, Weimar Inflation, Cycles of Empire, The Crusades and &amp;lt;em&amp;gt;much&amp;lt;/em&amp;gt; more.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Stay tuned. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/fRAhjsb6d1&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/fRAhjsb6d1&amp;#34;&amp;gt;https://t.co/fRAhjsb6d1&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210915-000652/</link>
      <pubDate>Wed, 15 Sep 2021 00:06:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210915-000652/</guid>
      <description>Microsoft today pushed software updates to plug dozens of security holes in Windows and related products, including a vulnerability that is already being exploited in active attacks. Also, Apple has issued an emergency update to fix a flaw that’s reportedly been abused to install spyware on iOS products, and Google ‘s got a new version of Chrome that tackles two zero-day flaws. Finally, Adobe has released critical security updates for Acrobat , Reader and a slew of other software.&amp;lt;br&amp;gt;
Four of the flaws fixed in this patch batch earned Microsoft’s most-dire “critical” rating, meaning they could be exploited by miscreants or malware to remotely compromise a Windows PC with little or no help from the user.&amp;lt;br&amp;gt;
Top of the critical heap is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444&amp;#34;&amp;gt;CVE-2021-40444&amp;lt;/a&amp;gt; , which affects the “MSHTML” component of Internet Explorer (IE) on Windows 10 and many Windows Server versions. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-attackers-exploiting-windows-zero-day-flaw/&amp;#34;&amp;gt;a security advisory last week&amp;lt;/a&amp;gt; , Microsoft warned attackers already are exploiting the flaw through Microsoft Office applications as well as IE.&amp;lt;br&amp;gt;
The critical bug &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36965&amp;#34;&amp;gt;CVE-2021-36965&amp;lt;/a&amp;gt; is interesting, as it involves a remote code execution flaw in “WLAN AutoConfig,” the component in Windows 10 and many Server versions that handles auto-connections to Wi-Fi networks. One mitigating factor here is that the attacker and target would have to be on the same network, although many systems are configured to auto-connect to Wi-Fi network names with which they have previously connected.&amp;lt;br&amp;gt;
Allan Liska , senior security architect at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.recordedfuture.com&amp;#34;&amp;gt;Recorded Future&amp;lt;/a&amp;gt; , said a similar vulnerability — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28316&amp;#34;&amp;gt;CVE-2021-28316&amp;lt;/a&amp;gt; — was announced in April.&amp;lt;br&amp;gt;
“CVE-2021-28316 was a security bypass vulnerability, not remote code execution, and it has never been reported as publicly exploited,” Liska said. “That being said, the ubiquity of systems deployed with WLAN AutoConfig enabled could make it an attractive target for exploitation.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-patch-tuesday-september-2021-edition/#more-56909&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210914-201457/</link>
      <pubDate>Tue, 14 Sep 2021 20:14:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210914-201457/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/09/fuzzing-closed-source-javascript.html&amp;#34;&amp;gt;Fuzzing Closed-Source JavaScript Engines with Coverage Feedback&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ivan Fratric, Project Zero&amp;lt;br&amp;gt;
tl;dr I combined &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/fuzzilli&amp;#34;&amp;gt;Fuzzilli&amp;lt;/a&amp;gt; (an open-source JavaScript engine fuzzer), with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/TinyInst&amp;#34;&amp;gt;TinyInst&amp;lt;/a&amp;gt; (an open-source dynamic instrumentation library for fuzzing). I also added grammar-based mutation support to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/Jackalope&amp;#34;&amp;gt;Jackalope&amp;lt;/a&amp;gt; (my black-box binary fuzzer). So far, these two approaches resulted in finding three security issues in jscript9.dll (default JavaScript engine used by Internet Explorer).&amp;lt;br&amp;gt;
Introduction or “when you can’t beat them, join them”&amp;lt;br&amp;gt;
In the past, I’ve invested a lot of time in generation-based fuzzing, which was a successful way to find vulnerabilities in various targets, especially those that take some form of language as input. For example, Domato, my grammar-based generational fuzzer, found &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/list?q=ifratric%20webkit&amp;amp;can=1&amp;#34;&amp;gt;over 40 vulnerabilities in WebKit&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/list?q=ifratric%20jscript&amp;amp;can=1&amp;#34;&amp;gt;numerous bugs in Jscript&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
While generation-based fuzzing is still a good way to fuzz many complex targets, it was demonstrated that, for finding vulnerabilities in modern JavaScript engines, especially engines with JIT compilers, better results can be achieved with mutational, coverage-guided approaches. My colleague Samuel Groß gives a compelling case on why that is in his &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=OHjq9Y66yfc&amp;#34;&amp;gt;OffensiveCon talk&amp;lt;/a&amp;gt; . Samuel is also the author of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/fuzzilli&amp;#34;&amp;gt;Fuzzilli&amp;lt;/a&amp;gt; , an open-source JavaScript engine fuzzer based on mutating a custom intermediate language. Fuzzilli has found a large number of bugs in various JavaScript engines.&amp;lt;br&amp;gt;
While there has been a lot of development on coverage-guided fuzzers over the last few years, most of the public tooling focuses on open-source targets or software running on the Linux operating system. Meanwhile, I focused on developing tooling for fuzzing of closed-source binaries on operating systems where such software is more prevalent (currently Windows and macOS). Some years back, I published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/winafl&amp;#34;&amp;gt;WinAFL&amp;lt;/a&amp;gt; , the first performant AFL-based fuzzer for Windows. About a year and a half ago, however, I started working on a brand new toolset for black-box coverage-guided fuzzing. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/TinyInst&amp;#34;&amp;gt;TinyInst&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/Jackalope&amp;#34;&amp;gt;Jackalope&amp;lt;/a&amp;gt; are the two outcomes of this effort.&amp;lt;br&amp;gt;
It comes somewhat naturally to combine the tooling I’ve been working on with techniques that have been so successful in finding JavaScript bugs, and try to use the resulting tooling to fuzz JavaScript engines for which the source code is not available. Of such engines, I know two: jscript and jscript9 (implemented in jscript.dll and jscript9.dll) on Windows, which are both used by the Internet Explorer web browser. Of these two, jscript9 is probably more interesting in the context of mutational coverage-guided fuzzing since it includes a JIT compiler and more advanced engine features.&amp;lt;br&amp;gt;
While you might think that Internet Explorer is a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blogs.windows.com/windowsexperience/2021/05/19/the-future-of-internet-explorer-on-windows-10-is-in-microsoft-edge/&amp;#34;&amp;gt;thing of the past&amp;lt;/a&amp;gt; and it doesn’t make sense to spend energy looking for bugs in it, the fact remains that Internet Explorer is still heavily exploited by real-world attackers. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786&amp;#34;&amp;gt;2020&amp;lt;/a&amp;gt; there were two Internet Explorer 0days exploited in the wild and three in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=2129022708&amp;#34;&amp;gt;2021&amp;lt;/a&amp;gt; so far . One of these vulnerabilities was in the JIT compiler of jscript9. I’ve personally vowed several times that I’m done looking into Internet Explorer, but each time, more 0days in the wild pop up and I change my mind.&amp;lt;br&amp;gt;
Additionally, the techniques described here could be applied to any closed-source or even open-source software, not just Internet Explorer. In particular, grammar-based mutational fuzzing described two sections down can be applied to targets other than JavaScript engines by simply changing the input grammar.&amp;lt;br&amp;gt;
Approach 1: Fuzzilli &#43; TinyInst&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/fuzzilli&amp;#34;&amp;gt;Fuzzilli&amp;lt;/a&amp;gt; , as said above , is a state-of-the-art JavaScript engine fuzzer and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/TinyInst&amp;#34;&amp;gt;TinyInst&amp;lt;/a&amp;gt; is a dynamic instrumentation library. Although TinyInst is general-purpose and could be used in other applications, it comes with various features useful for fuzzing, such as out-of-the-box support for persistent fuzzing, various types of coverage instrumentations etc. TinyInst is meant to be simple to integrate with other software, in particular fuzzers, and has already been integrated with some.&amp;lt;br&amp;gt;
So, integrating with Fuzzilli was meant to be simple. However, there were still various challenges to overcome for different reasons:&amp;lt;br&amp;gt;
Challenge 1: Getting Fuzzilli to build on Windows where our targets are.&amp;lt;br&amp;gt;
Fuzzilli was written in Swift and the support for Swift on Windows is currently not great. While &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/compnerd/swift-build&amp;#34;&amp;gt;Swift on Windows&amp;lt;/a&amp;gt; builds exist (I’m linking to the builds by Saleem Abdulrasool instead of the official ones because the latter didn’t work for me), not all features that you would find on Linux and macOS are there. For example, one does not simply run swift build on Windows, as the build system is one of the features that didn’t get ported (yet). Fortunately, CMake and Ninja  support Swift, so the solution to this problem is to switch to the CMake build system. There are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/compnerd/swift-cmake-examples&amp;#34;&amp;gt;helpful examples&amp;lt;/a&amp;gt; on how to do this, once again from Saleem Abdulrasool.&amp;lt;br&amp;gt;
Another feature that didn’t make it to Swift for Windows is statically linking libraries. This means that all libraries (such as those written in C and C&#43;&#43; that the user wants to include in their Swift project) need to be dynamically linked. This goes for libraries already included in the Fuzzilli project, but also for TinyInst. Since TinyInst also uses the CMake build system, my first attempt at integrating TinyInst was to include it via the Fuzzilli CMake project, and simply have it built as a shared library. However, the same tooling that was successful in building Fuzzilli would fail to build TinyInst (probably due to various platform libraries TinyInst uses). That’s why, in the end, TinyInst was being built separately into a .dll and this .dll loaded “manually” into Fuzzilli via the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/libloaderapi/nf-libloaderapi-loadlibrarya&amp;#34;&amp;gt;LoadLibrary&amp;lt;/a&amp;gt; API. This turned out not to be so bad - Swift build tooling for Windows was quite slow, and so it was much faster to only build TinyInst when needed, rather than build the entire Fuzzilli project (even when the changes made were minor).&amp;lt;br&amp;gt;
The Linux/macOS parts of Fuzzilli, of course, also needed to be rewritten. Fortunately, it turned out that the parts that needed to be rewritten were the parts written in C, and the parts written in Swift worked as-is (other than a couple of exceptions, mostly related to networking). As someone with no previous experience with Swift, this was quite a relief. The main parts that needed to be rewritten were the networking library (libsocket), the library used to run and monitor the child process (libreprl) and the library for collecting coverage (libcoverage). The latter two were changed to use TinyInst. Since these are separate libraries in Fuzzilli, but TinyInst handles both of these tasks, some plumbing through Swift code was needed to make sure both of these libraries talk to the same TinyInst instance for a given target.&amp;lt;br&amp;gt;
Challenge 2: Threading woes&amp;lt;br&amp;gt;
Another feature that made the integration less straightforward than hoped for was the use of threading in Swift. TinyInst is built on a custom debugger and, on Windows, it uses the Windows debugging API. One specific feature of the Windows debugging API, for example &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/api/debugapi/nf-debugapi-waitfordebugevent&amp;#34;&amp;gt;WaitForDebugEvent&amp;lt;/a&amp;gt; , is that it does not take a debugee pid or a process handle as an argument. So then, the question is, if you have multiple debugees, to which of them does the API call refer? The answer to that is, when a debugger on Windows attaches to a debugee (or starts a debugee process), the thread that started/attached it is the debugger. Any subsequent calls for that particular debugee need to be issued on that same thread.&amp;lt;br&amp;gt;
In contrast, the preferred Swift coding style (that Fuzzilli also uses) is to take advantage of threading primitives such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.apple.com/documentation/dispatch/dispatchqueue&amp;#34;&amp;gt;DispatchQueue&amp;lt;/a&amp;gt; . When tasks get posted on a DispatchQueue, they can run in parallel on “background” threads. However, with the background threads, there is no guarantee that a certain task is always going to run on the same thread. So it would happen that calls to the same TinyInst instance happened from different threads, thus breaking the Windows debugging model. This is why, for the purposes of this project, TinyInst was modified to create its own thread (one for each target process) and ensure that any debugger calls for a particular child process always happen on that thread.&amp;lt;br&amp;gt;
Various minor changes&amp;lt;br&amp;gt;
Some examples of features Fuzzilli requires that needed to be added to TinyInst are stdin/stdout redirection and a channel for reading out the “status” of JavaScript execution (specifically, to be able to tell if JavaScript code was throwing an exception or executing successfully). Some of these features were already integrated into the “mainline” TinyInst or will be integrated in the future.&amp;lt;br&amp;gt;
After all of that was completed though, the Fuzzilli/Tinyinst hybrid was running in a stable manner:&amp;lt;br&amp;gt;
Note that coverage percentage reported by Fuzzilli is incorrect. Because TinyInst is a dynamic instrumentation library, it cannot know the number of basic blocks/edges in advance.&amp;lt;br&amp;gt;
Primarily because of the current Swift on Windows issues, this closed-source mode of Fuzzilli is not something we want to officially support. However, the sources and the build we used can be downloaded &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drive.google.com/file/d/10q4bIZHYAxQRkEVSk27Z7NPjKNnB6dKq/view&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Approach 2: Grammar-based mutation fuzzing with Jackalope&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/Jackalope&amp;#34;&amp;gt;Jackalope&amp;lt;/a&amp;gt; is a coverage-guided fuzzer I developed for fuzzing black-box binaries on Windows and, recently, macOS. Jackalope initially included mutators suitable for fuzzing of binary formats. However, a key feature of Jackalope is modularity: it is meant to be easy to plug in or replace individual components, including, but not limited to, sample mutators.&amp;lt;br&amp;gt;
After observing how Fuzzilli works more closely during Approach 1, as well as observing samples it generated and the bugs it found, the idea was to extend Jackalope to allow mutational JavaScript fuzzing, but also in the future, mutational fuzzing of other targets whose samples can be described by a context-free grammar.&amp;lt;br&amp;gt;
Jackalope uses a grammar syntax similar to that of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/googleprojectzero/domato&amp;#34;&amp;gt;Domato&amp;lt;/a&amp;gt; , but somewhat simplified (with some features not supported at this time). …</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210914-201149/</link>
      <pubDate>Tue, 14 Sep 2021 20:11:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210914-201149/</guid>
      <description>RIP Norm Macdonald, all-time comedy legend. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/tTNIyKwHBN&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/tTNIyKwHBN&amp;#34;&amp;gt;https://t.co/tTNIyKwHBN&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210914-120722/</link>
      <pubDate>Tue, 14 Sep 2021 12:07:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210914-120722/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/height-2-10-occupation-baby/&amp;#34;&amp;gt;Height: 2ft 10 inches. Occupation: baby&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
14 Sep 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com#parenthood&amp;#34;&amp;gt;Parenthood&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/married-with-kids/&amp;#34;&amp;gt;I got married and had kids so you don&amp;amp;#39;t have to&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210914-081752/</link>
      <pubDate>Tue, 14 Sep 2021 08:17:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210914-081752/</guid>
      <description>(Reuters) -A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that has been in use since at least February, internet security watchdog group Citizen Lab said on Monday. | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/09/14/new-iphone-hack-exposed-in-israeli-spywa?videoId=735412176&amp;amp;newsChannel=&amp;#34;&amp;gt;Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210914-041737/</link>
      <pubDate>Tue, 14 Sep 2021 04:17:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210914-041737/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-apple/cyber-arms-dealer-exploits-new-iphone-software-vulnerability-affecting-most-versions-say-researchers-idUSKBN2G91W2&amp;#34;&amp;gt;Cyber arms dealer exploits new iPhone software vulnerability, affecting most versions, say researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that has been in use since at least February, internet security watchdog group Citizen Lab said on Monday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210914-040655/</link>
      <pubDate>Tue, 14 Sep 2021 04:06:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210914-040655/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/intent/tweet&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/deprocrastinate?ref_src=twsrc%5Etfw&amp;#34;&amp;gt;Follow @deprocrastinate&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/twitter-threads&amp;#34;&amp;gt;Check out our most recent threads!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210914-000659/</link>
      <pubDate>Tue, 14 Sep 2021 00:06:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210914-000659/</guid>
      <description>While last night’s Meris attack on this site was far smaller than the recent Cloudflare DDoS, it was far larger than &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/&amp;#34;&amp;gt;the Mirai DDoS attack&amp;lt;/a&amp;gt; in 2016 that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/&amp;#34;&amp;gt;held KrebsOnSecurity offline for nearly four days&amp;lt;/a&amp;gt; . The traffic deluge from Thursday’s attack on this site was more than four times what Mirai threw at this site five years ago. This latest attack involved more than two million requests-per-second. By comparison, the 2016 Mirai DDoS generated approximately 450,000 requests-per-second.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210913-202233/</link>
      <pubDate>Mon, 13 Sep 2021 20:22:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210913-202233/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com&amp;#34;&amp;gt;Follow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210913-201930/</link>
      <pubDate>Mon, 13 Sep 2021 20:19:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210913-201930/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/usa-cyber-apple/cyber-arms-dealer-exploits-new-apple-iphone-software-vulnerability-affects-most-versions-researchers-idUSKBN2G91W2&amp;#34;&amp;gt;Cyber arms dealer exploits new Apple iPhone software vulnerability; affects most versions - researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that has been in use since February, internet security watchdog group Citizen Lab said on Monday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210913-162138/</link>
      <pubDate>Mon, 13 Sep 2021 16:21:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210913-162138/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/absolute-value/&amp;#34;&amp;gt;absolute value&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/average/&amp;#34;&amp;gt;average&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/derivative/&amp;#34;&amp;gt;derivative&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/median/&amp;#34;&amp;gt;median&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/optimization/&amp;#34;&amp;gt;optimization&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/08/average-and-median-via-optimization/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>the mango zone</title>
      <link>https://www.whatsupup.com/blog/canton/ricketier/20210913-121345/</link>
      <pubDate>Mon, 13 Sep 2021 12:13:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/canton/ricketier/20210913-121345/</guid>
      <description>conference talk videos&amp;lt;br&amp;gt;
Once, an article referred to me as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en_us/article/9a3dkv/tinder-social-lets-you-stalk-your-friends-dating-habits-hack-last-active&amp;#34;&amp;gt;a hacker who goes by the name &amp;amp;quot;Alex&amp;amp;quot;&amp;lt;/a&amp;gt; , so that&amp;#39;s my hacker handle
now and there&amp;#39;s nothing I can do about it.&amp;lt;br&amp;gt;
Sure, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mango.pdf.zone/mango.pdf&amp;#34;&amp;gt;here you go&amp;lt;/a&amp;gt; . It&amp;#39;s got a password on it though. The password is hidden somewhere in this page. Have fun!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210911-121652/</link>
      <pubDate>Sat, 11 Sep 2021 12:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210911-121652/</guid>
      <description>&amp;#39;A message of resilience&amp;#39;: Americans reflect on the 20th anniversary of the Sept. 11 attacks &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/a-message-resilience-americans-reflect-20th-anniversary-sept-11-2021-09-11&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210911-081905/</link>
      <pubDate>Sat, 11 Sep 2021 08:19:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210911-081905/</guid>
      <description>September 11, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/09/11/visurf-announcement.html&amp;#34;&amp;gt;visurf, a web browser based on NetSurf&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210911-041610/</link>
      <pubDate>Sat, 11 Sep 2021 04:16:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210911-041610/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/solarwinds-cyber-sec-exclusive/exclusive-wide-ranging-solarwinds-probe-sparks-fear-in-corporate-america-idUSKBN2G60C6&amp;#34;&amp;gt;Exclusive: Wide-ranging SolarWinds probe sparks fear in Corporate America&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A U.S. Securities and Exchange Commission investigation into the SolarWinds Russian hacking operation has dozens of corporate executives fearful information unearthed in the expanding probe will expose them to liability, according to six people familiar with the inquiry.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/solarwinds-cyber-sec/exclusive-wide-ranging-solarwinds-probe-sparks-fear-in-corporate-america-idUSL1N2QC124&amp;#34;&amp;gt;EXCLUSIVE -Wide-ranging SolarWinds probe sparks fear in Corporate America&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Sept 10 A U.S. Securities and Exchange
Commission investigation into the SolarWinds Russian hacking
operation has dozens of corporate executives fearful information
unearthed in the expanding probe will expose them to liability,
according to six people familiar with the inquiry.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210911-041511/</link>
      <pubDate>Sat, 11 Sep 2021 04:15:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210911-041511/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/six-things-you-should-know-about&amp;#34;&amp;gt;Six things you should know about the Epic v. Apple ruling&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/six-things-you-should-know-about&amp;#34;&amp;gt;A note about the Fortnite maker’s case against the iPhone maker&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Sep 9 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;7&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-newsletter-network-effect/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210911-041024/</link>
      <pubDate>Sat, 11 Sep 2021 04:10:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210911-041024/</guid>
      <description>Scott Kupor &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/skupor&amp;#34;&amp;gt;@skupor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Everything you need to know – or at least I what I thought was interesting – in &amp;amp;lt;100 tweets about the Apple/Epic lawsuit verdict today.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210911-040610/</link>
      <pubDate>Sat, 11 Sep 2021 04:06:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210911-040610/</guid>
      <description>On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The assault came from “ Meris ,” the same new botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer.&amp;lt;br&amp;gt;
Cloudflare recently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/&amp;#34;&amp;gt;wrote about its attack&amp;lt;/a&amp;gt; , which clocked in at 17.2 million bogus requests-per-second. To put that in perspective, Cloudflare serves over 25 million HTTP requests per second on average.&amp;lt;br&amp;gt;
In its Aug. 19 writeup, Cloudflare neglected to assign a name to the botnet behind the attack. But on Thursday DDoS protection firm Qrator Labs &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/&amp;#34;&amp;gt;identified the culprit&amp;lt;/a&amp;gt; — “Meris” — a new monster that first emerged at the end of June 2021.&amp;lt;br&amp;gt;
Qrator says Meris has launched even bigger attacks since: A titanic and ongoing DDoS that hit Russian Internet search giant Yandex last week is estimated to have been launched by roughly 250,000 malware-infected devices globally, sending 21.8 million bogus requests-per-second.&amp;lt;br&amp;gt;
While last night’s Meris attack on this site was far smaller than the recent Cloudflare DDoS, it was far larger than &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/&amp;#34;&amp;gt;the Mirai DDoS attack&amp;lt;/a&amp;gt; in 2016 that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/&amp;#34;&amp;gt;held KrebsOnSecurity offline for nearly four days&amp;lt;/a&amp;gt; . The traffic deluge from Thursday’s attack on this site was was more than four times what Mirai threw at this site five years ago. This latest attack involved more than two million requests-per-second. By comparison, the 2016 Mirai DDoS generated approximately 450,000 requests-per-second.&amp;lt;br&amp;gt;
According to Qrator, which is working with Yandex on combating the attack, Meris appears to be made up of Internet routers produced by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mikrotik.com/&amp;#34;&amp;gt;MikroTik&amp;lt;/a&amp;gt; . Qrator says the United States is home to the most number of MikroTik routers that are potentially vulnerable to compromise by Meris — with more than 42 percent of the world’s MikroTik systems connected to the Internet (followed by China — 18.9 percent– and a long tail of one- and two-percent countries).&amp;lt;br&amp;gt;
The darker areas indicate larger concentrations of potentially vulnerable MikroTik routers. Qrator says there are about 328,000 MikroTik devices currently responding to requests from the Internet. Image: Qrator.&amp;lt;br&amp;gt;
It’s not immediately clear which security vulnerabilities led to these estimated 250,000 MikroTik routers getting hacked by Meris.&amp;lt;br&amp;gt;
“The spectrum of RouterOS versions we see across this botnet varies from years old to recent,” the company wrote. “The largest share belongs to the version of firmware previous to the current stable one.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/#more-56565&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/&amp;#34;&amp;gt;KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210910-122047/</link>
      <pubDate>Fri, 10 Sep 2021 12:20:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210910-122047/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/06/LG-C1&amp;#34;&amp;gt;LG C1&amp;lt;/a&amp;gt; · What happened was, our TV is ten years old and (following on some renovations) we could use one at the cabin for rainy winter     evenings. So I     bought a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.lg.com/us/tvs/lg-oled48c1pub-oled-4k-tv&amp;#34;&amp;gt;48&amp;amp;quot; LG C1&amp;lt;/a&amp;gt; 4K OLED screen (48&amp;amp;quot; is the     smallest in the C1 line), which is kind of this      year’s hot TV. It’s not a life-changer, but the world of TV has shifted some in a decade, so here’s a dispatch from the     front.  Includes a pointer to a truly great TV stand &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/06/LG-C1&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [5 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210910-001504/</link>
      <pubDate>Fri, 10 Sep 2021 00:15:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210910-001504/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-newsletter-network-effect&amp;#34;&amp;gt;The Newsletter Network Effect&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-newsletter-network-effect&amp;#34;&amp;gt;Instead of ‘subscription fatigue,’ we’re probably seeing the opposite.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210909-201847/</link>
      <pubDate>Thu, 09 Sep 2021 20:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210909-201847/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/why-podcasts-are-my-new-wikipedia-the-perfect-41/&amp;#34;&amp;gt;Why Podcasts Are My New Wikipedia —the  Perfect Informal Learning Resource today · In this article, I explain why podcasts replaced a lot of my Wikipedia usage for informal learning. I also talk about how I listen to five-plus hours of podcasts every day! Read more&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210909-201313/</link>
      <pubDate>Thu, 09 Sep 2021 20:13:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210909-201313/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/09/introducing-androids-private-compute.html&amp;#34;&amp;gt;Introducing Android’s Private Compute Services&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Suzanne Frey, VP, Product, Android &amp;amp;amp; Play Security and Privacy&amp;lt;br&amp;gt;
We introduced &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/android/android-12-beta/&amp;#34;&amp;gt;Android’s Private Compute Core&amp;lt;/a&amp;gt; in Android 12 Beta. Today, we&amp;amp;#39;re excited to announce a new suite of services that provide a privacy-preserving bridge between Private Compute Core and the cloud.&amp;lt;br&amp;gt;
Recap: What is Private Compute Core ?&amp;lt;br&amp;gt;
Android’s Private Compute Core is an open source, secure environment that is isolated from the rest of the operating system and apps. With each new Android release we’ll add more privacy-preserving features to the Private Compute Core. Today, these include:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/android/live-caption/&amp;#34;&amp;gt;Live Caption&amp;lt;/a&amp;gt; , which adds captions to any media using Google’s on-device speech recognition&amp;lt;br&amp;gt;
Now Playing, which recognizes music playing nearby and displays the song title and artist name on your device’s lock screen&amp;lt;br&amp;gt;
Smart Reply, which suggests relevant responses based on the conversation you’re having in messaging apps&amp;lt;br&amp;gt;
For these features to be private, they must:&amp;lt;br&amp;gt;
Keep the information on your device private. Android ensures that the sensitive data processed in the Private Compute Core is not shared to any apps without you taking an action. For instance, until you tap a Smart Reply, the OS keeps your reply hidden from both your keyboard and the app you’re typing into.&amp;lt;br&amp;gt;
Let your device use the cloud (to download new song catalogs or speech-recognition models) without compromising your privacy. This is where Private Compute Services comes in.&amp;lt;br&amp;gt;
Introducing Android’s Private Compute Services&amp;lt;br&amp;gt;
Machine learning features often improve by updating models, and Private Compute Services helps features get these updates over a private path. Android prevents any feature inside the Private Compute Core from having direct access to the network. Instead, features communicate over a small set of purposeful open-source APIs to Private Compute Services, which strips out identifying information and uses a set of privacy technologies, including &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ai.googleblog.com/2017/04/federated-learning-collaborative.html&amp;#34;&amp;gt;Federated Learning&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ai.googleblog.com/2020/05/federated-analytics-collaborative-data.html&amp;#34;&amp;gt;Federated Analytics&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Private_information_retrieval&amp;#34;&amp;gt;Private information retrieval&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We will publicly publish the source code for Private Compute Services, so it can be audited by security researchers and other teams outside of Google. This means it can go through the same rigorous security &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/about/appsecurity/android-rewards/&amp;#34;&amp;gt;programs&amp;lt;/a&amp;gt; that ensure the safety of the Android platform.&amp;lt;br&amp;gt;
We’re enthusiastic about the potential for machine learning to power more helpful features inside Android, and Android’s Private Compute Core will help users benefit from these features while strengthening privacy protections via the new Private Compute Services. Android is the first open source mobile OS to include this kind of externally verifiable privacy; Private Compute Services helps the Android OS continue to innovate in machine learning, while also maintaining the highest standards of privacy and security.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/android&amp;#34;&amp;gt;android&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/android%20security&amp;#34;&amp;gt;android security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/private%20compute%20core&amp;#34;&amp;gt;private compute core&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210909-200732/</link>
      <pubDate>Thu, 09 Sep 2021 20:07:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210909-200732/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/ten-tips-to-help-your-college-club-bloom-on-discord-f231dd462d87?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Ten Tips to Help Your College Club Bloom on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/ten-tips-to-help-your-college-club-bloom-on-discord-f231dd462d87?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Ten Tips to Help Your College Club Bloom on Discord Whether your club lives on Discord, you use Discord as a supporting tool for an IRL club, here are ten tips to help your server succeed.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210909-161751/</link>
      <pubDate>Thu, 09 Sep 2021 16:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210909-161751/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/09/competitive-programming-in-haskell-kadanes-algorithm/&amp;#34;&amp;gt;Competitive programming in Haskell: Kadane’s algorithm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210909-161730/</link>
      <pubDate>Thu, 09 Sep 2021 16:17:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210909-161730/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/09/technology/facebook-wayfarer-stories-smart-glasses.html&amp;#34;&amp;gt;Smart Glasses Made Google Look Dumb. Now Facebook Is Giving Them a Try. The company has teamed up with Ray-Ban to create glasses that can take photos, record video, answer phone calls and play podcasts. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-161539/</link>
      <pubDate>Thu, 09 Sep 2021 16:15:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-161539/</guid>
      <description>Biden to require all federal workers to be vaccinated against COVID &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/biden-require-all-federal-workers-be-vaccinated-source-2021-09-09/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210909-121836/</link>
      <pubDate>Thu, 09 Sep 2021 12:18:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210909-121836/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/09/competitive-programming-in-haskell-kadanes-algorithm/&amp;#34;&amp;gt;Competitive programming in Haskell: Kadane’s algorithm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I will be giving a talk on competitive programming in Haskell tomorrow, September 10, at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://haskell.love/&amp;#34;&amp;gt;Haskell Love&amp;lt;/a&amp;gt; . You should attend! It’s free!&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/&amp;#34;&amp;gt;my last competitive programming post&amp;lt;/a&amp;gt; , I challenged you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/purplerain&amp;#34;&amp;gt;Purple Rain&amp;lt;/a&amp;gt; . We are presented with a linear sequence of cells, each colored either red or blue, and we are supposed to find the (contiguous) segment of cells with the maximal absolute difference between the number of red and blue. For example, below is shown one of the sample inputs, with the solution highlighted: the segment from cell 3 to cell 7 (the cells are numbered from 1) has four red cells compared to only one blue, for an absolute difference of three. You can verify that no other segment does better.&amp;lt;br&amp;gt;
Transforming the problem&amp;lt;br&amp;gt;
The obvious way to do this is to generate a list of all segments, compute the absolute difference between the number of red and blue cells for each, and take the maximum. However, that approach is doomed to exceed the time limit in any programming language: it would take time ( possible segments times to sum each one), and the problem states that can be up to . With operations per second as a good rule of thumb, with is clearly too slow. (In fact, any time you see an input size of , it is a dead giveaway that you are expected to find an or solution. is big enough to make an solution prohibitively slow, but not so big that I/O itself becomes the bottleneck.)&amp;lt;br&amp;gt;
The first insight is that we can transform this into the classic problem of finding the maximum sum subarray (also known as the maximum segment sum ; either way I will abbreviate it as MSS) in two steps: first, turn each red cell into a 1, and each blue into -1. The sum of a segment then tells us how many more red than blue cells there are. Now, we actually want the biggest absolute difference between red and blue; but if we have an algorithm to find the MSS we can just run it twice: once to find the maximum excess of red over blue, and again with 1 and -1 flipped to find the maximum excess of blue over red.&amp;lt;br&amp;gt;
The MSS problem has a long history in the functional programming community, being one of the flagship problems to demonstrate the techniques of program derivation in the style of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Bird%E2%80%93Meertens_formalism&amp;#34;&amp;gt;Bird-Meertens Formalism, aka Squiggol&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.goodreads.com/book/show/2727190-algebra-of-programming&amp;#34;&amp;gt;The Algebra of Programming&amp;lt;/a&amp;gt; . It is possible to start out with a naive-but-obviously-correct implementation, and do a series of equational transformations to turn it into an efficient algorithm! If you’ve never seen that kind of thing before, I highly recommend checking it out; the Wikipedia page on the Bird-Meertens Formalism, linked above, is a good place to start. Certainly getting good at such derivations can be a handy skill when doing competitive programming in Haskell. But in any case, today I want to approach the problem from a different point of view, namely, coming up with a good functional equivalent to an existing imperative algorithm.&amp;lt;br&amp;gt;
Kadane’s algorithm&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Maximum_subarray_problem#Kadane&amp;#39;s_algorithm&amp;#34;&amp;gt;Kadane’s algorithm&amp;lt;/a&amp;gt; , first proposed by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.stat.cmu.edu/~kadane/&amp;#34;&amp;gt;Jay Kadane&amp;lt;/a&amp;gt; sometime in the late 1970s, is a linear-time algorithm for solving the MSS problem. It is actually quite simple to implement (the tricky part is understanding why it works!).&amp;lt;br&amp;gt;
The idea is to loop through an array while keeping track of two things: a current value&amp;lt;br&amp;gt;
cur&amp;lt;br&amp;gt;
, and a&amp;lt;br&amp;gt;
best&amp;lt;br&amp;gt;
value. The&amp;lt;br&amp;gt;
value is just the greatest value&amp;lt;br&amp;gt;
has ever taken on, so keeping it updated is easy: on every loop, we compare&amp;lt;br&amp;gt;
, and save the value of&amp;lt;br&amp;gt;
into&amp;lt;br&amp;gt;
if it is higher. To keep&amp;lt;br&amp;gt;
updated, we simply add each new array value to it—but if it ever falls below zero, we just reset&amp;lt;br&amp;gt;
to zero. Here is some Java code:&amp;lt;br&amp;gt;
public static int kadane ( int [] a) { int best = 0 , cur = 0 ; for ( int i = 0 ; i &amp;amp;lt; a. length ; i&#43;&#43;) {
        cur &#43;= a[i]; if (cur &amp;amp;lt; 0 ) cur = 0 ; if (cur &amp;amp;gt; best) best = cur;
    } return best;
}&amp;lt;br&amp;gt;
Again, it is not at all obvious why this works, though putting in the effort to understand a proof is well worth the time. That is not the purpose of this blog post, however, so I’ll leave you to read about it on your own!&amp;lt;br&amp;gt;
Translating Kadane’s algorithm to Haskell&amp;lt;br&amp;gt;
In the imperative version, we iterate through a list, keep track of a current value, and also keep track of the best value we have seen so far. It is possible to translate this directly to Haskell: create a record with two fields, one for the current thing and one for the best thing, then iterate through the list with&amp;lt;br&amp;gt;
foldl&amp;amp;#39;&amp;lt;br&amp;gt;
, doing the appropriate update at each step:&amp;lt;br&amp;gt;
data State s = State { curThing :: s , bestThing :: s } -- Given a way to update the current s value with the next list -- element of type a, update a State s value which keeps track of the -- current s value as well as the best s value seen so far. step :: Ord s =&amp;amp;gt; ( s -&amp;amp;gt; a -&amp;amp;gt; s ) -&amp;amp;gt; ( State s -&amp;amp;gt; a -&amp;amp;gt; State s ) step update ( State cur best ) a = State next ( max best next ) where next = update cur a bestIntermediate :: Ord s =&amp;amp;gt; ( s -&amp;amp;gt; a -&amp;amp;gt; s ) -&amp;amp;gt; s -&amp;amp;gt; [ a ] -&amp;amp;gt; s bestIntermediate update init = bestThing . foldl&amp;amp;#39; ( step update ) ( State init init )&amp;lt;br&amp;gt;
But there’s a much better way! Note that the&amp;lt;br&amp;gt;
update&amp;lt;br&amp;gt;
function has the right type to be used with&amp;lt;br&amp;gt;
. But if we just computed&amp;lt;br&amp;gt;
foldl&amp;amp;#39; update init&amp;lt;br&amp;gt;
directly, we would get only the single&amp;lt;br&amp;gt;
s&amp;lt;br&amp;gt;
value at the very end. But our goal is to get the best out of all the intermediate values. No problem: a scan is just a fold that returns all the intermediate values instead of only the final one! So instead of all this complicated and quasi-imperative&amp;lt;br&amp;gt;
stuff, we just do a&amp;lt;br&amp;gt;
scanl&amp;amp;#39;&amp;lt;br&amp;gt;
followed by taking the&amp;lt;br&amp;gt;
bestIntermediate :: Ord s =&amp;amp;gt; ( s -&amp;amp;gt; a -&amp;amp;gt; s ) -&amp;amp;gt; s -&amp;amp;gt; [ a ] -&amp;amp;gt; s bestIntermediate update init = maximum . scanl&amp;amp;#39; update init&amp;lt;br&amp;gt;
Ah, much better! Using&amp;lt;br&amp;gt;
bestIntermediate&amp;lt;br&amp;gt;
, we can now translate Kadane’s algorithm as follows:&amp;lt;br&amp;gt;
kadane1 :: [ Int ] -&amp;amp;gt; Int kadane1 = bestIntermediate next 0 where next s a = max 0 ( s &#43; a )&amp;lt;br&amp;gt;
Whenever I write down an algorithm like this in Haskell— especially if I have “translated” it from an existing, imperative algorithm—I like to figure out how I can generalize it as much as possible. What structure is assumed of the inputs that makes the algorithm work? Can we replace some concrete monomorphic types with polymorphic ones? What type class constraints are needed? Often these sorts of generalizations make for supposedly tricky competitive programming problems. For example, if you have only ever seen Dijkstra’s algorithm presented in terms of finding shortest paths by summing edge weights, it takes quite a bit of insight to realize that the algorithm really just finds the “best” path with respect to operations that play nicely with each other in certain ways. For example, if we use the operations&amp;lt;br&amp;gt;
in place of&amp;lt;br&amp;gt;
(&#43;)&amp;lt;br&amp;gt;
, Dijkstra’s algorithm finds the path with the maximum bottleneck. (This will probably end up being its own blog post at some point…)&amp;lt;br&amp;gt;
Anyway, how can we generalize&amp;lt;br&amp;gt;
kadane1&amp;lt;br&amp;gt;
? The obvious starting point is that if we just let GHC infer a type for&amp;lt;br&amp;gt;
, we would get something more general:&amp;lt;br&amp;gt;
kadane2 :: ( Num a , Ord a ) =&amp;amp;gt; [ a ] -&amp;amp;gt; a kadane2 = bestIntermediate next 0 where next s a = max 0 ( s &#43; a )&amp;lt;br&amp;gt;
The only thing we do with the input list elements is add them and compare them; we also need&amp;lt;br&amp;gt;
to have the same type as the input list elements. So the algorithm works for anything that has&amp;lt;br&amp;gt;
instances.&amp;lt;br&amp;gt;
But wait—do we really need&amp;lt;br&amp;gt;
if all we are using is&amp;lt;br&amp;gt;
&#43;&amp;lt;br&amp;gt;
? Really we are using the monoid of integers under addition. So we can generalize again, to any ordered monoid:&amp;lt;br&amp;gt;
kadane :: ( Monoid a , Ord a ) =&amp;amp;gt; [ a ] -&amp;amp;gt; a kadane = bestIntermediate next mempty where next s a = max mempty ( s &amp;amp;lt;&amp;amp;gt; a )&amp;lt;br&amp;gt;
In fact, if you study the proof of Kadane’s algorithm, you will see that this works just so long as the monoid operation interacts nicely with the ordering, that is, if implies and for all (this is what is usually meant by an “ordered monoid”).&amp;lt;br&amp;gt;
Finding the best segment&amp;lt;br&amp;gt;
So far, our code finds the best segment sum, but it doesn’t tell us which segment it was that was best—and for this problem we are actually supposed to output the starting and ending indices of the best segment, not the maximum red-blue difference itself.&amp;lt;br&amp;gt;
If I were doing this in Java, I would probably just add several more variables: one to record where the segment currently being considered starts (which gets reset to&amp;lt;br&amp;gt;
i&#43;1&amp;lt;br&amp;gt;
when&amp;lt;br&amp;gt;
is reset to&amp;lt;br&amp;gt;
), and two to record the start and end indices of the&amp;lt;br&amp;gt;
segment so far. This gets kind of ugly. Conceptually, the values actually belong in triples representing a segment: the start and end index together with the sum. In Java, it would be too heavyweight to construct a&amp;lt;br&amp;gt;
class&amp;lt;br&amp;gt;
to store these three values together, so in practice I would just do it with a mess of individual variables as described above. Fortunately, in Haskell, this is very lightweight, and we should of course create a data type to represent a segment.&amp;lt;br&amp;gt;
It’s also worth noting that in Haskell, we were naturally led to make a polymorphic&amp;lt;br&amp;gt;
function, which will work just as well with a segment type as it does&amp;lt;br&amp;gt;
. Only our&amp;lt;br&amp;gt;
kadane&amp;lt;br&amp;gt;
function itself will have to change. We will make a data type to represent segments, with an appropriate&amp;lt;br&amp;gt;
instance to specify when one segment is better than another, and we will update the&amp;lt;br&amp;gt;
next&amp;lt;br&amp;gt;
helper function to update a segment instead of just updating a sum.&amp;lt;br&amp;gt;
So let’s get started! First, some&amp;lt;br&amp;gt;
pragmas and imports we will need, and a basic solution framework.&amp;lt;br&amp;gt;
{-# LANGUAGE DerivingStrategies         #-} {-# LANGUAGE DerivingVia                #-} {-# LANGUAGE GeneralizedNewtypeDeriving #-} {-# LANGUAGE LambdaCase                 #-} {-# LANGUAGE ViewPatterns               #-} import Control.Arrow ( ( &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; ) ) import Data.ByteString.Char8 ( ByteString ) import qualified Data.ByteString.Char8 as C import Data.List ( scanl&amp;amp;#39; ) import Data.Semigroup showB :: Show a =&amp;amp;gt; a -&amp;amp;gt; C.ByteString showB = show &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.pack main = C.interact $ solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; format&amp;lt;br&amp;gt;
Next, a data type to represent a segment, along with an&amp;lt;br&amp;gt;
instance, and a function to …</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210909-121446/</link>
      <pubDate>Thu, 09 Sep 2021 12:14:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210909-121446/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02464-z&amp;#34;&amp;gt;Daily briefing: Made-up words communicate across cultures&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Nonsense sounds can convey concepts to people around the world. Plus, Mars rover finally collects its first rock core and how science is supporting climate lawsuits.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-041556/</link>
      <pubDate>Thu, 09 Sep 2021 04:15:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-041556/</guid>
      <description>Sep 08 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-001725/</link>
      <pubDate>Thu, 09 Sep 2021 00:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210909-001725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/microsoft-security/microsoft-warns-azure-customers-of-flaw-that-could-have-permitted-hackers-access-to-data-idUSKBN2G42EK&amp;#34;&amp;gt;Microsoft warns Azure customers of flaw that could have permitted hackers access to data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -Microsoft warned some of its Azure cloud computing customers that a flaw discovered by security researchers could have allowed hackers access to their data.&amp;lt;br&amp;gt;
SAN FRANCISCO (Reuters) -A misinformation campaign on social media in support of Chinese government interests has expanded to new languages and platforms, and it even tried to get people to show up to protests in the United States, researchers said on Wednesday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210909-001346/</link>
      <pubDate>Thu, 09 Sep 2021 00:13:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210909-001346/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/01/How-Much-Range&amp;#34;&amp;gt;How Much Range?&amp;lt;/a&amp;gt; · When someone wants to talk to me about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/What/The%20World/Jaguar%20Diary/&amp;#34;&amp;gt;my car&amp;lt;/a&amp;gt; , invariably the first question is some variation on “How far can     you go on a charge?”  The next is “How long does it take to charge?”     Ladies, gentlemen, and other flavors, please take note. These questions are wrong. I’m here today to explain why, and suggest what the right ones are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/09/01/How-Much-Range&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [2 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210908-202010/</link>
      <pubDate>Wed, 08 Sep 2021 20:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210908-202010/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/09/08/implementing-hindley-milner-with-the-unification-fd-library/&amp;#34;&amp;gt;Implementing Hindley-Milner with the unification-fd library&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
For a current project, I needed to implement type inference for a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Hindley%E2%80%93Milner_type_system&amp;#34;&amp;gt;Hindley-Milner&amp;lt;/a&amp;gt; -based type system. (More about that project in an upcoming post!) If you don’t know, Hindley-Milner is what you get when you add polymorphism to the simply typed lambda calculus, but only allow to show up at the very outermost layer of a type. This is the fundamental basis for many real-world type systems ( e.g. OCaml or Haskell without&amp;lt;br&amp;gt;
RankNTypes&amp;lt;br&amp;gt;
enabled).&amp;lt;br&amp;gt;
One of the core operations in any Hindley-Milner type inference algorithm is unification , where we take two types that might contain unification variables (think “named holes”) and try to make them equal, which might fail, or might provide more information about the values that the unification variables should take. For example, if we try to unify&amp;lt;br&amp;gt;
a -&amp;amp;gt; Int&amp;lt;br&amp;gt;
Char -&amp;amp;gt; b&amp;lt;br&amp;gt;
, we will learn that&amp;lt;br&amp;gt;
a = Char&amp;lt;br&amp;gt;
b = Int&amp;lt;br&amp;gt;
; on the other hand, trying to unify&amp;lt;br&amp;gt;
(b, Char)&amp;lt;br&amp;gt;
will fail, because there is no way to make those two types equal (the first is a function type whereas the second is a pair).&amp;lt;br&amp;gt;
I’ve implemented this from scratch before, and it was a great learning experience, but I wasn’t looking forward to implementing it again. But then I remembered the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/unification-fd&amp;#34;&amp;gt;unification-fd library&amp;lt;/a&amp;gt; and wondered whether I could use it to simplify the implementation. Long story short, although the documentation for&amp;lt;br&amp;gt;
unification-fd&amp;lt;br&amp;gt;
claims it can be used to implement Hindley-Milner, I couldn’t find any examples online, and apparently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/wrengr/unification-fd/issues/17&amp;#34;&amp;gt;neither could anyone else&amp;lt;/a&amp;gt; . So I set out to make my own example, and you’re reading it. It turns out that&amp;lt;br&amp;gt;
is incredibly powerful, but using it can be a bit finicky, so I hope this example can be helpful to others who wish to use it. Along the way, resources I found especially helpful include &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://winterkoninkje.dreamwidth.org/100478.html&amp;#34;&amp;gt;this basic unification-fd tutorial&amp;lt;/a&amp;gt; by the author, Wren Romano, as well as a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ro-che.info/articles/2017-06-17-generic-unification&amp;#34;&amp;gt;blog post by Roman Cheplyaka&amp;lt;/a&amp;gt; , and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackage.haskell.org/package/unification-fd&amp;#34;&amp;gt;unification-fd Haddock documentation&amp;lt;/a&amp;gt; itself. I also referred to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Hindley%E2%80%93Milner_type_system&amp;#34;&amp;gt;Wikipedia page on Hindley-Milner&amp;lt;/a&amp;gt; , which is extremely thorough.&amp;lt;br&amp;gt;
This blog post is rendered automatically from a literate Haskell file; you can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/hm-unification-fd&amp;#34;&amp;gt;find the complete working source code and blog post on GitHub&amp;lt;/a&amp;gt; . I’m always happy to receive comments, fixes, or suggestions for improvement.&amp;lt;br&amp;gt;
Prelude: A Bunch of Extensions and Imports&amp;lt;br&amp;gt;
We will make GHC and other people’s libraries work very hard for us. You know the drill.&amp;lt;br&amp;gt;
&amp;amp;gt; {-# LANGUAGE DeriveAnyClass        #-} &amp;amp;gt; {-# LANGUAGE DeriveFoldable        #-} &amp;amp;gt; {-# LANGUAGE DeriveFunctor         #-} &amp;amp;gt; {-# LANGUAGE DeriveGeneric         #-} &amp;amp;gt; {-# LANGUAGE DeriveTraversable     #-} &amp;amp;gt; {-# LANGUAGE FlexibleContexts      #-} &amp;amp;gt; {-# LANGUAGE FlexibleInstances     #-} &amp;amp;gt; {-# LANGUAGE GADTs                 #-} &amp;amp;gt; {-# LANGUAGE LambdaCase            #-} &amp;amp;gt; {-# LANGUAGE MultiParamTypeClasses #-} &amp;amp;gt; {-# LANGUAGE PatternSynonyms       #-} &amp;amp;gt; {-# LANGUAGE StandaloneDeriving    #-} &amp;amp;gt; {-# LANGUAGE UndecidableInstances  #-} &amp;amp;gt; &amp;amp;gt; import Control.Category ( ( &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; ) ) &amp;amp;gt; import Control.Monad.Except &amp;amp;gt; import Control.Monad.Reader &amp;amp;gt; import Data.Foldable ( fold ) &amp;amp;gt; import Data.Functor.Identity &amp;amp;gt; import Data.List ( intercalate ) &amp;amp;gt; import Data.Map ( Map ) &amp;amp;gt; import qualified Data.Map as M &amp;amp;gt; import Data.Maybe &amp;amp;gt; import Data.Set ( Set , ( \\ ) ) &amp;amp;gt; import qualified Data.Set as S &amp;amp;gt; import Prelude hiding ( lookup ) &amp;amp;gt; import Text.Printf &amp;amp;gt; &amp;amp;gt; import Text.Parsec &amp;amp;gt; import Text.Parsec.Expr &amp;amp;gt; import Text.Parsec.Language ( emptyDef ) &amp;amp;gt; import Text.Parsec.String &amp;amp;gt; import qualified Text.Parsec.Token as L &amp;amp;gt; &amp;amp;gt; import Control.Unification hiding ( ( =:= ) , applyBindings ) &amp;amp;gt; import qualified Control.Unification as U &amp;amp;gt; import Control.Unification.IntVar &amp;amp;gt; import Data.Functor.Fixedpoint &amp;amp;gt; &amp;amp;gt; import GHC.Generics ( Generic1 ) &amp;amp;gt; &amp;amp;gt; import System.Console.Repline&amp;lt;br&amp;gt;
Representing our types&amp;lt;br&amp;gt;
We’ll be implementing a language with lambas, application, and let-expressions—as well as natural numbers with an addition operation, just to give us a base type and something to do with it. So we will have a natural number type and function types, along with polymorphism, i.e. type variables and&amp;lt;br&amp;gt;
forall&amp;lt;br&amp;gt;
. (Adding more features like sum and product types, additional base types, recursion, etc. is left as an exercise for the reader!)&amp;lt;br&amp;gt;
So notionally, we want something like this:&amp;lt;br&amp;gt;
type Var = String data Type = TyVar Var | TyNat | TyFun Type Type&amp;lt;br&amp;gt;
However, when using&amp;lt;br&amp;gt;
, we have to encode our&amp;lt;br&amp;gt;
Type&amp;lt;br&amp;gt;
data type ( i.e. the thing we want to do unification on) using a “two-level type” (see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.500&amp;#34;&amp;gt;Tim Sheard’s original paper&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
&amp;amp;gt; type Var = String &amp;amp;gt; data TypeF a = TyVarF Var | TyNatF | TyFunF a a &amp;amp;gt; deriving ( Show , Eq , Functor , Foldable , Traversable , Generic1 , Unifiable ) &amp;amp;gt; &amp;amp;gt; type Type = Fix TypeF&amp;lt;br&amp;gt;
TypeF&amp;lt;br&amp;gt;
is a “structure functor” that just defines a single level of structure; notice&amp;lt;br&amp;gt;
is not recursive at all, but uses the type parameter&amp;lt;br&amp;gt;
to mark the places where a recursive instance would usually be.&amp;lt;br&amp;gt;
provides a&amp;lt;br&amp;gt;
Fix&amp;lt;br&amp;gt;
type to “tie the knot” and make it recursive. (I’m not sure why&amp;lt;br&amp;gt;
defines its own&amp;lt;br&amp;gt;
type instead of using the one from&amp;lt;br&amp;gt;
Data.Fix&amp;lt;br&amp;gt;
, but perhaps the reason is that it was written before&amp;lt;br&amp;gt;
existed—&amp;lt;br&amp;gt;
was first published in 2007!)&amp;lt;br&amp;gt;
We have to derive a whole bunch of instances for&amp;lt;br&amp;gt;
which fortunately we get for free. Note in particular&amp;lt;br&amp;gt;
Generic1&amp;lt;br&amp;gt;
Unifiable&amp;lt;br&amp;gt;
is a type class from&amp;lt;br&amp;gt;
which describes how to match up values of our type. Thanks to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ro-che.info/articles/2017-06-17-generic-unification&amp;#34;&amp;gt;work of Roman Cheplyaka&amp;lt;/a&amp;gt; , there is a default implementation for&amp;lt;br&amp;gt;
based on a&amp;lt;br&amp;gt;
instance—which GHC derives for us in turn—and the default implementation works great for our purposes.&amp;lt;br&amp;gt;
also provides a second type for tying the knot, called&amp;lt;br&amp;gt;
UTerm&amp;lt;br&amp;gt;
, defined like so:&amp;lt;br&amp;gt;
data UTerm t v = UVar ! v -- ^ A unification variable. | UTerm ! ( t ( UTerm t v ) ) -- ^ Some structure containing subterms.&amp;lt;br&amp;gt;
It’s similar to&amp;lt;br&amp;gt;
, except it also adds unification variables of some type&amp;lt;br&amp;gt;
v&amp;lt;br&amp;gt;
. (If it means anything to you, note that&amp;lt;br&amp;gt;
is actually the free monad over&amp;lt;br&amp;gt;
t&amp;lt;br&amp;gt;
.) We also define a version of&amp;lt;br&amp;gt;
, which we will use during type inference:&amp;lt;br&amp;gt;
&amp;amp;gt; type UType = UTerm TypeF IntVar&amp;lt;br&amp;gt;
IntVar&amp;lt;br&amp;gt;
is a type provided by&amp;lt;br&amp;gt;
representing variables as&amp;lt;br&amp;gt;
values, with a mapping from variables to bindings stored in an&amp;lt;br&amp;gt;
IntMap&amp;lt;br&amp;gt;
also provies an&amp;lt;br&amp;gt;
STVar&amp;lt;br&amp;gt;
type which implements variables via&amp;lt;br&amp;gt;
STRef&amp;lt;br&amp;gt;
s; I presume using&amp;lt;br&amp;gt;
s would be faster (since no intermediate lookups in an&amp;lt;br&amp;gt;
are required) but forces us to work in the&amp;lt;br&amp;gt;
monad. For now I will just stick with&amp;lt;br&amp;gt;
, which makes things simpler.&amp;lt;br&amp;gt;
At this point you might wonder: why do we have type variables in our definition of&amp;lt;br&amp;gt;
, but also use&amp;lt;br&amp;gt;
to add unification variables? Can’t we just get rid of the&amp;lt;br&amp;gt;
TyVarF&amp;lt;br&amp;gt;
constructor, and let&amp;lt;br&amp;gt;
provide the variables? Well, type variables and unification variables are subtly different, though intimately related. A type variable is actually part of a type, whereas a unification variable is not itself a type, but only stands for some type which is (as yet) unknown. After we are completely done with type inference, we won’t have a&amp;lt;br&amp;gt;
any more, but we might have a type like&amp;lt;br&amp;gt;
forall a. a -&amp;amp;gt; a&amp;lt;br&amp;gt;
which still contains type variables, so we need a way to represent them. We could only get rid of the&amp;lt;br&amp;gt;
constructor if we were doing type inference for a language without polymorphism (and yes, unification could still be helpful in such a situation—for example, to do full type reconstruction for the simply typed lambda calculus, where lambdas do not have type annotations).&amp;lt;br&amp;gt;
Polytype&amp;lt;br&amp;gt;
represents a polymorphic type, with a&amp;lt;br&amp;gt;
at the front and a list of bound type variables (note that regular monomorphic types can be represented as&amp;lt;br&amp;gt;
Forall [] ty&amp;lt;br&amp;gt;
). We don’t need to make an instance of&amp;lt;br&amp;gt;
for&amp;lt;br&amp;gt;
, since we never unify polytypes, only (mono)types. However, we can have polytypes with unification variables in them, so we need two versions, one containing a&amp;lt;br&amp;gt;
and one containing a&amp;lt;br&amp;gt;
UType&amp;lt;br&amp;gt;
&amp;amp;gt; data Poly t = Forall [ Var ] t &amp;amp;gt; deriving ( Eq , Show , Functor ) &amp;amp;gt; type Polytype = Poly Type &amp;amp;gt; type UPolytype = Poly UType&amp;lt;br&amp;gt;
Finally, for convenience, we can make a bunch of pattern synonyms that let us work with&amp;lt;br&amp;gt;
just as if they were directly recursive types. This isn’t required; I just like not having to write&amp;lt;br&amp;gt;
everywhere.&amp;lt;br&amp;gt;
&amp;amp;gt; pattern TyVar :: Var -&amp;amp;gt; Type &amp;amp;gt; pattern TyVar v = Fix ( TyVarF v ) &amp;amp;gt; &amp;amp;gt; pattern TyNat :: Type &amp;amp;gt; pattern TyNat = Fix TyNatF &amp;amp;gt; &amp;amp;gt; pattern TyFun :: Type -&amp;amp;gt; Type -&amp;amp;gt; Type &amp;amp;gt; pattern TyFun t1 t2 = Fix ( TyFunF t1 t2 ) &amp;amp;gt; &amp;amp;gt; pattern UTyNat :: UType &amp;amp;gt; pattern UTyNat = UTerm TyNatF &amp;amp;gt; &amp;amp;gt; pattern UTyFun :: UType -&amp;amp;gt; UType -&amp;amp;gt; UType &amp;amp;gt; pattern UTyFun t1 t2 = UTerm ( TyFunF t1 t2 ) &amp;amp;gt; &amp;amp;gt; pattern UTyVar :: Var -&amp;amp;gt; UType &amp;amp;gt; pattern UTyVar v = UTerm ( TyVarF v )&amp;lt;br&amp;gt;
Expressions&amp;lt;br&amp;gt;
Here’s a data type to represent expressions. There’s nothing much interesting to see here, since we don’t need to do anything fancy with expressions. Note that lambdas don’t have type annotations, but&amp;lt;br&amp;gt;
let&amp;lt;br&amp;gt;
-expressions can have an optional polytype annotation, which will let us talk about checking polymorphic types in addition to inferring them (a lot of presentations of Hindley-Milner don’t talk about this).&amp;lt;br&amp;gt;
&amp;amp;gt; data Expr where &amp;amp;gt; EVar :: Var -&amp;amp;gt; Expr &amp;amp;gt; EInt :: Integer -&amp;amp;gt; Expr &amp;amp;gt; EPlus :: Expr -&amp;amp;gt; Expr -&amp;amp;gt; Expr &amp;amp;gt; ELam :: Var -&amp;amp;gt; Expr -&amp;amp;gt; Expr &amp;amp;gt; EApp :: Expr -&amp;amp;gt; Expr -&amp;amp;gt; Expr &amp;amp;gt; ELet :: Var -&amp;amp;gt; Maybe Polytype -&amp;amp;gt; Expr -&amp;amp;gt; Expr -&amp;amp;gt; Expr&amp;lt;br&amp;gt;
Normally at this point we would write parsers and pretty-printers for types and expressions, but that’s boring and has very little to do with&amp;lt;br&amp;gt;
, so I’ve left those to the end. Let’s get on with the interesting bits!&amp;lt;br&amp;gt;
Type inference infrastructure&amp;lt;br&amp;gt;
Before we get to the type inference algorithm proper, we’ll need to develop a bunch of infrastructure. First, here’s the concrete monad we will be using for type inference. The&amp;lt;br&amp;gt;
ReaderT Ctx&amp;lt;br&amp;gt;
will keep track of variables and their types;&amp;lt;br&amp;gt;
ExceptT TypeError&amp;lt;br&amp;gt;
of course allows us to fail with type errors; and&amp;lt;br&amp;gt;
IntBindingT&amp;lt;br&amp;gt;
is a monad transformer provided by&amp;lt;br&amp;gt;
which supports various …</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-201700/</link>
      <pubDate>Wed, 08 Sep 2021 20:17:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-201700/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/china-cyber-usa/refile-pro-china-social-media-campaign-expands-to-new-countries-blames-u-s-for-covid-idUSL1N2Q91EU&amp;#34;&amp;gt;REFILE-Pro-China social media campaign expands to new countries, blames U.S. for COVID&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210908-161822/</link>
      <pubDate>Wed, 08 Sep 2021 16:18:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210908-161822/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/09/time-for-a-review-of-firefox-92/&amp;#34;&amp;gt;Time for a review of Firefox 92 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/09/time-for-a-review-of-firefox-92/&amp;#34;&amp;gt;Time for a review of Firefox 92&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Release time comes around so quickly! This month we have quite a few CSS updates, along with the new Object.hasOwn() static method for JavaScript.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-161708/</link>
      <pubDate>Wed, 08 Sep 2021 16:17:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-161708/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/china-cyber-usa/pro-china-social-media-campaign-expands-to-new-countries-blames-u-s-for-covid-idUSL1N2Q91EU&amp;#34;&amp;gt;Pro-China social media campaign expands to new countries, blames U.S. for COVID&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO, Sept 8 A misinformation campaign
on social media in support of Chinese government interests has
expanded to new languages and platforms, and it even tried to
get people to show up to protests in the United States,
researchers said on Wednesday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210908-160628/</link>
      <pubDate>Wed, 08 Sep 2021 16:06:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210908-160628/</guid>
      <description>Microsoft Corp. warns that attackers are exploiting a previously unknown vulnerability in Windows 10 and many Windows Server versions to seize control over PCs when users open a malicious document or visit a booby-trapped website. There is currently no official patch for the flaw, but Microsoft has released recommendations for mitigating the threat.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444&amp;#34;&amp;gt;a security advisory&amp;lt;/a&amp;gt; from Redmond, the security hole &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://us-cert.cisa.gov/ncas/current-activity/2021/09/07/microsoft-releases-mitigations-and-workarounds-cve-2021-40444&amp;#34;&amp;gt;CVE-2021-40444&amp;lt;/a&amp;gt; affects the “MSHTML” component of Internet Explorer (IE) on Windows 10 and many Windows Server versions. IE been slowly abandoned for more recent Windows browsers like Edge , but the same vulnerable component also is used by Microsoft Office applications for rendering web-based content.&amp;lt;br&amp;gt;
“An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine,” Microsoft wrote. “The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.”&amp;lt;br&amp;gt;
Microsoft has not yet released a patch for CVE-2021-40444, but says users can mitigate the threat from this flaw by disabling the installation of all ActiveX controls in IE. Microsoft says the vulnerability is currently being used in targeted attacks, although its advisory credits three different entities with reporting the flaw.&amp;lt;br&amp;gt;
On of the researchers credited — EXPMON — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/EXPMON_/status/1435310341689331721&amp;#34;&amp;gt;said on Twitter&amp;lt;/a&amp;gt; that it had reproduced the attack on the latest Office 2019 / Office 365 on Windows 10.&amp;lt;br&amp;gt;
“The exploit uses logical flaws so the exploitation is perfectly reliable (&amp;amp;amp; dangerous),” EXPMON tweeted.&amp;lt;br&amp;gt;
Windows users could see an official fix for the bug as soon as September 14, when Microsoft is slated to release its monthly “Patch Tuesday” bundle of security updates. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-attackers-exploiting-windows-zero-day-flaw/#more-56914&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/microsoft-attackers-exploiting-windows-zero-day-flaw/&amp;#34;&amp;gt;Microsoft: Attackers Exploiting Windows Zero-Day Flaw&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-121611/</link>
      <pubDate>Wed, 08 Sep 2021 12:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210908-121611/</guid>
      <description>U.S. election workers get little help from law enforcement as terror threats mount &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/usa-election-threats-law-enforcement&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210907-201609/</link>
      <pubDate>Tue, 07 Sep 2021 20:16:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210907-201609/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02394-w&amp;#34;&amp;gt;Success! Mars rover finally collects its first rock core&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
NASA’s Perseverance rover lives up to its name, drilling and storing Martian rock after a misstep in August.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210907-201146/</link>
      <pubDate>Tue, 07 Sep 2021 20:11:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210907-201146/</guid>
      <description>&amp;lt;p&amp;gt;Morning all! Today&amp;#39;s pod is part 2 of our Silicon Valley mini-series with @pmarca.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;We focus on social media and it&amp;#39;s link with populist politics and the &amp;#39;Americanisation&amp;#39; of culture, alongside much more. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/IwL5furi28&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/IwL5furi28&amp;#34;&amp;gt;https://t.co/IwL5furi28&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/jX0cMdYo2J&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/jX0cMdYo2J&amp;#34;&amp;gt;https://t.co/jX0cMdYo2J&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0Rn5IFsnvR&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0Rn5IFsnvR&amp;#34;&amp;gt;https://t.co/0Rn5IFsnvR&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/TtziGtxwjU&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/TtziGtxwjU&amp;#34;&amp;gt;https://t.co/TtziGtxwjU&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Some lunchtime listening for you - best enjoyed while navigating the blurred, fragmented mandala of cyberspace &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/PwZFsb4djp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/PwZFsb4djp&amp;#34;&amp;gt;https://t.co/PwZFsb4djp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210907-161618/</link>
      <pubDate>Tue, 07 Sep 2021 16:16:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210907-161618/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02426-5&amp;#34;&amp;gt;Dispatches from a world aflame&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
From California’s deadliest blaze to a new planetary fire regime, how wildfires are reshaping our climate-changed planet.&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 07 Sept 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210907-081133/</link>
      <pubDate>Tue, 07 Sep 2021 08:11:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210907-081133/</guid>
      <description>&amp;lt;p&amp;gt;Morning. On today&amp;#39;s @TheRestHistory: part 2 of our SILICON VALLEY special.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Tech colossus Marc Andreessen (@pmarca) explores the history of social media, digital populism and the future of technology &amp;amp;hellip; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/oTRuD9IHFw&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/oTRuD9IHFw&amp;#34;&amp;gt;https://t.co/oTRuD9IHFw&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/3rDW82VVr3&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/3rDW82VVr3&amp;#34;&amp;gt;https://t.co/3rDW82VVr3&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MDhtro1D4K&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MDhtro1D4K&amp;#34;&amp;gt;https://t.co/MDhtro1D4K&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/yJGCXMDA9j&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/yJGCXMDA9j&amp;#34;&amp;gt;https://t.co/yJGCXMDA9j&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today on @TheRestHistory, part 2 of @pmarca on Silicon Valley: how software is eating the world. From social media to cyber-war, a history of the recent past - from a man who is shaping the future. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/AwWufkURv4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/AwWufkURv4&amp;#34;&amp;gt;https://t.co/AwWufkURv4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/dYYuE4UXDM&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/dYYuE4UXDM&amp;#34;&amp;gt;https://t.co/dYYuE4UXDM&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/qvzEdxf8GJ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/qvzEdxf8GJ&amp;#34;&amp;gt;https://t.co/qvzEdxf8GJ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0XPSkN3Kaq&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0XPSkN3Kaq&amp;#34;&amp;gt;https://t.co/0XPSkN3Kaq&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210907-041939/</link>
      <pubDate>Tue, 07 Sep 2021 04:19:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210907-041939/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/07/05/lightweight-invertible-enumerations-in-haskell/&amp;#34;&amp;gt;Lightweight invertible enumerations in Haskell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20210907-041304/</link>
      <pubDate>Tue, 07 Sep 2021 04:13:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20210907-041304/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0----------------------------&amp;#34;&amp;gt;Jul 7&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0----------------------------&amp;#34;&amp;gt;Three Ways to Trace End-to-end&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210907-040636/</link>
      <pubDate>Tue, 07 Sep 2021 04:06:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210907-040636/</guid>
      <description>In May 2015, KrebsOnSecurity briefly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/05/phishing-gang-is-audacious-manipulator/&amp;#34;&amp;gt;profiled&amp;lt;/a&amp;gt; “ The Manipulaters ,” the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range of services for crafting, hosting and deploying malicious email. Six years later, a review of the social media postings from this group shows they are prospering, while rather poorly hiding their activities behind a software development firm in Lahore that has secretly enabled an entire generation of spammers and scammers.&amp;lt;br&amp;gt;
The Web site in 2015 for the “Manipulaters Team,” a group of Pakistani hackers behind the dark web identity “Saim Raza,” who sells spam and malware tools and services.&amp;lt;br&amp;gt;
The Manipulaters’ core brand in the underground is a shared cybercriminal identity named “ Saim Raza ,” who for the past decade across dozens of cybercrime sites and forums has peddled a popular spamming and phishing service variously called “ Fudtools ,” “ Fudpage ,” “ Fudsender ,” etc.&amp;lt;br&amp;gt;
The common acronym in nearly all of Saim Raza’s domains over the years — “FUD” — stands for “ F ully U n- D etectable,” and it refers to cybercrime resources that will evade detection by security tools like antivirus software or anti-spam appliances.&amp;lt;br&amp;gt;
One of several current Fudtools sites run by The Manipulaters.&amp;lt;br&amp;gt;
The current website for Saim Raza’s Fud Tools (above) offers phishing templates or “scam pages” for a variety of popular online sites like Office365 and Dropbox . They also sell “Doc Exploit” products that bundle malicious software with innocuous Microsoft Office documents; “scampage hosting” for phishing sites; a variety of spam blasting tools like HeartSender; and software designed to help spammers route their malicious email through compromised sites, accounts and services in the cloud.&amp;lt;br&amp;gt;
For years leading up to 2015, “ &amp;lt;a href=&amp;#34;mailto:admin@manipulaters.com&amp;#34;&amp;gt;admin@manipulaters.com&amp;lt;/a&amp;gt; ” was the name on the registration records for thousands of scam domains that spoofed some of the world’s top banks and brand names, but particularly Apple and Microsoft. When confronted about this, The Manipulaters founder Madih-ullah Riaz replied, “We do not deliberately host or allow any phishing or any other abusive website. Regarding phishing, whenever we receive complaint, we remove the services immediately. Also we are running business since 2006.”&amp;lt;br&amp;gt;
The IT network of The Manipulaters, circa 2013. Image: Facebook&amp;lt;br&amp;gt;
Two years later, KrebsOnSecurity received an email from Riaz asking to have his name and that of his business partner removed from the 2015 story, saying it had hurt his company’s ability to maintain stable hosting for their stable of domains.&amp;lt;br&amp;gt;
“We run web hosting business and due to your post we got very serious problems especially no data center was accepting us,” Riaz wrote in a May 2017 email. “I can see you post on hard time criminals we are not criminals, at least it was not in our knowledge.”&amp;lt;br&amp;gt;
Riaz said the problem was his company’s billing system erroneously used The Manipulators’ name and contact information instead of its clients in WHOIS registration records. That oversight, he said, caused many researchers to erroneously attribute to them activity that was coming from just a few bad customers.&amp;lt;br&amp;gt;
“We work hard to earn money and it is my request, 2 years of my name in your wonderful article is enough punishment and we learned from our mistakes,” he concluded.&amp;lt;br&amp;gt;
The Manipulaters have indeed learned a few new tricks, but keeping their underground operations air-gapped from their real-life identities is mercifully not one of them.&amp;lt;br&amp;gt;
ZERO OPERATIONAL SECURITY&amp;lt;br&amp;gt;
Phishing domain names registered to The Manipulaters included an address in Karachi, with the phone number 923218912562 . That same phone number is shared in the WHOIS records for 4,000&#43; domains registered through domainprovider[.]work , a domain controlled by The Manipulaters that appears to be a reseller of another domain name provider.&amp;lt;br&amp;gt;
One of Saim Raza’s many ads in the cybercrime underground for his Fudtools service promotes the domain fudpage[.]com , and the WHOIS records for that domain share the same Karachi phone number. Fudpage’s WHOIS records list the contact as “ &amp;lt;a href=&amp;#34;mailto:admin@apexgrand.com&amp;#34;&amp;gt;admin@apexgrand.com&amp;lt;/a&amp;gt; ,” which is another email address used by The Manipulaters to register domains.&amp;lt;br&amp;gt;
As I noted in 2015, The Manipulaters Team used domain name service (DNS) settings from another blatantly fraudulent service called ‘ FreshSpamTools[.]eu ,’ which was offered by a fellow Pakistani who also conveniently sold phishing toolkits targeting a number of big banks.&amp;lt;br&amp;gt;
The WHOIS records for FreshSpamTools briefly list the email address &amp;lt;a href=&amp;#34;mailto:bilal.waddaich@gmail.com&amp;#34;&amp;gt;bilal.waddaich@gmail.com&amp;lt;/a&amp;gt; , which corresponds to the email address for a Facebook account of a Bilal “Sunny” Ahmad Warraich (a.k.a. Bilal Waddaich).&amp;lt;br&amp;gt;
Bilal Waddaich’s current Facebook profile photo includes many current and former employees of We Code Solutions.&amp;lt;br&amp;gt;
Warraich’s Facebook profile says he works as an IT support specialist at a software development company in Lahore called We Code Solutions .&amp;lt;br&amp;gt;
The We Code Solutions website.&amp;lt;br&amp;gt;
A review of the hosting records for the company’s website wecodesolutions[.]pk show that over the past three years it has shared a server with just a handful of other domains, including:&amp;lt;br&amp;gt;
-saimraza[.]tools -fud[.]tools -heartsender[.]net -fudspampage[.]com -fudteam[.]com -autoshopscript[.]com -wecodebilling[.]com -antibotspanel[.]com -sellonline[.]tools&amp;lt;br&amp;gt;
FUD CO&amp;lt;br&amp;gt;
The profile image atop Warraich’s Facebook page is a group photo of current and former We Code Solutions employees. Helpfully, many of the faces in that photo have been tagged and associated with their respective Facebook profiles.&amp;lt;br&amp;gt;
For example, the Facebook profile of Burhan Ul Haq , a.k.a. “ Burhan Shaxx ” says he works in human relations and IT support for We Code Solutions. Scanning through Ul Haq’s endless selfies on Facebook, it’s impossible to ignore a series of photos featuring various birthday cakes and the words “Fud Co” written in icing on top.&amp;lt;br&amp;gt;
Burhan Ul Haq’s photos show many Fud Co-themed cakes the We Code Solutions employees enjoyed on the anniversary of the Manipulaters Team.&amp;lt;br&amp;gt;
Yes, from a review of the Facebook postings of We Code Solutions employees, it appears that for at least the last five years this group has celebrated an anniversary every May with a Fud Co cake, non-alcoholic sparkling wine, and a Fud Co party or group dinner. Let’s take a closer look at that delicious cake:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/fudco-spam-empire-tied-to-pakistani-software-firm/&amp;#34;&amp;gt;“FudCo” Spam Empire Tied to Pakistani Software Firm&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210906-121154/</link>
      <pubDate>Mon, 06 Sep 2021 12:11:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210906-121154/</guid>
      <description>&amp;lt;p&amp;gt;Dominic Sandbrook &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/dcsandbrook&amp;#34;&amp;gt;@dcsandbrook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Morning. On today&amp;#39;s @TheRestHistory: SILICON VALLEY &amp;amp;amp; THE DIGITAL REVOLUTION.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Tech titan Marc Andreesen (@pmarca) explains how it all began and where it ranks among the great cultural shifts of history. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/tCnd1pIcT8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/tCnd1pIcT8&amp;#34;&amp;gt;https://t.co/tCnd1pIcT8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/QJHB1YgDOx&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/QJHB1YgDOx&amp;#34;&amp;gt;https://t.co/QJHB1YgDOx&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/tCnd1pIcT8&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/tCnd1pIcT8&amp;#34;&amp;gt;https://t.co/tCnd1pIcT8&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/MZiX8g5tAS&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/MZiX8g5tAS&amp;#34;&amp;gt;https://t.co/MZiX8g5tAS&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Tom Holland &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/holland_tom&amp;#34;&amp;gt;@holland_tom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Morning (or night if you&amp;#39;re in California).&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Today in @TheRestHistory, we have the 1st of 2 episodes on the history of Silicon Valley. @pmarca takes us from its origins to the emergence of social media. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/aqOV8cGP7Y&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/aqOV8cGP7Y&amp;#34;&amp;gt;https://t.co/aqOV8cGP7Y&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/WY5BzQt1mO&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/WY5BzQt1mO&amp;#34;&amp;gt;https://t.co/WY5BzQt1mO&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/qPn8RJqD5h&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/qPn8RJqD5h&amp;#34;&amp;gt;https://t.co/qPn8RJqD5h&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/KGZDxVGOR4&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/KGZDxVGOR4&amp;#34;&amp;gt;https://t.co/KGZDxVGOR4&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The Rest Is History Podcast &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TheRestHistory&amp;#34;&amp;gt;@TheRestHistory&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today&amp;#39;s The Rest is History is the first episode of a two-parter on Silicon Valley.
Joined by @pmarca, we discuss its origins in military technology, and how it began to change the world &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/pNUVRRphEs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/pNUVRRphEs&amp;#34;&amp;gt;https://t.co/pNUVRRphEs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/RAFD5EJARX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/RAFD5EJARX&amp;#34;&amp;gt;https://t.co/RAFD5EJARX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/pNUVRRphEs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/pNUVRRphEs&amp;#34;&amp;gt;https://t.co/pNUVRRphEs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/fYqAA9SkJX&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/fYqAA9SkJX&amp;#34;&amp;gt;https://t.co/fYqAA9SkJX&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210906-041505/</link>
      <pubDate>Mon, 06 Sep 2021 04:15:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210906-041505/</guid>
      <description>float&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#how-to&amp;#34;&amp;gt;how-to&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#operator-spaceship&amp;#34;&amp;gt;operator-spaceship&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pretty-pictures&amp;#34;&amp;gt;pretty-pictures&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I’ve spent too many hours repeatedly trying to find this information
on the Web. Time to write it down.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20210905-161112/</link>
      <pubDate>Sun, 05 Sep 2021 16:11:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20210905-161112/</guid>
      <description>The third option is to chunk the input and convert each chunk independently. Ideal input chunks would be 8 bytes or fewer, because nearly all environments will support a uint64 type and nearly all hardware can do a divmod on them. If you&amp;#39;re using base-10 then there&amp;#39;s going to be a function that can “print” a uint64 to digits for you, so let&amp;#39;s take digits as an example. With a chunk size of two bytes you would get five digits. Each digit takes 3⅓ bits of space, so 16 input bits takes 16⅔ bits: 96% efficient. Less than the 99.66% we can get with digits for sure. But if you consider all chunk sizes from one to eight bytes, turning 7-byte chunks into 17 digits is 98.82% efficient. That&amp;#39;s pretty good for the complexity savings.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20210905-001039/</link>
      <pubDate>Sun, 05 Sep 2021 00:10:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20210905-001039/</guid>
      <description>&amp;lt;p&amp;gt;If you&amp;#39;ve picked base-10 (digits), base-38, or even base-45 for your data then you need to get it into that form. Base-64 is easy because that&amp;#39;s exactly 6 bits per character; you work on 3 bytes of input at a time and produce exactly 4 characters of output. But 10, 38, and 45 aren&amp;#39;t powers of two. You&amp;#39;ve got three options here. The obvious conversion would be to treat the input as a bigint and repeatedly divmod by 10 (or 38, etc) to generate the encoding. If you have a bigint library to hand then it almost certainly has the functions for that, but it&amp;#39;s a rather obnoxious (and quadratic) amount of computation and a significant dependency. So you might be willing to waste a few bits to make things easier.&amp;lt;br&amp;gt;
Next option is an encoding &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/hashbreaker/status/1432061744277426183&amp;#34;&amp;gt;noted by djb&amp;lt;/a&amp;gt; that achieves similar efficiency but with less computation and no long-division. I updated this post to include it, so it&amp;#39;s covered in a section below.&amp;lt;br&amp;gt;
Third third option is to chunk the input and convert each chunk independently. Ideal input chunks would be 8 bytes or fewer, because nearly all environments will support a uint64 type and nearly all hardware can do a divmod on them. If you&amp;#39;re using base-10 then there&amp;#39;s going to be a function that can “print” a uint64 to digits for you, so let&amp;#39;s take digits as an example. With a chunk size of two bytes you would get five digits. Each digit takes 3⅓ bits of space, so 16 input bits takes 16⅔ bits: 96% efficient. Less than the 99.66% we can get with digits for sure. But if you consider all chunk sizes from one to eight bytes, turning 7-byte chunks into 17 digits is 98.82% efficient. That&amp;#39;s pretty good for the complexity savings.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The NTRU Prime encoding&amp;lt;br&amp;gt;
Above, I referenced an encoding that gets nearly all the space efficiency of the bigint-and-divmod method, but without the computational costs. This section is about that. It&amp;amp;#39;s taken from page 18 of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ntruprime.cr.yp.to/nist/ntruprime-20201007.pdf&amp;#34;&amp;gt;the NTRU Prime NIST submission&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Our motivating issue is thus: if you have a whole byte then taking it mod 10 to generate a digit works fairly well. The digits 0–5 have probability 26/256 while 6–9 have probability 25/256. That&amp;amp;#39;s not uniform therefore it doesn&amp;amp;#39;t encode the maximum amount of entropy, but it&amp;amp;#39;s 99.992% efficient, which is pretty good. But when you have a smaller range of input values the non-uniformity becomes significant and so does the reduction in information transmitted.&amp;lt;br&amp;gt;
The encoding in NTRU Prime takes input values (which can be larger than bytes) and combines pairs of them. It produces some output values from each pair but, once the non-uniformity gets unconfortable, it pairs up the leftovers to increase the range. This repeats in a binary-tree.&amp;lt;br&amp;gt;
As a concrete example we&amp;amp;#39;ll use the Python code from page 18 and set M = [256…] (because our inputs are bytes), change the 256 and 255 to 10 and 9 (to extract digits, not bytes), and set&amp;lt;br&amp;gt;
limit&amp;lt;br&amp;gt;
to 1024. Our example input will be&amp;lt;br&amp;gt;
419dd0ed371f44b7&amp;lt;br&amp;gt;
I 65 157 208 237 55 31 68 183 40257 →7,5 60880 →0,8 7991 →1,9 46916 →6,1 402/656 608/656 79/656 469/656 399250 →0,5,2 307743 →3,4,7 399/431 185761 →6,1,7 →2,3,1 307/431 132/186&amp;lt;br&amp;gt;
The input bytes are written (in base 10) along the top. Pairs of them are combined. Take the top-right box: its value is 157×256 &#43; 65 = 40257. That can be considered to be 40257 mod 65536 and, since there&amp;amp;#39;s a reasonable number of bits in there, two digits are extracted. Obviously 40257 mod 10 = 7, and 4025 mod 10 = 5. So the two digits are 7 and 5. That leaves 402 mod 656, and 656 is below the limit of 1024 that we set, so it&amp;amp;#39;s passed down to be combined into the box below. This continues down the tree: each time there&amp;amp;#39;s too little data left to extract another digit, the leftovers are passed down to be combinined. At the bottom there&amp;amp;#39;s nothing else to combine with so the final leftover value, 132 mod 186, is converted into the digits 2, 3, and 1. The ultimate output digits are concatenated from left-to-right, top-to-bottom.&amp;lt;br&amp;gt;
This achieves good encoding efficiency without repeated long-division, and can be parallelised.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210904-201339/</link>
      <pubDate>Sat, 04 Sep 2021 20:13:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210904-201339/</guid>
      <description>and&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A lot of templates in the C&#43;&#43; standard library are specified with Constraints: elements,
which means that the library vendor must ensure that they drop out of overload resolution
when their constraints are not met — but the Standard does not mandate any particular
mechanism by which the vendor must implement that dropping-out. Two possible mechanisms are
SFINAE using&amp;lt;br&amp;gt;
std::enable_if&amp;lt;br&amp;gt;
, and adding C&#43;&#43;20 constraints using the&amp;lt;br&amp;gt;
keyword.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210904-001838/</link>
      <pubDate>Sat, 04 Sep 2021 00:18:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210904-001838/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/dennis-overbye#after-top&amp;#34;&amp;gt;Continue reading the main story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210904-001645/</link>
      <pubDate>Sat, 04 Sep 2021 00:16:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210904-001645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/cecilia-kang#after-top&amp;#34;&amp;gt;Continue reading the main story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20210903-202157/</link>
      <pubDate>Fri, 03 Sep 2021 20:21:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20210903-202157/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20210903-202153/</link>
      <pubDate>Fri, 03 Sep 2021 20:21:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20210903-202153/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210903-202001/</link>
      <pubDate>Fri, 03 Sep 2021 20:20:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210903-202001/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/listen/&amp;#34;&amp;gt;Listen Later&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210903-201853/</link>
      <pubDate>Fri, 03 Sep 2021 20:18:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210903-201853/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/mike-isaac#stream-panel&amp;#34;&amp;gt;Search&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>From the Canyon Edge</title>
      <link>https://www.whatsupup.com/blog/audiometry/cottony/20210903-201819/</link>
      <pubDate>Fri, 03 Sep 2021 20:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/audiometry/cottony/20210903-201819/</guid>
      <description>Posted by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/profile/12464590128908584782&amp;#34;&amp;gt;Dustin Kirkland&amp;lt;/a&amp;gt; at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.dustinkirkland.com/2020/04/coordinated-launch-cycles-at-apex.html&amp;#34;&amp;gt;12:07 AM&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/dustinkirkland/petname/issues/1#issuecomment-889983462&amp;#34;&amp;gt;dustinkirkland commented on issue dustinkirkland/petname#1&amp;lt;/a&amp;gt; - 7/30/2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210903-201815/</link>
      <pubDate>Fri, 03 Sep 2021 20:18:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210903-201815/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/dennis-overbye#stream-panel&amp;#34;&amp;gt;Search&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-201644/</link>
      <pubDate>Fri, 03 Sep 2021 20:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-201644/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/journalists/joseph-menn?view=page&amp;amp;page=2&amp;amp;pageSize=10&amp;#34;&amp;gt;Next Page »&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210903-201630/</link>
      <pubDate>Fri, 03 Sep 2021 20:16:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210903-201630/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/cecilia-kang#stream-panel&amp;#34;&amp;gt;Search&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210903-201609/</link>
      <pubDate>Fri, 03 Sep 2021 20:16:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210903-201609/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com&amp;#34;&amp;gt;New&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com&amp;#34;&amp;gt;Top&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/about&amp;#34;&amp;gt;What is Big Technology?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210903-201453/</link>
      <pubDate>Fri, 03 Sep 2021 20:14:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210903-201453/</guid>
      <description>We use cookies to ensure that we give you the best experience on our websites. By continuing to visit this site you agree to our use of cookies. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/cookies&amp;#34;&amp;gt;Cookie policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210903-201453/</link>
      <pubDate>Fri, 03 Sep 2021 20:14:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210903-201453/</guid>
      <description>Posted by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/profile/17011901605865574886&amp;#34;&amp;gt;Ryan&amp;lt;/a&amp;gt; at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html&amp;#34;&amp;gt;9:37 AM&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html#comment-form&amp;#34;&amp;gt;No comments:&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&amp;&gt; /dev/null</title>
      <link>https://www.whatsupup.com/blog/airbrush/misogynic/20210903-201337/</link>
      <pubDate>Fri, 03 Sep 2021 20:13:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/airbrush/misogynic/20210903-201337/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>SIGPIPE 13</title>
      <link>https://www.whatsupup.com/blog/alveolar/cozey/20210903-201323/</link>
      <pubDate>Fri, 03 Sep 2021 20:13:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alveolar/cozey/20210903-201323/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sigpipe.macromates.com&amp;#34;&amp;gt;Previous&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sigpipe.macromates.com/page/2/&amp;#34;&amp;gt;Next&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210903-200756/</link>
      <pubDate>Fri, 03 Sep 2021 20:07:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210903-200756/</guid>
      <description>Follow&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog - Parsers</title>
      <link>https://www.whatsupup.com/blog/nonspecific/thinkably/20210903-200702/</link>
      <pubDate>Fri, 03 Sep 2021 20:07:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nonspecific/thinkably/20210903-200702/</guid>
      <description>By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/author/parserssiteuser/&amp;#34;&amp;gt;admin&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/sexual-wellbeing-startup-emjoy-raises-3m-seed-funding/&amp;#34;&amp;gt;11 months ago&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
1 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/blog/page/2/&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/blog/page/7/&amp;#34;&amp;gt;7&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/blog/page/2/&amp;#34;&amp;gt;Next&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog / fuzzy notepad</title>
      <link>https://www.whatsupup.com/blog/tularemic/yahweh/20210903-200700/</link>
      <pubDate>Fri, 03 Sep 2021 20:07:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tularemic/yahweh/20210903-200700/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/dev/&amp;#34;&amp;gt;dev&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/release/&amp;#34;&amp;gt;release&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/&amp;#34;&amp;gt;everything&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eev.ee/everything/archives/&amp;#34;&amp;gt;archives&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:eevee.fuzzynotepad@veekun.com&amp;#34;&amp;gt;email&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/eevee&amp;#34;&amp;gt;twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mastodon.social/@eevee&amp;#34;&amp;gt;mastodon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.patreon.com/eevee&amp;#34;&amp;gt;patreon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cash.me/$eevee&amp;#34;&amp;gt;square&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.paypal.me/lexyeevee&amp;#34;&amp;gt;paypal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/eevee&amp;#34;&amp;gt;github&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lexyeevee.tumblr.com/&amp;#34;&amp;gt;art tumblr&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eevee.itch.io/&amp;#34;&amp;gt;itch.io&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitch.tv/lexyeevee&amp;#34;&amp;gt;twitch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/user/lexyeevee&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-161731/</link>
      <pubDate>Fri, 03 Sep 2021 16:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-161731/</guid>
      <description>U.S. job growth fell well short of expectations amid a shortage of workers as COVID-19 infections soared &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-job-growth-slows-sharply-august-unemployment-rate-falls-52-2021-09-03/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210903-121952/</link>
      <pubDate>Fri, 03 Sep 2021 12:19:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210903-121952/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/09/03/espanol/el-socio-silencioso-que-hace-la-limpieza-de-facebook-por-500-millones-al-ano.html&amp;#34;&amp;gt;El socio silencioso que hace la limpieza de Facebook por 500 millones al año La red social construyó una vasta infraestructura para acabar con las publicaciones tóxicas en su plataforma. Accenture, la gran firma consultora, es crucial en la estrategia. By Adam Satariano and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Sept. 3, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-041734/</link>
      <pubDate>Fri, 03 Sep 2021 04:17:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210903-041734/</guid>
      <description>Japan PM Yoshihide Suga to drop out of party leadership election, setting stage for new prime minister &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/japans-ruling-party-execs-meet-pm-suga-struggles-ahead-election-2021-09-03/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210903-000647/</link>
      <pubDate>Fri, 03 Sep 2021 00:06:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210903-000647/</guid>
      <description>Bill’s data also shows that this gang is so aggressively going after gift card data that it will routinely seek new gift card benefits on behalf of victims, when that option is available.  For example, many companies now offer employees a “wellness benefit” if they can demonstrate they’re keeping up with some kind of healthy new habit, such as daily gym visits, yoga, or quitting smoking.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>India McKinney | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/20210902-202241/</link>
      <pubDate>Thu, 02 Sep 2021 20:22:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/20210902-202241/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/fr/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life&amp;#34;&amp;gt;Français&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Erica Portnoy | Electronic Frontier Foundation</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/20210902-202241/</link>
      <pubDate>Thu, 02 Sep 2021 20:22:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/20210902-202241/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eff.org/fr/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life&amp;#34;&amp;gt;Français&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210902-202119/</link>
      <pubDate>Thu, 02 Sep 2021 20:21:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210902-202119/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133459_audi-grandsphere-concept-ev-rethinks-sedans-from-the-inside-out&amp;#34;&amp;gt;Audi Grandsphere concept EV rethinks sedans from the inside out&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; September 2, 2021&amp;lt;br&amp;gt;
Audi on Thursday revealed the Grandsphere concept to provide a glimpse of what electric luxury sedans from the brand might look like later in the decade. It&amp;#39;s the second of three&amp;amp;hellip;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131821_gmc-hummer-ev-chief-engineer-talks-motor-torque-wheelies-and-watts-to-freedom&amp;#34;&amp;gt;GMC Hummer EV chief engineer talks motor torque, wheelies, and Watts To Freedom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Engineer Al Oppenheiser says the GMC Hummer EV&amp;amp;#39;s supertruck performance includes a bit of theater, wheelies for the prototype, and 1,100 lb-ft of torque.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126828_cruise-origin-previews-a-future-that-takes-the-driver-out-of-electric-ride-hailing&amp;#34;&amp;gt;Cruise Origin previews a future that takes the driver out of electric ride hailing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; January 22, 2020&amp;lt;br&amp;gt;
As rainy weather and rush-hour congestion tested drivers’ patience and attention outside, Cruise revealed its fourth-generation driverless vehicle inside, near its San Francisco headquarters.&amp;lt;br&amp;gt;
...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126380_first-drive-review-2020-porsche-taycan-4s-drifts-into-a-thrilling-future&amp;#34;&amp;gt;First drive review: 2020 Porsche Taycan 4S drifts into a thrilling future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
From LA hills to a Scandinavian flick, I sample the most affordable electric car from Porsche and don’t want to give it back.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123694_first-drive-review-2020-ford-explorer-st-dances-with-the-family-and-its-a-ball&amp;#34;&amp;gt;First drive review: 2020 Ford Explorer ST dances with the family, and it&amp;amp;#39;s a ball&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; June 20, 2019&amp;lt;br&amp;gt;
The idea of an Explorer bearing Ford’s two speedy red letters seemed like a stretch.&amp;lt;br&amp;gt;
Not long ago, the ST stamp was reserved for some of Ford’s brashest European concoctions. Not...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1121372_why-mazda-is-purging-touchscreens-from-its-vehicles&amp;#34;&amp;gt;Why Mazda is purging touchscreens from its vehicles&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Tablet-like touchscreens have become the ubiquitous interfaces of choice, and they’re seemingly everywhere in daily life, on everything from thermostats to coffee makers and refrigerators. But Mazda really doesn’t think they belong in cars—or at least anywhere near the...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1104437_2017-volvo-s90-first-drive-review&amp;#34;&amp;gt;2017 Volvo S90 first drive review&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001004_bengt-halvorson&amp;#34;&amp;gt;Bengt Halvorson&amp;lt;/a&amp;gt; June 13, 2016&amp;lt;br&amp;gt;
With Volvo’s most recent products, including the 2017 Volvo S90 sedan and upcoming 2018 V90 wagon, the Swedish automaker is wholly embracing its Scandinavian roots.&amp;lt;br&amp;gt;
From the upright concave...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103739_2016-bmw-x5-xdrive40e-first-drive-review&amp;#34;&amp;gt;2016 BMW X5 xDrive40e first drive review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The 2016 BMW X5 xDrive40e—that’s the new plug-in hybrid version of the X5 sport-utility vehicle—is going to draw you in with its numbers: 0-60 mph in 6.5 seconds; 14 miles in all-electric mode; 24 mpg combined. The numbers add up to an alluring (and image-greening) idea: that you...&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-201735/</link>
      <pubDate>Thu, 02 Sep 2021 20:17:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-201735/</guid>
      <description>Exclusive: Amazon to remove more content that violates rules from cloud service, sources say &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-amazon-proactively-remove-more-content-that-violates-rules-cloud-2021-09-02/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210902-200635/</link>
      <pubDate>Thu, 02 Sep 2021 20:06:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210902-200635/</guid>
      <description>Some of the most successful and lucrative online scams employ a “low-and-slow” approach — avoiding detection or interference from researchers and law enforcement agencies by stealing small bits of cash from many people over an extended period. Here’s the story of a cybercrime group that compromises up to 100,000 email inboxes per day, and apparently does little else with this access except siphon gift card and customer loyalty program data that can be resold online.&amp;lt;br&amp;gt;
The data in this story come from a trusted source in the security industry who has visibility into a network of hacked machines that fraudsters in just about every corner of the Internet are using to anonymize their malicious Web traffic. For the past three years, the source — we’ll call him “Bill” to preserve his requested anonymity — has been watching one group of threat actors that is mass-testing millions of usernames and passwords against the world’s major email providers each day.&amp;lt;br&amp;gt;
Bill said he’s not sure where the passwords are coming from, but he assumes they are tied to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/the-life-cycle-of-a-breached-database/&amp;#34;&amp;gt;various databases for compromised websites that get posted to password cracking and hacking forums on a regular basis&amp;lt;/a&amp;gt; . Bill said this criminal group averages between five and ten million email authentication attempts daily, and comes away with anywhere from 50,000 to 100,000 of working inbox credentials.&amp;lt;br&amp;gt;
In about half the cases the credentials are being checked via “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nylas.com/blog/nylas-imap-therefore-i-am/&amp;#34;&amp;gt;IMAP&amp;lt;/a&amp;gt; ,” which is an email standard used by email software clients like Mozilla’s Thunderbird and Microsoft Outlook . With his visibility into the proxy network, Bill can see whether or not an authentication attempt succeeds based on the network response from the email provider (e.g. mail server responds “OK” = successful access).&amp;lt;br&amp;gt;
You might think that whoever is behind such a sprawling crime machine would use their access &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/&amp;#34;&amp;gt;to blast out spam, or conduct targeted phishing attacks against each victim’s contacts&amp;lt;/a&amp;gt; . But based on interactions that Bill has had with several large email providers so far, this crime gang merely uses custom, automated scripts that periodically log in and search each inbox for digital items of value that can easily be resold.&amp;lt;br&amp;gt;
And they seem particularly focused on stealing gift card data.&amp;lt;br&amp;gt;
“Sometimes they’ll log in as much as two to three times a week for months at a time,” Bill said. “These guys are looking for low-hanging fruit — basically cash in your inbox. Whether it’s related to hotel or airline rewards or just Amazon gift cards, after they successfully log in to the account their scripts start pilfering inboxes looking for things that could be of value.”&amp;lt;br&amp;gt;
A sample of some of the most frequent search queries made in a single day by the gift card gang against more than 50,000 hacked inboxes.&amp;lt;br&amp;gt;
According to Bill, the fraudsters aren’t downloading all of their victims’ emails: That would quickly add up to a monstrous amount of data. Rather, they’re using automated systems to log in to each inbox and search for a variety of domains and other terms related to companies that maintain loyalty and points programs, and/or issue gift cards and handle their fulfillment.&amp;lt;br&amp;gt;
Why go after hotel or airline rewards? Because these accounts can all be cleaned out and deposited onto a gift card number that can be resold quickly online for 80 percent of its value.&amp;lt;br&amp;gt;
“These guys want that hard digital asset — the cash that is sitting there in your inbox,” Bill said. “You literally just pull cash out of peoples’ inboxes, and then you have all these secondary markets where you can sell this stuff.”&amp;lt;br&amp;gt;
Bill’s data also shows that this gang is so aggressively going after gift card data that it will routinely seek new gift card benefits on behalf victims, when that option is available.  For example, many companies now offer employees a “wellness benefit” if they can demonstrate they’re keeping up with some kind of healthy new habit, such as daily gym visits, yoga, or quitting smoking.&amp;lt;br&amp;gt;
Bill said these crooks have figured out a way to tap into those benefits as well.&amp;lt;br&amp;gt;
“A number of health insurance companies have wellness programs to encourage employees to exercise more, where if you sign up and pledge to 30 push-ups a day for the next few months or something you’ll get five wellness points towards a $10 Starbucks gift card, which requires 1000 wellness points,” Bill explained. “They’re actually automating the process of replying saying you completed this activity so they can bump up your point balance and get your gift card.”&amp;lt;br&amp;gt;
The Gift Card Gang’s Footprint&amp;lt;br&amp;gt;
How do the compromised email credentials break down in terms of ISPs and email providers? There are victims on nearly all major email networks, but Bill said several large Internet service providers (ISPs) in Germany and France are heavily represented in the compromised email account data.&amp;lt;br&amp;gt;
“With some of these international email providers we’re seeing something like 25,000 to 50,000 email accounts a day get hacked,” Bill said.  “I don’t know why they’re getting popped so heavily.”&amp;lt;br&amp;gt;
That may sound like a lot of hacked inboxes, but Bill said some of the bigger ISPs represented in his data have tens or hundreds of millions of customers. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/#more-55319&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/&amp;#34;&amp;gt;Gift Card Gang Extracts Cash From 100k Inboxes Daily&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-081741/</link>
      <pubDate>Thu, 02 Sep 2021 08:17:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-081741/</guid>
      <description>New York City Mayor Bill de Blasio declares state of emergency after record-breaking rain &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/new-york-city-mayor-declares-state-emergency-after-record-breaking-rain-2021-09-02/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-041955/</link>
      <pubDate>Thu, 02 Sep 2021 04:19:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210902-041955/</guid>
      <description>U.S. Supreme Court refuses to block Texas law banning abortion after six weeks of pregnancy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-supreme-court-declines-block-texas-abortion-ban-2021-09-02/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210902-002055/</link>
      <pubDate>Thu, 02 Sep 2021 00:20:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210902-002055/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/09/01/technology/google-antitrust-advertising-doj.html&amp;#34;&amp;gt;Justice Dept. Is Said to Accelerate Google Advertising Inquiry The moves may result in a second antitrust lawsuit against Google before the end of the year. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Sept. 1, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210902-000744/</link>
      <pubDate>Thu, 02 Sep 2021 00:07:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210902-000744/</guid>
      <description>Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But roughly two weeks ago, VIP72’s online storefront — which ironically enough has remained at the same U.S.-based Internet address for more than a decade — simply vanished.&amp;lt;br&amp;gt;
Like other anonymity networks marketed largely on cybercrime forums online, VIP72 routes its customers’ traffic through computers that have been hacked and seeded with malicious software. Using services like VIP72, customers can select network nodes in virtually any country, and relay their traffic while hiding behind some unwitting victim’s Internet address.&amp;lt;br&amp;gt;
The domain Vip72[.]org was originally registered in 2006 to “ Corpse ,” the handle adopted by a Russian-speaking hacker who gained infamy several years prior for creating and selling an extremely sophisticated online banking trojan called A311 Death , a.k.a. “ Haxdoor ,” and “ Nuclear Grabber .” Haxdoor was way ahead of its time in many respects, and it was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2007/01/25/technology/25hack.html&amp;#34;&amp;gt;used in multiple million-dollar cyberheists&amp;lt;/a&amp;gt; long before multi million-dollar cyberheists became daily front page news.&amp;lt;br&amp;gt;
An ad circa 2005 for A311 Death, a powerful banking trojan authored by “Corpse,” the administrator of the early Russian hacking clique Prodexteam. Image: Google Translate via Archive.org.&amp;lt;br&amp;gt;
Between 2003 and 2006, Corpse focused on selling and supporting his Haxdoor malware. Emerging in 2006, VIP72 was clearly one of his side hustles that turned into a reliable moneymaker for many years to come. And it stands to reason that VIP72 was launched with the help of systems already infected with Corpse’s trojan malware.&amp;lt;br&amp;gt;
The first mention of VIP72 in the cybercrime underground came in 2006 when someone using the handle “ Revive ” advertised the service on Exploit, a Russian language hacking forum. Revive established a sales presence for VIP72 on multiple other forums, and the contact details and messages shared privately by that user with other forum members show Corpse and Revive are one and the same.&amp;lt;br&amp;gt;
When asked in 2006 whether the software that powered VIP72 was based on his Corpse software, Revive replied that “it works on the new Corpse software, specially written for our service.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/15-year-old-malware-proxy-network-vip72-goes-dark/#more-56712&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Reached via LinkedIn, Sociogram founder &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/in/oluwameda/&amp;#34;&amp;gt;Oluwaseun Medayedupin&amp;lt;/a&amp;gt; asked to have his startup’s name removed from the story, although he did not respond to questions about whether there were any inaccuracies in Hassold’s report.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/09/15-year-old-malware-proxy-network-vip72-goes-dark/&amp;#34;&amp;gt;15-Year-Old Malware Proxy Network VIP72 Goes Dark&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210901-201009/</link>
      <pubDate>Wed, 01 Sep 2021 20:10:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210901-201009/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discover-your-next-favorite-campus-club-in-student-hubs-3b5d1c65800f?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discover Your Next Favorite Campus Club in Student Hubs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discover-your-next-favorite-campus-club-in-student-hubs-3b5d1c65800f?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discover Your Next Favorite Campus Club in Student Hubs With so many ways students are using Discord, it can be hard to find servers for your campus. Student Hubs are here to help.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Sep 1&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>https://www.eff.org/about/staff/india-mckinney</title>
      <link>https://www.whatsupup.com/blog/beautifying/hagriding/000000-000000/</link>
      <pubDate>Wed, 01 Sep 2021 08:25:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/beautifying/hagriding/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>https://www.eff.org/about/staff/erica-portnoy</title>
      <link>https://www.whatsupup.com/blog/steeplejack/garrote/000000-000000/</link>
      <pubDate>Wed, 01 Sep 2021 08:24:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/steeplejack/garrote/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210901-001408/</link>
      <pubDate>Wed, 01 Sep 2021 00:14:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210901-001408/</guid>
      <description>Save 45% on Systems Perf 2nd edition until Sep 13, 2021 with the Publisher&amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://informit.com/sale/backtolearn&amp;#34;&amp;gt;back to learn&amp;lt;/a&amp;gt; sale: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/systems-performance-2nd-edition-book.html&amp;#34;&amp;gt;Systems Performance 2nd Ed.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/bpf-performance-tools-book.html&amp;#34;&amp;gt;BPF Performance Tools book&amp;lt;/a&amp;gt; Recent posts:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210831-202353/</link>
      <pubDate>Tue, 31 Aug 2021 20:23:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210831-202353/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/31/technology/facebook-accenture-content-moderation.html&amp;#34;&amp;gt;The Silent Partner Cleaning Up Facebook for $500 Million a Year The social network has constructed a vast infrastructure to keep toxic material off its platform. At the center of it is Accenture, the blue-chip consulting firm. By Adam Satariano and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog - Parsers</title>
      <link>https://www.whatsupup.com/blog/nonspecific/thinkably/20210831-160854/</link>
      <pubDate>Tue, 31 Aug 2021 16:08:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/nonspecific/thinkably/20210831-160854/</guid>
      <description>By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/author/parserssiteuser/&amp;#34;&amp;gt;admin&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://parsers.me/comparison-of-vc-fund-aggregators-crunchbase-pitchbook-with-parsers-vc/&amp;#34;&amp;gt;1 year 54 mins ago&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210831-002154/</link>
      <pubDate>Tue, 31 Aug 2021 00:21:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210831-002154/</guid>
      <description>U.S. completes withdrawal of its troops from Afghanistan, officials say, nearly 20 years after it invaded the country &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/last-us-forces-leave-afghanistan-after-nearly-20-years-2021-08-30/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210830-201641/</link>
      <pubDate>Mon, 30 Aug 2021 20:16:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210830-201641/</guid>
      <description>30 Aug 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-08-30/high-rate-of-paging.html&amp;#34;&amp;gt;Analyzing a High Rate of Paging&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210829-001644/</link>
      <pubDate>Sun, 29 Aug 2021 00:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210829-001644/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-microsoft-security/researchers-cybersecurity-agency-urge-action-by-microsoft-cloud-database-users-idUSKBN2FT0K8&amp;#34;&amp;gt;Researchers, cybersecurity agency urge action by Microsoft cloud database users&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Researchers who discovered a massive flaw in the main databases stored in Microsoft Corp&amp;amp;#39;s Azure cloud platform on Saturday urged all users to change their digital access keys, not just the 3,300 it notified this week.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>502 Server Error</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210829-000627/</link>
      <pubDate>Sun, 29 Aug 2021 00:06:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210829-000627/</guid>
      <description>Error: Server Error&amp;lt;br&amp;gt;
The server encountered a temporary error and could not complete your request.&amp;lt;br&amp;gt;
Please try again in 30 seconds.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-201823/</link>
      <pubDate>Sat, 28 Aug 2021 20:18:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-201823/</guid>
      <description>Biden says military commanders have informed him a new attack is highly likely in Kabul in the next 24-36 hours &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/us-launches-drone-strike-islamic-state-after-afghan-airport-blast-2021-08-28/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210828-200859/</link>
      <pubDate>Sat, 28 Aug 2021 20:08:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210828-200859/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-for-startups/&amp;#34;&amp;gt;Focus on building your core product, not custom internal tools. Early-stage startups now get a free year of Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/solera-health-customer-story/&amp;#34;&amp;gt;Solera Health chose to build custom apps in Retool instead of using React. Learn how those CRUD apps reduced friction and sped up workflows for customer support agents.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-a-mongodb-gui-in-minutes/&amp;#34;&amp;gt;In this post, we’ll show you how to build a simple yet powerful admin panel for your MongoDB instance. Using MongoDB’s sample data, we’ll demonstrate how to query data, build&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/saltpay-customer-story/&amp;#34;&amp;gt;This is the story of how SaltPay was able to bring together critical user data and support workflows into one Retool app to replace a disjointed and slow customer support process.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-document-workflow-automation-with-revv-retool/&amp;#34;&amp;gt;Drafting, reviewing, tracking, signing, and storing business documents is essential—and can be painful, especially if you are still in the pen and paper era. Revv, a complete document management system, specializes in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-modern-on-prem-software-business/&amp;#34;&amp;gt;How we decided to build both a cloud and on-prem option for Retool, the challenges, and why it&amp;amp;#39;s becoming more common to offer both.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/self-hosted-retool-plans/&amp;#34;&amp;gt;We’re excited to announce that you can deploy our Free and Startup plan on your own infra, behind your own VPN, and in your own VPC.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/join-the-retool-developer-community/&amp;#34;&amp;gt;The Retool community is the best place to get help, share what you&amp;amp;#39;re building, and level up your Retool skills.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/plaid-customer-story/&amp;#34;&amp;gt;This is the story of how Plaid empowered customer support to adapt (and re-adapt) workflows at a huge inflection point in their growth, and how a small engineering team played a critical role in making it happen.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/text-v2-app-documentation/&amp;#34;&amp;gt;We’ve recently shipped two updates that help make Markdown a first-class citizen in Retool: a completely redesigned Text component and a new App Documentation feature.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/earnin-customer-story/&amp;#34;&amp;gt;This is the story how Paula built a new service dashboard in Retool to help the customer service team prepare for the launch of their new product, WeWin.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/google-sheets/&amp;#34;&amp;gt;While spreadsheet software has evolved over the years—first VisiCalc, then Lotus, Excel and now Google Sheets—the core abstractions have remained the same.They’re flexible, intuitive, and accessible.  But these abstractions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/segment-customer-story/&amp;#34;&amp;gt;As Segment prepared to launch their second product, Personas, a PM realized that their customer support team needed a new level of visibility into product data.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-a-super-subscription-center-in-retool-using-stripe-and-sync-inc/&amp;#34;&amp;gt;This tutorial walks how to build a subscription management center using Retool, Stripe, and Sync Inc.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-is-low-code/&amp;#34;&amp;gt;Low code and no code have equal amounts of hype and skepticism.  On the one hand, it’s clear low code has market traction: in April 2021, a provider of low code automation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-user-license-app/&amp;#34;&amp;gt;An inside look at why and how we built a custom app for account managers to generate user license keys, manage trials, map account data with Salesforce, and manage feature flags.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-map-library/&amp;#34;&amp;gt;We&amp;amp;#39;re breaking down the strengths and drawbacks of the top React map libraries, as well as highlight the types of projects each library excels at so you can determine what&amp;amp;#39;s best for you.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-autocomplete-libraries/&amp;#34;&amp;gt;We’ve researched and compared React autocomplete libraries to suss out the best React autocomplete library, and then created this simple guide to aggregate all the top options in one place.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/on-prem-vs-cloud/&amp;#34;&amp;gt;The debate between on-premise vs cloud is nothing new. We&amp;amp;#39;ve collected deeper context and frameworks to make evaluating your options easier.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-native-datepicker-libraries/&amp;#34;&amp;gt;We researched and tried a handful of popular React-Native date picker libraries. In this post, we’ll walk you through our favorites and the reasoning behind each selection.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-oddbox-sped-up-customer-support/&amp;#34;&amp;gt;When you ship tens of thousands of boxes of produce a week, issues happen. This is the story of how the PM team helped customer service deliver better user experiences using Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-component-libraries/&amp;#34;&amp;gt;Get an overview of the top React component libraries looking at several factors like popularity, use cases, documentation, resources, support, etc.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/jetfuel-customer-story/&amp;#34;&amp;gt;This is the story of how a co-founder and CRO built internal tools that helped every team bring insights and action into the same place.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/nacho-iacovino-on-the-future-of-internal-tools/&amp;#34;&amp;gt;A guest post from Nacho Iacovino, developer advocate at Clerk, who recently chatted with us about the findings from our 2021 State of Internal Tools report and where he thinks internal tool development is going.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-sentropy-used-internal-apps-to-speed-up-the-sales-process-and-reduce-friction-between-teams/&amp;#34;&amp;gt;As a small team tackling a complex issue, Sentropy needs to move fast and help every teammate operate at their best. Here&amp;amp;#39;s a look at how they built internal tools using Retool to unblock critical GTM functions.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/5-fast-growing-startups-that-used-internal-tools-to-enable-speed/&amp;#34;&amp;gt;With the right internal tools, high-growth startups move faster and more efficiently, enabling them to outpace the competition and succeed in tough markets. Here&amp;amp;#39;s how five category-leading startups—Avo, LeadGenius, Doordash, Neo4j, and Descript–used internal tools to accelerate growth.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/choosing-the-right-react-checkbox-component-for-your-application/&amp;#34;&amp;gt;We researched, identified, and evaluated, checkbox components to help you make the right choice to solve common use cases.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-3-financial-services-companies-use-internal-tools-to-save-engineering-resources/&amp;#34;&amp;gt;Internal tools, with the right strategy, can help you save on a huge amount of engineering resources. With resources saved, you can reallocate engineers to customer-facing features. To learn more, we turned to three financial services companies to see how they use internal tools.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/choosing-a-react-form-library/&amp;#34;&amp;gt;In this post, we’ve compiled three popular React form libraries—Formik, react-hook-form, and react-final-form—and actionable guidance to choose the right React form library for your next project.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/3-experts-on-building-vs-buying-internal-tools/&amp;#34;&amp;gt;Our experts reveal that, especially with low-code platforms, your internal tool development should be context-dependent and should, at different times, include built and bought components.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-we-use-retool-to-manage-our-startup-credits/&amp;#34;&amp;gt;This is a behind-the-scenes look at how we built the process to offer startup credits and then automated it all with Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-botkeeper-streamlines-and-automates-internal-information-and-workflows-using-retool/&amp;#34;&amp;gt;This is the story of how a VP of Innovation used Retool to help her team work the way they want, and connect disparate systems beneath the surface.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-file-uploader-app-with-digital-ocean-spaces/&amp;#34;&amp;gt;This tutorial walks through how to build a basic file uploader and viewer app in under an hour using Retool and the DigitalOcean Spaces API.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-remitly-gets-to-market-faster-by-empowering-their-customer-success-team/&amp;#34;&amp;gt;Here’s a look at how a software engineer built the internal tools to help get Remitly for Developers to market faster and allowed customer success to support users as they navigate the new product line.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/the-best-react-native-map-libraries-for-time-strapped-developers/&amp;#34;&amp;gt;In this guide, we’ll take you through the reasoning behind our favorite map libraries by comparing react-native-maps to the other top libraries.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/using-the-react-native-push-notification-library-for-your-react-native-notification-needs/&amp;#34;&amp;gt;There are a number of React Native notification libraries to choose from, and this post will spotlight one of the leading options: react-native-push-notification.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-bwh-hotel-group-scandinavia-built-tools-for-revenue-services-5x-faster-than-the-competition/&amp;#34;&amp;gt;An inside look at how an analytics manager tackled revenue forecasting with Retool—and gave BWH Hotel Group Scandinavia a competitive advantage they didn’t expect.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-developments-ken-liu-cockroach-labs/&amp;#34;&amp;gt;We talked to Ken about what internal tools look like at a database company, measuring build times, and when to build vs. buy.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-developments-sole-pano-auth0/&amp;#34;&amp;gt;We talked to Sole about how her team at Auth0 approaches building internal tools, their stack, and differences with how they think about customer facing builds.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-developments-curtis-cummings-on-deck/&amp;#34;&amp;gt;We talked to Curtis about how On Deck approaches internal tools, from scaling cohort operations to building quick MVPs in low-code tools.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-developments-soroush-pour-vow/&amp;#34;&amp;gt;We talked to Soroush about how his team at Vow works on internal tools, from microscopes to lab notebooks and admin panels.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-sdr-workflow-on-salesforce/&amp;#34;&amp;gt;This is the story of how 2 Retool apps automated away the messy parts of our SDR workflow and helped our entire sales team be more customer-centric.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/running-safe-database-migrations-using-postgres/&amp;#34;&amp;gt;Our team at Retool has navigated and fixed major issues related to migrations in Postgres. This post will highlight key lessons learned and what you can do to avoid making the same mistakes.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/new-developments-andrew-homeyer-halp/&amp;#34;&amp;gt;We talked to Andrew Homeyer about how his teams at Halp build and maintain their internal tools.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-together-in-retool-with-cord-comments-and-annotations/&amp;#34;&amp;gt;In this post, we’ll walk through how to use Retool with Cord. Cord lets you add comments, annotations, and guides directly in your favorite apps.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/commonbond-loan-disbursal/&amp;#34;&amp;gt;Commonbond’s goal is to provide a better loan experience for customers. But loan disbursement is one of the processes that can involve a heavy lift on the backend. See how one engineer made it happen.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/commonbond-forbearance-process/&amp;#34;&amp;gt;The operations team at Commonbond struggled to get prioritized on the engineering roadmap. So they took matters into their own hands, and created a new career path for their team.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/ramp-financial-operations/&amp;#34;&amp;gt;Ramp is a fast-growing financial company. Here’s an inside look at how the financial operations and product teams changed how they work using Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/avo-story/&amp;#34;&amp;gt;“After Retool,” Solvi said, “anyone in the company could start managing these things without having to request changes from the engineering team.” What used to take the non-technical teams hours to complete can now be accomplished in a matter of seconds using their Retool-built tool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/pizza-to-the-polls-story/&amp;#34;&amp;gt;With this year’s record voter turnout, Pizza to the Polls had an even greater impact than in 2016 and they did it with the power of Retool. They raised over $1.4 million to send 66,089 pizzas to 3,267 polling places in 48 states—blowing their 2016 and 2018 numbers out of the water.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-brex-used-retool-to-scale-10x-in-three-years/&amp;#34;&amp;gt;Brex has a killer philosophy of internal tools. Find out how Retool, on top of this strong foundation, has helped Engineering Manager Derek Stavis scale 10x in three years.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/ramp-story/&amp;#34;&amp;gt;Many companies in the fintech industry struggle with data management because of the complex stack of tools needed to manage operations. Retool can help. Here&amp;amp;#39;s how Ramp used Retool to make operations 20% more efficient.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/cost-benefit-analysis-of-internal-tools/&amp;#34;&amp;gt;The decision to invest in internal tools is all about striking the right balance. In most cases, that balance lies between the engineering overhead to develop (and maintain) internal tools and the workforce productivity those tools deliver once they’re up and running.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/noble-schools-used-retool-to-support-over-12-500-students-during-a-pandemic/&amp;#34;&amp;gt;The COVID-19 pandemic has fundamentally changed how education works. Learn how Retool helped Noble Schools adapt to distance learning.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/neo4j-story/&amp;#34;&amp;gt;The story behind how Mike Brophy (VP of Global Renewals at Neo4J) reduced churn by built a custom internal tool to manage renewals outside of Salesforce.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/descript-story/&amp;#34;&amp;gt;The story behind how Andrew Mason (CEO and Founder of Descript) lifted the load off engineering teams building internal tools by moving to Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/leadgenius-story/&amp;#34;&amp;gt;The story behind how Adam Louie (Senior Director of Business Operations at LeadGenius) built 3 internal applications that ended up saving LeadGenius $1M.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/crud-with-cloud-firestore-using-the-nodejs-sdk/&amp;#34;&amp;gt;This post walks through how to use Firestore&amp;amp;#39;s Node.js SDK to do …&amp;lt;/a&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20210828-200852/</link>
      <pubDate>Sat, 28 Aug 2021 20:08:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20210828-200852/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/weird.html&amp;#34;&amp;gt;Weird Languages&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/hwh.html&amp;#34;&amp;gt;Hard&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/own.html&amp;#34;&amp;gt;Project&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/fn.html&amp;#34;&amp;gt;Fierce&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/newideas.html&amp;#34;&amp;gt;Crazy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210828-161014/</link>
      <pubDate>Sat, 28 Aug 2021 16:10:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210828-161014/</guid>
      <description>Bug bounty write-ups&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/another-rce-in-kensingtonworks&amp;#34;&amp;gt;Another RCE vulnerability in KensingtonWorks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210828-122655/</link>
      <pubDate>Sat, 28 Aug 2021 12:26:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210828-122655/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133386_2023-chevy-camaro-reportedly-in-line-for-ct5-v-blackwing-s-v-8&amp;#34;&amp;gt;2023 Chevy Camaro reportedly in line for CT5-V Blackwing&amp;#39;s V-8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-122311/</link>
      <pubDate>Sat, 28 Aug 2021 12:23:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-122311/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa/u-s-attacks-islamic-state-after-afghan-airport-blast-idUSKBN2FT01K&amp;#34;&amp;gt;U.S. attacks Islamic State after Afghan airport blast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -The United States attacked an Islamic State &amp;amp;#34;planner&amp;amp;#34; in Afghanistan in retaliation for a deadly bombing outside Kabul airport and said there was a high risk of further blasts as it nears the end of a mission to evacuate civilians and withdraw troops.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-italy/we-did-our-best-on-kabul-evacuation-nato-representative-says-idUSKBN2FT07I&amp;#34;&amp;gt;&amp;amp;#34;We did our best&amp;amp;#34; on Kabul evacuation, NATO representative says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210828-122055/</link>
      <pubDate>Sat, 28 Aug 2021 12:20:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210828-122055/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/08/13/is-apples-cloud-key-vault-crypto/&amp;#34;&amp;gt;Is Apple&amp;#39;s Cloud Key Vault a crypto backdoor?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-082220/</link>
      <pubDate>Sat, 28 Aug 2021 08:22:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-082220/</guid>
      <description>(Reuters) -Western forces running the Afghan airlift braced on Saturday for more attacks after the United States launched a drone strike, apparently killing an Islamic State &amp;amp;quot;planner&amp;amp;quot;, two days after the group claimed a deadly bombing outside Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-israel-iran/top-iran-security-official-says-biden-illegally-threatened-tehran-idUSKBN2FT04S&amp;#34;&amp;gt;Top Iran security official says Biden illegally threatened Tehran&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-042231/</link>
      <pubDate>Sat, 28 Aug 2021 04:22:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-042231/</guid>
      <description>&amp;lt;p&amp;gt;The U.S. launched a drone strike targeting Islamic State in eastern Afghanistan one day after a deadly attack in Kabul &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/us-drone-strike-targets-islamic-state-planner-afghanistan-2021-08-28/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa/u-s-launches-drone-strike-on-islamic-state-after-afghan-airport-blast-idUSKBN2FT01K&amp;#34;&amp;gt;U.S. launches drone strike on Islamic State after Afghan airport blast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Western forces running the Afghan airlift braced on Saturday for more attacks after the United States launched a drone strike, apparently killing an Islamic State &amp;amp;#34;planner&amp;amp;#34;, two days after the group claimed a deadly bombing outside Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-pentagon/didnt-need-to-happen-pentagon-seeks-answers-for-deadly-attack-idUSKBN2FT02W&amp;#34;&amp;gt;&amp;amp;#39;Didn&amp;amp;#39;t need to happen&amp;amp;#39;: Pentagon seeks answers for deadly attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Overreacted — A blog by Dan Abramov</title>
      <link>https://www.whatsupup.com/blog/vernalize/massed/20210828-040820/</link>
      <pubDate>Sat, 28 Aug 2021 04:08:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/vernalize/massed/20210828-040820/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-001721/</link>
      <pubDate>Sat, 28 Aug 2021 00:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210828-001721/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/legal-us-microsoft-security/microsoft-warns-thousands-of-cloud-customers-of-exposed-databases-idUSKBN2FS27W&amp;#34;&amp;gt;Microsoft warns thousands of cloud customers of exposed databases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world&amp;amp;#39;s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-on-alert-for-further-kabul-attacks-in-race-to-complete-evacuations-idUSKBN2FS052&amp;#34;&amp;gt;U.S. on alert for further Kabul attacks in race to complete evacuations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
U.S. forces helping evacuate Afghans desperate to flee Taliban rule were on alert for more attacks on Friday after an Islamic State suicide bombing outside Kabul airport killed at least 92 people, including 13 U.S. service members.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210828-001357/</link>
      <pubDate>Sat, 28 Aug 2021 00:13:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210828-001357/</guid>
      <description>The Green     Knight&amp;lt;br&amp;gt;
movie &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/24/Woods-Walk&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210827-201759/</link>
      <pubDate>Fri, 27 Aug 2021 20:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210827-201759/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/series/denied&amp;#34;&amp;gt;Denied&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/08/10/how-the-daily-wire-uses-facebooks-targeted-advertising-to-build-its-brand&amp;#34;&amp;gt;Citizen Browser How The Daily Wire Uses Facebook’s Targeted Advertising  to Build Its Brand The social media giant&amp;amp;#39;s powerful targeting tools appear to be part of Ben Shapiro’s success in growing his audience on the platform August 10, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-201720/</link>
      <pubDate>Fri, 27 Aug 2021 20:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-201720/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-on-alert-for-more-kabul-attacks-says-next-few-days-will-be-most-dangerous-idUSKBN2FS052&amp;#34;&amp;gt;U.S. on alert for more Kabul attacks, says next few days will be most dangerous&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -U.S. forces helping to evacuate Afghans desperate to flee Taliban rule were on alert for more attacks on Friday after an Islamic State suicide bombing killed at least 92 people, including 13 U.S. service members, just outside Kabul airport.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ImperialViolet - ImperialViolet.org</title>
      <link>https://www.whatsupup.com/blog/rat/realty/20210827-201038/</link>
      <pubDate>Fri, 27 Aug 2021 20:10:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rat/realty/20210827-201038/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.imperialviolet.org/2021/08/26/qrencoding.html&amp;#34;&amp;gt;Efficient QR codes&amp;lt;/a&amp;gt; (26 Aug 2021)&amp;lt;br&amp;gt;
QR codes seem to have won the battle for 2D barcodes, but they&amp;#39;re not just a bag of bits inside. Their payload is a series of segments , each of which can have a different encoding. Segments are bitstrings, concatenated without any byte-alignment, and terminated with an empty segment of type zero. If you want to squeeze the maximum amount of data into a QR code without it turning into a gray square, understanding segmentation helps.&amp;lt;br&amp;gt;
The most basic segment type is byte mode , which is a series of 8-bit bytes. If you control the QR decoder then this is perfectly efficient for encoding binary data. But you probably need to work with a variety of decoders. In that case, beware: the first edition of the QR standard, ISO/IEC 18004, said that byte mode should be interpreted as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/JIS_X_0201&amp;#34;&amp;gt;JIS X 0201&amp;lt;/a&amp;gt; . The 2005 edition changed that to be &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/ISO/IEC_8859-1&amp;#34;&amp;gt;ISO/IEC 8859-1&amp;lt;/a&amp;gt; (i.e. Latin-1). In practice, some QR decoders will attempt to content-sniff the encoding because, while UTF-8 contents should be indicated with an ECI header, they often aren&amp;#39;t and UTF-8 is really common.&amp;lt;br&amp;gt;
So if you put binary data into a QR code, you are probably going to hit these edge cases. The contents are likely going to be passed to a general operating system API for handling URLs — do you think the full pipeline will handle NUL bytes in the string, and UTF-8 non-characters and invalid surrogate pairs when interpreted as UTF-8? Also, you probably want your QR contents to be a printable string: bits of it might be shown in the scanner&amp;#39;s UI; users might need to copy and paste them.&amp;lt;br&amp;gt;
So let&amp;#39;s assume that you want something printable and consider an obvious answer: base64url. It&amp;#39;s very common, printable, and doesn&amp;#39;t contain any characters that are special in URLs for maximum compatibility. It&amp;#39;ll be encoded in a byte-mode segment: each base64url character contains 6 bits of information and takes 8 bits in the QR code for an efficiency of 75%. That&amp;#39;s our baseline.&amp;lt;br&amp;gt;
The next segment type to consider is digit mode . This only encodes the digits, 0–9, by packing triples of digits into 10 bits. If there are two digits left over at the end then they take 7 bits, and a singleton takes 4 bits. Ignoring the potential digits at the end, this lets you store 3×log 2 (10) = 3×3.322 = 9.966 bits of information in 10 bits of space. That&amp;#39;s 99.66% efficient! So you can clearly do better than base64url.&amp;lt;br&amp;gt;
The last segment type for these purposes is alphanumeric mode . These segments can encode A–Z, 0–9, and nine special characters: $, %, *, &#43;, -, ., /, :, and space. Pairs of these characters are encoded in 11 bits. (If there&amp;#39;s an odd number then the last takes 6 bits.) If you consider this to be “base-45” encoding then it stores 2×log 2 (45) = 10.98 bits in 11 bits of space, for 99.85% efficiency. Even better than digit mode, although only just.&amp;lt;br&amp;gt;
So maybe you should base-45 encode your data using that alphabet. But, of the special characters supported in alphanumeric mode, only two (minus and period) are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc3986#section-2.3&amp;#34;&amp;gt;unreserved&amp;lt;/a&amp;gt; (i.e. safe) in URLs. So you might be reduced to base-38, which cuts the efficiency to 95.42%. But having textually smaller QR contents might be valuable and worth a few percent efficiency in your context.&amp;lt;br&amp;gt;
If you&amp;#39;ve picked base-10 (digits), base-38, or even base-45 for your data then you need to get it into that form. Base-64 is easy because that&amp;#39;s exactly 6 bits per character; you work on 3 bytes of input at a time and produce exactly 4 characters of output. But 10, 38, and 45 aren&amp;#39;t powers of two. The most efficient conversion would be to treat the input as a bigint and repeatedly divmod by 10 (or 38, etc) to generate the encoding. If you have a bigint library to hand then it almost certainly has the functions for that, but it&amp;#39;s a rather obnoxious (and quadratic) amount of computation and a significant dependency. So you might be willing to waste a few bits to make things easier.&amp;lt;br&amp;gt;
Ideal input chunks would be 8 bytes or fewer, because nearly all environments will support a uint64 type and nearly all hardware can do a divmod on them. If you&amp;#39;re using base-10 then there&amp;#39;s going to be a function that can “print” a uint64 to digits for you, so let&amp;#39;s take digits as an example. With a chunk size of two bytes you would get five digits. Each digit takes 3⅓ bits of space, so 16 input bits takes 16⅔ bits: 96% efficient. Less than the 99.66% we can get with digits for sure. But if you consider all chunk sizes from one to eight bytes, turning 7-byte chunks into 17 digits is 98.82% efficient. That&amp;#39;s pretty good for the complexity savings.&amp;lt;br&amp;gt;
For base-38, 7-byte chunks are the best again, producing 11 characters for 92.56% efficiency. For base-45, two-byte chunks produce 3 characters for 96.97% efficiency. (Four- and eight-byte chunks do the same if you want fewer loop iterations.)&amp;lt;br&amp;gt;
(And you should use little-endian chunks because little-endian has won, even if the IETF hasn&amp;#39;t caught up to that yet.)&amp;lt;br&amp;gt;
Now you&amp;#39;ve got your payload encoding sorted … probably. A wrinkle is that it&amp;#39;s difficult to know how your QR encoder will segment what you give it. You might have crafted a wonderful base-38 input and it might stuff it all into a byte -mode segment! (68.65% efficient, worse than base64url.) I&amp;#39;m sadly not aware of a good QR “debugger” that shows all the details of a QR code. ZXing&amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://zxing.org/w/decode.jspx&amp;#34;&amp;gt;online service&amp;lt;/a&amp;gt; will give a hex-dump of the raw contents, but that assumes that you can decode the segment headers. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://qrlogo.kaarposoft.dk/qrdecode.html&amp;#34;&amp;gt;QR-Logo&amp;lt;/a&amp;gt; promises better debugging output but doesn&amp;#39;t work for me.) My best advice is to use ZXing on a sample QR code, ignore the 0xec, 0x11 padding pattern at the end, and calculate whether the number of bytes used roughly makes sense.&amp;lt;br&amp;gt;
You probably want to put a URL-like prefix at the front to make your QR codes distinguishable. One thing to consider is that “https://www.example.com/” is a byte-mode segment that takes 204 bits, but “HTTPS://WWW.EXAMPLE.COM/” is alphanumeric and needs only 145 bits. (That&amp;#39;s assuming QR versions 1 through 9, the lengths are slightly different otherwise.) DNS names are case insensitive and “an implementation should accept uppercase letters” for the scheme says &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/html/rfc3986#section-3.1&amp;#34;&amp;gt;RFC 3986&amp;lt;/a&amp;gt; . Maybe it just looks odd and that&amp;#39;s not worth the bits, though?&amp;lt;br&amp;gt;
We&amp;#39;ll finish up with a quick look at an example, which is the thing that started me on this path in the first place: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://spec.smarthealth.cards/&amp;#34;&amp;gt;SMART Health Cards&amp;lt;/a&amp;gt; . (Thank you to the person who pointed me at them, who likely wants to remain anonymous.)&amp;lt;br&amp;gt;
SHC&amp;#39;s are trying to squeeze a lot of data into a QR code: they &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://spec.smarthealth.cards/#health-cards-are-small&amp;#34;&amp;gt;minify&amp;lt;/a&amp;gt; their JSON structure and compress it but, even then, they sometimes &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://spec.smarthealth.cards/#creating-a-qr-code-or-a-set-of-qr-codes-from-a-health-card-jws&amp;#34;&amp;gt;span&amp;lt;/a&amp;gt; multiple QR codes and the user has to scan them all. As such their contents are a) a binary segment containing “shc:/” (and maybe sequence numbers if using multiple QR codes), and then b) a digits segment containing the payload. So they didn&amp;#39;t use “SHC:/” to save bits, but the difference is small.&amp;lt;br&amp;gt;
One thing to note is that the QR spec (ISO/IEC 18004:2005) has a whole section on “structured append” mode, where multiple QR codes can be combined into one. But trying that with iOS and Android shows that neither support it, so probably it can be considered dead and that&amp;#39;s why SHC is replicating the same feature at a higher level.&amp;lt;br&amp;gt;
Another thing to note is that SHC is using digits for better efficiency, which is great, but the way that they do it is not. They&amp;#39;re using JWT, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://fly.io/blog/api-tokens-a-tedious-survey/#jwt&amp;#34;&amp;gt;which is bad&amp;lt;/a&amp;gt; but not today&amp;#39;s topic, so they have three base64-encoded strings. They then take each base64 character, subtract 45, and turn that into two base-10 digits! All that work minifying JSON and compressing it, and then they throw away 10% of their bits on such a trivial thing!&amp;lt;br&amp;gt;
So SHC did pretty well, but missed an easy win. Having read this, you can do better.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210827-162048/</link>
      <pubDate>Fri, 27 Aug 2021 16:20:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210827-162048/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133391_gmc-explores-overlanding-with-canyon-at4-based-concept&amp;#34;&amp;gt;GMC explores overlanding with Canyon AT4-based concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133387_new-high-end-bmw-to-be-built-in-us-is-likely-x8-crossover&amp;#34;&amp;gt;New “high-end” BMW to be built in US is likely X8 crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-161737/</link>
      <pubDate>Fri, 27 Aug 2021 16:17:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-161737/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-pentagon/pentagon-says-kabul-attack-carried-out-by-one-suicide-bomber-idUSKBN2FS1IU&amp;#34;&amp;gt;Pentagon says Kabul attack carried out by one suicide bomber&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210827-161055/</link>
      <pubDate>Fri, 27 Aug 2021 16:10:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210827-161055/</guid>
      <description>27 Aug 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-08-27/slack-crashes-secret-stderr.html&amp;#34;&amp;gt;Slack&amp;#39;s Secret STDERR Messages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-121647/</link>
      <pubDate>Fri, 27 Aug 2021 12:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-121647/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-on-alert-for-more-isis-attacks-after-85-killed-in-kabul-airport-carnage-idUSKBN2FS052&amp;#34;&amp;gt;U.S. on alert for more ISIS attacks after 85 killed in Kabul airport carnage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Refiles to correct spelling of bin Laden&amp;amp;#39;s first name in paragraph 19)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban-west-ana/analysis-islamic-state-attack-signals-wests-least-bad-option-for-afghanistan-the-taliban-idUSKBN2FS0ZX&amp;#34;&amp;gt;Analysis: Islamic State attack signals West&amp;amp;#39;s least bad option for Afghanistan - the Taliban&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflect-turkey-airport/turkey-wont-help-at-kabul-airport-without-its-own-security-officials-idUSKBN2FS0LH&amp;#34;&amp;gt;Turkey won&amp;amp;#39;t help at Kabul airport without its own security -officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210827-081934/</link>
      <pubDate>Fri, 27 Aug 2021 08:19:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210827-081934/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133384_2023-aston-martin-dbx-hybrid-spy-shots-mild-hybrid-first&amp;#34;&amp;gt;2023 Aston Martin DBX hybrid spy shots: Mild-hybrid first&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-081632/</link>
      <pubDate>Fri, 27 Aug 2021 08:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-081632/</guid>
      <description>&amp;lt;p&amp;gt;SAN FRANCISCO (Reuters) -Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world&amp;#39;s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher. | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/27/microsoft-warns-cloud-customers-of-expos?videoId=734676064&amp;amp;newsChannel=&amp;#34;&amp;gt;Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-braces-for-more-isis-attacks-after-85-killed-in-kabul-airport-carnage-idUSKBN2FS052&amp;#34;&amp;gt;U.S. braces for more ISIS attacks after 85 killed in Kabul airport carnage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -U.S. forces helping to evacuate Afghans desperate to flee Taliban rule braced for more attacks on Friday after an Islamic State suicide bomber killed 85 people, including 13 U.S. soldiers outside the gates of Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-deaths/they-challenged-myanmars-junta-it-cost-them-their-lives-idUSKBN2FS0ED&amp;#34;&amp;gt;They challenged Myanmar&amp;amp;#39;s junta. It cost them their lives&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysias-new-pm-retains-finance-minister-senior-figures-in-cabinet-idUSKBN2FS09L&amp;#34;&amp;gt;Malaysia&amp;amp;#39;s new PM retains finance minister, senior figures in cabinet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-041631/</link>
      <pubDate>Fri, 27 Aug 2021 04:16:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-041631/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/microsoft-security/exclusive-microsoft-warns-thousands-of-cloud-customers-of-exposed-databases-idUSL1N2PX302&amp;#34;&amp;gt;EXCLUSIVE-Microsoft warns thousands of cloud customers of exposed databases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-braces-for-more-isis-attacks-after-carnage-at-kabul-airport-idUSKBN2FS052&amp;#34;&amp;gt;U.S. braces for more ISIS attacks after carnage at Kabul airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -U.S. forces helping to evacuate Afghans desperate to flee Taliban rule braced for more attacks on Friday after an Islamic State suicide bomber killed scores of civilians and 13 U.S. soldiers outside the  gates of Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-cases-dip-as-australia-debates-covid-19-reopening-plans-idUSKBN2FS01H&amp;#34;&amp;gt;Sydney cases dip as Australia debates COVID-19 reopening plans&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-newzealand/new-zealand-eases-nationwide-lockdown-but-auckland-shut-off-idUSKBN2FS05J&amp;#34;&amp;gt;New Zealand eases nationwide lockdown but Auckland shut off&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-001743/</link>
      <pubDate>Fri, 27 Aug 2021 00:17:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210827-001743/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: Microsoft warns thousands of its cloud computing customers of exposed databases &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-microsoft-security-exclusive/exclusive-microsoft-warns-thousands-of-cloud-customers-of-exposed-databases-idUSKBN2FR29O&amp;#34;&amp;gt;Exclusive-Microsoft warns thousands of cloud customers of exposed databases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world&amp;amp;#39;s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/microsoft-security/exclusive-microsoft-warns-thousands-of-cloud-customers-of-exposed-databases-emails-idUSL1N2PX2W7&amp;#34;&amp;gt;EXCLUSIVE-Microsoft warns thousands of cloud customers of exposed databases -emails&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO, Aug 26 Microsoft on
Thursday warned thousands of its cloud computing customers,
including some of the world&amp;amp;#39;s largest companies, that intruders
could have the ability to read, change or even delete their main
databases, according to a copy of the email and a cyber security
researcher.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-explosion/pentagon-bracing-for-more-attacks-after-troops-killed-at-kabul-airport-idUSKBN2FR1CS&amp;#34;&amp;gt;Pentagon bracing for more attacks after troops killed at Kabul airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -American forces in Kabul were bracing for more Islamic State attacks while winding up their evacuation mission, U.S. officials said, as the number of U.S. troops killed in Thursday&amp;amp;#39;s suicide bomb attack rose to 13.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/dozens-of-civilians-at-least-13-u-s-troops-killed-in-kabul-airport-attack-idUSKBN2FQ07S&amp;#34;&amp;gt;Dozens of civilians, at least 13 U.S. troops killed in Kabul airport attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-attacks-islamic/kabul-attacks-put-bitter-adversary-islamic-state-back-into-u-s-sights-idUSKBN2FR1ZF&amp;#34;&amp;gt;Kabul attacks put bitter adversary Islamic State back into U.S. sights&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-201958/</link>
      <pubDate>Thu, 26 Aug 2021 20:19:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-201958/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133358_2014-mercedes-benz-c63-dtm-race-car-for-sale&amp;#34;&amp;gt;2014 Mercedes-Benz C63 DTM race car for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-201652/</link>
      <pubDate>Thu, 26 Aug 2021 20:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-201652/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-explosion/suicide-bombings-at-kabul-airport-kill-12-u-s-troops-threat-persists-pentagon-says-idUSKBN2FR1CS&amp;#34;&amp;gt;Suicide bombings at Kabul airport kill 12 U.S. troops; threat persists, Pentagon says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -An attack in Kabul claimed by Islamic State killed 12 U.S. troops on Thursday and wounded 15 others, a top U.S. general said, adding U.S. forces were prepared for more attacks even as the evacuation continued.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/dozens-of-civilians-12-u-s-troops-killed-in-bloodbath-at-kabul-airport-idUSKBN2FQ07S&amp;#34;&amp;gt;Dozens of civilians, 12 U.S. troops killed in bloodbath at Kabul airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-attacks-islamic/islamic-state-claims-responsibility-for-deadly-kabul-airport-attack-idUSKBN2FR1ZF&amp;#34;&amp;gt;Islamic State claims responsibility for deadly Kabul airport attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210826-201424/</link>
      <pubDate>Thu, 26 Aug 2021 20:14:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210826-201424/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/updates-on-our-continued-collaboration.html&amp;#34;&amp;gt;Updates on our continued collaboration with NIST to secure the Software Supply Chain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Eric Brewer and Dan Lorenc Yesterday, we were honored to participate in President Biden’s White House Cyber Security Summit where we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/&amp;#34;&amp;gt;shared&amp;lt;/a&amp;gt; recommendations to advance the administration’s cybersecurity agenda. This included our commitment to invest $10 billion over the next five years to expand zero-trust programs, help secure the software supply chain, and enhance open-source security. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/updates-on-our-continued-collaboration.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Eric Brewer and Dan Lorenc&amp;lt;br&amp;gt;
Yesterday, we were honored to participate in President Biden’s White House Cyber Security Summit where we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/why-were-committing-10-billion-to-advance-cybersecurity/&amp;#34;&amp;gt;shared&amp;lt;/a&amp;gt; recommendations to advance the administration’s cybersecurity agenda. This included our commitment to invest $10 billion over the next five years to expand zero-trust programs, help secure the software supply chain, and enhance open-source security. At Google, we’ve long advocated for securing the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/identity-security/how-were-helping-reshape-software-supply-chain-ecosystem-securely&amp;#34;&amp;gt;software supply chain&amp;lt;/a&amp;gt; both through our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/identity-security/applying-zero-trust-to-user-access-and-production-services&amp;#34;&amp;gt;internal best practices&amp;lt;/a&amp;gt; and industry efforts that enhance the integrity and security of software. That’s why we&amp;amp;#39;re thrilled to collaborate with the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) to support and develop a new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/&amp;#34;&amp;gt;framework&amp;lt;/a&amp;gt; that will help to improve the security and integrity of the technology supply chain. This builds on our previous work in June of this year, where we submitted four statements in response to the National Telecommunications and Information Administration (NTIA) and NIST’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/workshop-and-call-position-papers&amp;#34;&amp;gt;call for position papers&amp;lt;/a&amp;gt; to help guide adoption of new software supply chain security standards and guidelines that fulfill components of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&amp;#34;&amp;gt;Executive Order on Improving the Nation’s Cybersecurity&amp;lt;/a&amp;gt; . The papers lay out concrete ways to increase the nation’s cybersecurity, based on Google’s experience building secure by design systems for our users and enterprise customers. Each of the suggestions are enactable solutions for software supply chain security, and were drawn from Google’s research and innovations in engineering away entire classes of vulnerabilities. NIST and NTIA also released their guidelines in July for several of the Executive Order’s target areas ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ntia.gov/files/ntia/publications/sbom_minimum_elements_report.pdf&amp;#34;&amp;gt;SBOM Minimum Elements&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/2021/07/09/Critical%20Software%20Use%20Security%20Measures%20Guidance.pdf&amp;#34;&amp;gt;Critical Software Guidelines&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/2021/07/13/Developer%20Verification%20of%20Software.pdf&amp;#34;&amp;gt;Developer Verification of Software&amp;lt;/a&amp;gt; ), incorporating specific recommendations from Google. Below are summaries of each of Google’s position papers, and background on our contributions and impact in each area.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/noindex/2021/06/08/Google%20NIST%20statement%20on%20%282%29%20development.pdf&amp;#34;&amp;gt;High-Confidence, Scalable Secure Development&amp;lt;/a&amp;gt; Instead of being reactive to vulnerabilities, we should eliminate them proactively with secure languages, platforms, and frameworks that stop entire classes of bugs. Preventing problems before they leave the developer’s keyboard is safer and more cost effective than trying to fix vulnerabilities and their fallout. (Consider the enormous impact of the SolarWinds attack, which is predicted to take &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.rpc.senate.gov/policy-papers/the-solarwinds-cyberattack&amp;#34;&amp;gt;$100 billion to remediate&amp;lt;/a&amp;gt; .) Google promotes  designs that are secure by default and impervious to simple errors that can lead to security vulnerabilities. We want to see secure systems used as widely as possible, so we have invested in initiatives such as getting &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linuxfoundation.org/en/press-release/google-funds-linux-kernel-developers-to-focus-exclusively-on-security/&amp;#34;&amp;gt;Rust into the Linux Kernel&amp;lt;/a&amp;gt; , published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://research.google/pubs/pub42934/&amp;#34;&amp;gt;research papers&amp;lt;/a&amp;gt; , and shared &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://queue.acm.org/detail.cfm?id=3447806&amp;amp;doi=10.1145%2F3442632.3447806&amp;#34;&amp;gt;guidance on secure frameworks&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/noindex/2021/06/08/Google%20NIST%20statement%20on%20%283%29%20security%20measures.pdf&amp;#34;&amp;gt;Security Measures for Critical Software&amp;lt;/a&amp;gt; Critical software does not exist in a vacuum; we must also harden the broader systems and run environments. Our paper outlines a list of actionable steps for critical software&amp;amp;#39;s configuration, the privileges with which it runs, and the network(s) to which it is connected. Our suggestions are based on practices that have withstood the tests of time and scale, such as in our Google Cloud Products, built on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/identity-security/delivering-the-industrys-most-trusted-cloud&amp;#34;&amp;gt;one of the industry’s most trusted clouds&amp;lt;/a&amp;gt; . Google contributes to open-source tools that help maintainers adopt these practices, such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/containers-kubernetes/how-gvisor-protects-google-cloud-services-from-cve-2020-14386&amp;#34;&amp;gt;gVisor&amp;lt;/a&amp;gt; for sandboxing, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/glome&amp;#34;&amp;gt;GLOME&amp;lt;/a&amp;gt; for authentication and authorization. Additionally, to share the knowledge we have gained securing systems that serve billions of users, we released our book &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sre.google/books/building-secure-reliable-systems/&amp;#34;&amp;gt;Building Secure and Reliable Systems&amp;lt;/a&amp;gt; , a resource for any organization that wants to design systems that are fundamentally secure, reliable, and scalable.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/noindex/2021/06/08/Google%20NIST%20statement%20on%20%284%29%20testing.pdf&amp;#34;&amp;gt;Software Source Code Testing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2019/02/open-sourcing-clusterfuzz.html&amp;#34;&amp;gt;Continuous fuzzing&amp;lt;/a&amp;gt; is indispensable for identifying bugs and catching vulnerabilities before attackers do. We also suggest securing dependencies using automated tools such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard&amp;#34;&amp;gt;Scorecards&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-06-01-keep-all-your-packages-up-to-date-with-dependabot/&amp;#34;&amp;gt;Dependabot&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://osv.dev/&amp;#34;&amp;gt;OSV&amp;lt;/a&amp;gt; . Google has made huge contributions to the field of fuzzing, and has found tens of thousands of bugs with tools like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://llvm.org/docs/LibFuzzer.html&amp;#34;&amp;gt;libFuzzer&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2019/02/open-sourcing-clusterfuzz.html&amp;#34;&amp;gt;ClusterFuzz&amp;lt;/a&amp;gt; . We have made continuous fuzzing available to all developers through &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/oss-fuzz/getting-started/continuous-integration/&amp;#34;&amp;gt;OSS-Fuzz&amp;lt;/a&amp;gt; , and are &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://google.github.io/oss-fuzz/getting-started/integration-rewards/&amp;#34;&amp;gt;funding integration costs&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/10/fuzzing-internships-for-open-source.html&amp;#34;&amp;gt;fuzzing internships&amp;lt;/a&amp;gt; . We are leading a shift in industry support: on top of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/about/appsecurity/reward-program/index.html&amp;#34;&amp;gt;bug bounties&amp;lt;/a&amp;gt; , which are rewards programs for finding bugs, we have also added &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/about/appsecurity/patch-rewards/&amp;#34;&amp;gt;patch rewards&amp;lt;/a&amp;gt; , money that can help fund maintainers remediate uncovered bugs.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nist.gov/system/files/documents/noindex/2021/06/08/Google%20NIST%20statement%20on%20%285%29%20integrity.pdf&amp;#34;&amp;gt;Software Supply Chain Integrity&amp;lt;/a&amp;gt; Google strongly encourages adoption of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://slsa.dev/&amp;#34;&amp;gt;SLSA&amp;lt;/a&amp;gt; , an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain. Four “SLSA Levels” provide incrementally adoptable guidelines that each raise the bar on security standards for open-source software. SLSA is based on Google’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/security/binary-authorization-for-borg&amp;#34;&amp;gt;internal framework&amp;lt;/a&amp;gt; Binary Authorization for Borg (BAB) that ensures that all software packages used by the company meet high integrity standards. Given BAB’s success, we have adapted the framework to work for systems beyond Google and released it as SLSA to help protect other organizations and platforms. We have shared many of Google’s practices for security and reliability in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sre.google/books/&amp;#34;&amp;gt;Site Reliability Engineering&amp;lt;/a&amp;gt; book. Following our recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html&amp;#34;&amp;gt;introduction of SLSA&amp;lt;/a&amp;gt; to the wider public, we are looking forward to making improvements in response to community feedback.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ntia.doc.gov/files/ntia/publications/google_-_2021.06.17.pdf&amp;#34;&amp;gt;Minimum Requirements for SBOMs&amp;lt;/a&amp;gt; Google submitted an additional paper in response to the NTIA’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ntia.gov/federal-register-notice/2021/notice-rfc-software-bill-materials-elements-considerations&amp;#34;&amp;gt;request for comments&amp;lt;/a&amp;gt; on creating SBOMs, which will give users information about a software package’s contents. Modern development requires different approaches than classic packaged software, which means SBOMs must also deal with intermediate artifacts like containers and library dependencies. SBOMs need a reasonable signal-to-noise ratio: if they contain too much information, they won’t be useful, so we urge the NTIA to establish both minimum and maximum requirements on granularity and depth for specific use-cases. We also recommend considerations for the creation of trustworthy SBOMs, such as using verifiable data generation methods to capture metadata, and preparing for the automation and tooling technologies that will be key for widespread SBOM adoption.&amp;lt;br&amp;gt;
Improving Everyone’s Security We are committed to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/technology/safety-security/how-google-supports-todays-critical-cybersecurity-efforts/&amp;#34;&amp;gt;helping advance collective cybersecurity&amp;lt;/a&amp;gt; . We also realize that too many guidelines and lists of best practices can become overwhelming, but any incremental changes in the right direction make a real difference. We encourage companies and maintainers to start evaluating today where they stand on the most important security postures, and to make improvements with the guidance of these papers in the areas of greatest risk. No single entity can fix the problems we all face in this area, but by being open about our practices and sharing our research and tools, we can all help raise the standards for our collective security.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/%23supplychain%20%23security%20%23opensource&amp;#34;&amp;gt;#supplychain #security #opensource&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/%23supplychain%20%23security%20%23opensource&amp;#34;&amp;gt;#supplychain #security #opensource&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-162023/</link>
      <pubDate>Thu, 26 Aug 2021 16:20:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-162023/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133375_callaway-readies-first-take-on-the-c8-chevy-corvette&amp;#34;&amp;gt;Callaway readies first take on the C8 Chevy Corvette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133372_toyota-to-build-fuel-cells-at-kentucky-plant&amp;#34;&amp;gt;Toyota to build fuel cells at Kentucky plant&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123368_mercedes-benz-amg-gt-4-door-coupe-plug-in-hybrid-flagship-teased-ahead-of-sept-1-reveal&amp;#34;&amp;gt;Mercedes-Benz AMG GT 4-Door Coupe plug-in hybrid flagship teased ahead of Sept. 1 reveal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-161647/</link>
      <pubDate>Thu, 26 Aug 2021 16:16:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-161647/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/attack-on-kabul-airport-kills-at-least-13-airlift-thrust-into-chaos-idUSKBN2FQ07S&amp;#34;&amp;gt;Attack on Kabul airport kills at least 13; airlift thrust into chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Suspected suicide bombers struck the crowded gates of Kabul airport with at least two explosions on Thursday, causing a bloodbath among desperate civilians hoping to flee and casting the final days of the Western airlift of its allies into chaos.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-robotics-qatar/dont-abandon-afghanistan-pleads-member-of-afghan-all-female-robotics-team-idUSKBN2FR1JO&amp;#34;&amp;gt;Don&amp;amp;#39;t abandon Afghanistan, pleads member of Afghan all-female robotics team&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-explosion/u-s-says-two-explosions-near-kabul-airport-islamic-state-suspected-idUSKBN2FR1CS&amp;#34;&amp;gt;U.S. says two explosions near Kabul airport; Islamic State suspected&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210826-160628/</link>
      <pubDate>Thu, 26 Aug 2021 16:06:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210826-160628/</guid>
      <description>In 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he’s confident he has located two young men in the United Kingdom responsible for using a clever piece of digital clipboard-stealing malware to siphon his crypto holdings. Schober is now suing each of their parents in a civil case that seeks to extract what their children would not return voluntarily.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-121957/</link>
      <pubDate>Thu, 26 Aug 2021 12:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210826-121957/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133371_tiny-citroen-ami-electric-car-to-be-sold-by-opel-as-the-rocks-e&amp;#34;&amp;gt;Tiny Citroen Ami electric car to be sold by Opel as the Rocks-e&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133370_2022-mercedes-benz-citan-compact-commercial-van-gets-redesign-electric-option&amp;#34;&amp;gt;2022 Mercedes-Benz Citan compact commercial van gets redesign, electric option&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133339_jay-leno-tests-a-jeep-6x6-built-by-florida-s-apocalypse&amp;#34;&amp;gt;Jay Leno tests a Jeep 6x6 built by Florida&amp;amp;#39;s Apocalypse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-121611/</link>
      <pubDate>Thu, 26 Aug 2021 12:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-121611/</guid>
      <description>(Reuters) -The United States and allies urged Afghans to leave Kabul airport on Thursday, citing the threat of an attack by Islamic State (IS) militants, as Western troops hurry to evacuate as many people as possible before an Aug. 31 deadline.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/25/no-goodbye-all-girl-afghan-robotics-team?videoId=734600883&amp;amp;videoChannel=118169&amp;#34;&amp;gt;No goodbye: All-girl Afghan robotics team flee home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-081627/</link>
      <pubDate>Thu, 26 Aug 2021 08:16:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-081627/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghans-told-to-leave-kabul-airport-over-very-credible-islamic-state-threat-idUSKBN2FQ07S&amp;#34;&amp;gt;Afghans told to leave Kabul airport over &amp;#39;very credible&amp;#39; Islamic State threat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -The United States and allies urged people to move away from Kabul airport on Thursday due to the threat of a terror attack by Islamic State (IS) militants as Western troops hurry to evacuate as many people as possible before an Aug. 31 deadline.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-israel/biden-israeli-pm-seek-to-reset-relations-narrow-differences-on-iran-idUSKBN2FR0BY&amp;#34;&amp;gt;Biden, Israeli PM seek to reset relations, narrow differences on Iran&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-politics/japans-suga-faces-challengers-in-ruling-party-leadership-race-idUSKBN2FR074&amp;#34;&amp;gt;Japan&amp;amp;#39;s Suga faces challengers in ruling party leadership race&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-041652/</link>
      <pubDate>Thu, 26 Aug 2021 04:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-041652/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghans-told-to-avoid-kabul-airport-as-islamic-state-threat-emerges-idUSKBN2FQ07S&amp;#34;&amp;gt;Afghans told to avoid Kabul airport as Islamic State threat emerges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -The United States and allies urged people to move away from Kabul airport on Thursday due to the threat of an Islamic State terror attack as Western troops hurry to evacuate as many Afghans as possible before an Aug. 31 deadline.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210826-040614/</link>
      <pubDate>Thu, 26 Aug 2021 04:06:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210826-040614/</guid>
      <description>In 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he’s confident he has located two young men in the United Kingdom responsible for using a clever piece of digital clipboard-stealing malware that let them siphon his crypto holdings. Schober is now suing each of their parents in a civil case that seeks to extract what their children would not return voluntarily.&amp;lt;br&amp;gt;
In a lawsuit filed in Colorado, Schober said the sudden disappearance of his funds in January 2018 prompted him to spend more than $10,000 hiring experts in the field of tracing cryptocurrency transactions. After months of sleuthing, his investigators identified the likely culprits: Two young men in Britain who were both minors at the time of the crime (both are currently studying computer science at U.K. universities).&amp;lt;br&amp;gt;
A forensic investigation of Schober’s computer found he’d inadvertently downloaded malicious software after clicking a link posted on Reddit for a purported cryptocurrency wallet application called “Electrum Atom.” Investigators determined that the malware was bundled with the benign program, and was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/clipboard-hijacker-malware-monitors-23-million-bitcoin-addresses/&amp;#34;&amp;gt;designed to lie in wait for users to copy a cryptocurrency address to their computer’s temporary clipboard&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“It seems your son has been using malware to steal money from people online,” reads the opening paragraph of the letter Schober emailed to the families. “Losing that money has been financially and emotionally devastating. He might have thought he was playing a harmless joke, but it has had serious consequences for my life.”&amp;lt;br&amp;gt;
Neither of the defendants’ families are disputing the basic claim that their kids stole from Mr. Schober. Rather, they’re asserting that time has run out on Schober’s legal ability to claim a cause of action against them. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/man-robbed-of-16-bitcoin-sues-young-thieves-parents/#more-56713&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210826-001841/</link>
      <pubDate>Thu, 26 Aug 2021 00:18:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210826-001841/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/25/technology/facebook-election-commission.html&amp;#34;&amp;gt;Facebook Said to Consider Forming an Election Commission The social network has contacted academics to create a group to advise it on thorny election-related decisions, said people with knowledge of the matter. By Ryan Mac, Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-001643/</link>
      <pubDate>Thu, 26 Aug 2021 00:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210826-001643/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/western-nations-rush-to-complete-afghan-evacuation-before-troops-leave-idUSKBN2FQ07S&amp;#34;&amp;gt;Western nations rush to complete Afghan evacuation before troops leave&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -Western nations scrambled to evacuate people from Afghanistan on Wednesday but acknowledged that many Afghans who helped during two decades of war would be left behind to face an uncertain fate under the Taliban when foreign troops leave next week.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-un-staff-exclusi/exclusive-internal-u-n-document-says-taliban-threatened-beat-staff-idUSKBN2FQ1LE&amp;#34;&amp;gt;Exclusive: Internal U.N. document says Taliban threatened, beat staff&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-israel/biden-to-tell-israel-pm-he-shares-alarm-over-iran-but-sticking-to-nuclear-diplomacy-idUSKBN2FQ1YP&amp;#34;&amp;gt;Biden to tell Israel PM he shares alarm over Iran but sticking to nuclear diplomacy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210826-000643/</link>
      <pubDate>Thu, 26 Aug 2021 00:06:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210826-000643/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/man-robbed-of-16-bitcoin-sues-young-thieves-parents/&amp;#34;&amp;gt;Man Robbed of 16 Bitcoin Sues Young Thieves’ Parents&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he’s confident he has located two young men in the United Kingdom responsible for developing a clever piece of digital clipboard-stealing malware that let them siphon his crypto holdings. Schober is now suing each of their parents in a civil case that seeks to extract what their children would not return voluntarily.&amp;lt;br&amp;gt;
In a lawsuit filed in Colorado, Schober said the sudden disappearance of his funds in January 2018 prompted him to spend more than $10,000 hiring experts in the field of tracing cryptocurrency transactions. After months of sleuthing, his investigators identified the likely culprits: Two young men in Britain who were both minors at the time of the crime.&amp;lt;br&amp;gt;
A forensic investigation of Schober’s computer found he’d inadvertently downloaded malicious software after clicking a link posted on Reddit for a purported cryptocurrency wallet application called “Electrum Atom.” Investigators determined that the malware was bundled with the benign program, and was designed to lie in wait for users to copy a cryptocurrency address to their computer’s temporary clipboard.&amp;lt;br&amp;gt;
When Schober went to move approximately 16.4 bitcoins from one account to another — by pasting the lengthy payment address he’d just copied — the malware replaced his bitcoin payment address with a different address controlled by the young men.&amp;lt;br&amp;gt;
Schober’s lawsuit lays out how his investigators traced the stolen funds through cryptocurrency exchanges and on to the two youths in the United Kingdom. In addition, they found one of the defendants — just hours after Schober’s bitcoin was stolen — had posted a message to GitHub asking for help accessing the private key corresponding to the public key of the bitcoin address used by the clipboard-stealing malware.&amp;lt;br&amp;gt;
Investigators found the other defendant had the malware code that was bundled with the Electrum Atom application in his Github code library.&amp;lt;br&amp;gt;
Initially, Schober hoped that the parents of the thieving teens would listen to reason, and simply return the money. So he wrote a letter to the parents of both boys:&amp;lt;br&amp;gt;
“It seems your son has been using malware to steal money from people online,” reads the opening paragraph of the letter Schober emailed to the parents of the boys, both of whom are studying computer science at U.K. universities. “Losing that money has been financially and emotionally devastating. He might have thought he was playing a harmless joke, but it has had serious consequences for my life.”&amp;lt;br&amp;gt;
A portion of the letter than Schober sent to two of the defendants in 2018, after investigators determined their sons were responsible for stealing nearly $1 million in cryptocurrency from Schober.&amp;lt;br&amp;gt;
Met with continued silence from the parents for many months, Schober filed suit against the kids and their parents in a Colorado court. A copy of the May 2021 complaint is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/08/schobervthompson.pdf&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; (PDF).&amp;lt;br&amp;gt;
Now they are responding. One of the defendants — Hazel D. Wells — just &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/08/pro-se-wells.pdf&amp;#34;&amp;gt;filed a motion&amp;lt;/a&amp;gt; with the court to represent herself and her son in lieu of hiring an attorney. In a filing on Aug. 9, Wells helpfully included the letter in the screenshot above, and volunteered that her son had been questioned by U.K. authorities in connection with the bitcoin theft.&amp;lt;br&amp;gt;
Neither of the defendants’ families are disputing the basic claim that their kids stole from Mr. Schober. Rather, they’re claiming that time has run out on Schober’s legal ability to claim a cause of action against them. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/man-robbed-of-16-bitcoin-sues-young-thieves-parents/#more-56713&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-201623/</link>
      <pubDate>Wed, 25 Aug 2021 20:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-201623/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/western-nations-race-to-complete-afghan-evacuation-just-days-before-deadline-idUSKBN2FQ07S&amp;#34;&amp;gt;Western nations race to complete Afghan evacuation just days before deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -Western nations rushed to evacuate people from Afghanistan on Wednesday with less than a week left until all foreign troops leave, acknowledging that many Afghans who helped them will be left behind to an uncertain fate under the Taliban.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-china/china-criticises-u-s-scapegoating-as-covid-origin-report-to-be-released-idUSKBN2FQ0SO&amp;#34;&amp;gt;China criticises U.S. &amp;amp;#39;scapegoating&amp;amp;#39; as COVID origin report to be released&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-161944/</link>
      <pubDate>Wed, 25 Aug 2021 16:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-161944/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133356_2023-bmw-alpina-b4-gran-coupe-spy-shots&amp;#34;&amp;gt;2023 BMW Alpina B4 Gran Coupe spy shots&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133354_flagship-lucid-air-dream-edition-will-offer-performance-grade-with-1-111-hp&amp;#34;&amp;gt;Flagship Lucid Air Dream Edition will offer Performance grade with 1,111 hp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131813_2022-toyota-gr86-2023-chevrolet-corvette-z06-hennessey-venom-f5-this-week-s-top-photos&amp;#34;&amp;gt;2022 Toyota GR86, 2023 Chevrolet Corvette Z06, Hennessey Venom F5: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210825-161817/</link>
      <pubDate>Wed, 25 Aug 2021 16:18:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210825-161817/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/25/style/onlyfans-ban-reversed.html&amp;#34;&amp;gt;OnlyFans Reverses Its Decision to Ban Explicit Content Many of the platform’s stars felt the sting of being turned away by a business they helped build. By Jacob Bernstein&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-161621/</link>
      <pubDate>Wed, 25 Aug 2021 16:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-161621/</guid>
      <description>Delta to add $200 monthly health insurance charge for unvaccinated staff &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/aerospace-defense/delta-add-200-monthly-health-insurance-charge-unvaccinated-staff-2021-08-25/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Western nations rushed to evacuate people from Afghanistan on Wednesday as the Aug. 31 deadline for the withdrawal of foreign troops drew closer and fears grew that many could be left behind to an uncertain fate under the country&amp;#39;s new Taliban rulers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-appointments/taliban-appoint-senior-veterans-to-key-ministerial-posts-idUSKBN2FQ145&amp;#34;&amp;gt;Taliban appoint senior veterans to key ministerial posts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20210825-161619/</link>
      <pubDate>Wed, 25 Aug 2021 16:16:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20210825-161619/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-08-25-2021-transparency-report-january-to-june/&amp;#34;&amp;gt;2021 Transparency Report: January to June&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
We’re reporting on a six-month period rather than annually to increase our level of transparency. For this report, we’ve added more granularity to our 2020 stats.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210825-160705/</link>
      <pubDate>Wed, 25 Aug 2021 16:07:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210825-160705/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/bumble-vulnerability/&amp;#34;&amp;gt;Vulnerability in Bumble dating app reveals any user&amp;#39;s exact location&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
25 Aug 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-122007/</link>
      <pubDate>Wed, 25 Aug 2021 12:20:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-122007/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132752_2022-subaru-wrx-to-debut-sept-10&amp;#34;&amp;gt;2022 Subaru WRX to debut Sept. 10&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-121621/</link>
      <pubDate>Wed, 25 Aug 2021 12:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-121621/</guid>
      <description>&amp;lt;p&amp;gt;Toshiba in talks with four investment firms for strategic ideas: sources &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology/exclusive-toshiba-talks-with-four-investment-firms-strategic-ideas-sources-2021-08-25/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/western-nations-race-to-complete-afghan-evacuation-as-deadline-looms-idUSKBN2FQ07S&amp;#34;&amp;gt;Western nations race to complete Afghan evacuation as deadline looms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Western nations rushed to complete the evacuation of thousands of people from Afghanistan on Wednesday as the Aug. 31 deadline for the withdrawal of foreign troops drew closer with no sign that the country&amp;amp;#39;s new Taliban rulers might allow an extension.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-china/u-s-china-accuse-each-other-of-bullying-nations-idUSKBN2FQ07G&amp;#34;&amp;gt;U.S., China accuse each other of &amp;amp;#39;bullying&amp;amp;#39; nations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-counterterro/after-taliban-takeover-concerns-mount-over-u-s-counterterrorism-ability-idUSKBN2FQ0XU&amp;#34;&amp;gt;After Taliban takeover, concerns mount over U.S. counterterrorism ability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-041656/</link>
      <pubDate>Wed, 25 Aug 2021 04:16:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-041656/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghanistan-faces-humanitarian-crisis-as-airlift-deadline-looms-idUSKBN2FQ07S&amp;#34;&amp;gt;Afghanistan faces humanitarian crisis as airlift deadline looms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Afghanistan&amp;amp;#39;s neighbours should open their land borders to allow more people to leave, a NATO country diplomat said on Wednesday, as aid agencies warned of a looming humanitarian crisis under the new Taliban rulers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-china/china-state-media-says-u-s-vp-harris-seeking-to-divide-asia-idUSKBN2FQ07G&amp;#34;&amp;gt;China state media says U.S. VP Harris seeking to divide Asia&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210825-041417/</link>
      <pubDate>Wed, 25 Aug 2021 04:14:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210825-041417/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#knuth&amp;#34;&amp;gt;knuth&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#puzzles&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#typography&amp;#34;&amp;gt;typography&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
My lovely wife and I have just moved house, and while boxing up the contents
of my desk I ran across physical paper copies of two weakly themed crosswords
I made in 2011. Might as well immortalize them in the digital realm…&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-002056/</link>
      <pubDate>Wed, 25 Aug 2021 00:20:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210825-002056/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133344_2022-porsche-taycan-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Porsche Taycan brings more tech, personalization&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-001715/</link>
      <pubDate>Wed, 25 Aug 2021 00:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210825-001715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/biden-pushes-for-aug-31-afghanistan-pullout-as-threat-of-attacks-rise-idUSKBN2FP06G&amp;#34;&amp;gt;Biden pushes for Aug. 31 Afghanistan pullout as threat of attacks rise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -U.S. President Joe Biden said on Tuesday the United States is on pace to finish evacuations from Afghanistan by Aug. 31, but left open the chance of the deadline being extended, saying reaching that goal is dependent on continued cooperation from the country&amp;amp;#39;s new Taliban rulers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-evacuation-e/explainer-what-happens-after-bidens-evacuation-force-leaves-afghanistan-idUSKBN2FP23B&amp;#34;&amp;gt;Explainer-What happens after Biden&amp;amp;#39;s evacuation force leaves Afghanistan?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-vietnam/u-s-vp-harris-forges-on-with-vietnam-trip-despite-mystery-health-incident-idUSKBN2FP141&amp;#34;&amp;gt;U.S. VP Harris forges on with Vietnam trip despite mystery &amp;amp;#39;health incident&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-202010/</link>
      <pubDate>Tue, 24 Aug 2021 20:20:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-202010/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133259_2024-land-rover-range-rover-sport-svr-spy-shots-video&amp;#34;&amp;gt;2024 Land Rover Range Rover Sport SVR spy shots and video: High-performance crossover takes shape&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-201641/</link>
      <pubDate>Tue, 24 Aug 2021 20:16:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-201641/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/biden-aims-for-aug-31-afghanistan-pullout-as-risk-of-attacks-rises-idUSKBN2FP06G&amp;#34;&amp;gt;Biden aims for Aug. 31 Afghanistan pullout as risk of attacks rises&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -Afghanistan&amp;amp;#39;s new Taliban rulers said on Tuesday all foreign evacuations from the country must be completed by Aug. 31, and the White House said U.S. President Joe Biden is aiming to stick to the date due to the mounting threat of militant attacks.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-pentagon/u-s-on-pace-to-complete-afghan-pullout-by-aug-31-biden-told-g7-idUSKBN2FP1CO&amp;#34;&amp;gt;U.S. on pace to complete Afghan pullout by Aug 31, Biden told G7&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-vietnam/u-s-vp-harris-pushes-ahead-with-vietnam-trip-despite-mystery-health-incident-idUSKBN2FP141&amp;#34;&amp;gt;U.S. VP Harris pushes ahead with Vietnam trip despite mystery &amp;amp;#39;health incident&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210824-200800/</link>
      <pubDate>Tue, 24 Aug 2021 20:08:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210824-200800/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/eight-educational-communities-to-further-your-field-of-study-7839d0ca8dea?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Eight Educational Communities To Further Your Field of Study&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/eight-educational-communities-to-further-your-field-of-study-7839d0ca8dea?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Eight Educational Communities To Further Your Field of Study Whether you’re looking to ace a class or dive into a new hobby, these eight communities can help you master your field of interest.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-161956/</link>
      <pubDate>Tue, 24 Aug 2021 16:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-161956/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1023683_2023-aston-martin-vantage-v12-rs-spy-shots&amp;#34;&amp;gt;2023 Aston Martin Vantage V12 RS spy shots: Hardcore variant to top updated range&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-161613/</link>
      <pubDate>Tue, 24 Aug 2021 16:16:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-161613/</guid>
      <description>&amp;lt;p&amp;gt;Reuters photographer was killed after being left behind in retreat, Afghan general says &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/afghanistan-conflict-reuters-siddiqui/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-says-no-evacuation-extension-as-g7-meets-on-afghan-crisis-idUSKBN2FP06G&amp;#34;&amp;gt;Taliban says no evacuation extension as G7 meets on Afghan crisis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Afghanistan&amp;amp;#39;s new Taliban rulers said on Tuesday they wanted all foreign evacuations from the country completed by an Aug. 31 deadline and they would not agree to an extension.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-deadline/biden-agrees-with-pentagon-recommendation-to-stick-to-aug-31-afghan-pullout-deadline-source-idUSKBN2FP1F8&amp;#34;&amp;gt;Biden agrees with Pentagon recommendation to stick to Aug 31 Afghan pullout deadline – source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-cia/cia-director-met-taliban-leader-in-afghanistan-on-monday-sources-idUSKBN2FP0S4&amp;#34;&amp;gt;CIA director met Taliban leader in Afghanistan on Monday -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210824-160738/</link>
      <pubDate>Tue, 24 Aug 2021 16:07:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210824-160738/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-for-startups/&amp;#34;&amp;gt;Retool for Startups: Early-stage startups can now build internal tools for free Focus on building your core product, not custom internal tools. Early-stage startups now get a free year of Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-121849/</link>
      <pubDate>Tue, 24 Aug 2021 12:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210824-121849/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125663_2022-mazda-mx-30-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Mazda MX-30 electric crossover priced from $34,645, limited to California&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133173_lamborghini-miura-originally-owned-by-a-19-year-old-student-sells-for-almost-2-1m&amp;#34;&amp;gt;Lamborghini Miura originally owned by a 19-year-old student sells for almost $2.1M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133337_land-rover-range-rover-sport-svr-ultimate-edition-bows-with-bespoke-touches&amp;#34;&amp;gt;Land Rover Range Rover Sport SVR Ultimate Edition bows with bespoke touches&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133269_jay-leno-drives-a-talbot-lago-that-was-lost-for-nearly-60-years&amp;#34;&amp;gt;Jay Leno drives a Talbot-Lago that was lost for nearly 60 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-121529/</link>
      <pubDate>Tue, 24 Aug 2021 12:15:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-121529/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-evacuation-on-war-footing-as-g7-meets-on-pullout-deadline-idUSKBN2FP06G&amp;#34;&amp;gt;Afghan evacuation on &amp;#39;war footing&amp;#39; as G7 meets on pullout deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Western forces at Kabul airport worked frantically on Tuesday to get people out of Afghanistan before an Aug. 31 deadline, as U.S. President Joe Biden faced growing pressure to negotiate more time for the airlift of thousands trying to flee.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-fentanyl-exclusive/exclusive-limited-chinese-cooperation-hindering-u-s-fentanyl-fight-congress-report-idUSKBN2FP0QM&amp;#34;&amp;gt;Exclusive: Limited Chinese cooperation hindering U.S. fentanyl fight -congress report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-cia/cia-director-met-taliban-leader-in-afghanistan-on-monday-reports-idUSKBN2FP0S4&amp;#34;&amp;gt;CIA director met Taliban leader in Afghanistan on Monday - reports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-081546/</link>
      <pubDate>Tue, 24 Aug 2021 08:15:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-081546/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-evacuation-on-war-footing-as-g7-meets-on-taliban-deadline-idUSKBN2FP06G&amp;#34;&amp;gt;Afghan evacuation on &amp;#39;war footing&amp;#39; as G7 meets on Taliban deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Western countries worked at a &amp;amp;#34;war-footing pace&amp;amp;#34; on Tuesday to get people out of Afghanistan, a NATO country diplomat said, as U.S. President Joe Biden looked set to come under pressure from other G7 leaders to seek more time to complete the airlift.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-singapore/u-s-vp-harris-says-china-intimidates-to-back-south-china-sea-claims-idUSKBN2FP053&amp;#34;&amp;gt;U.S. VP Harris says China intimidates to back South China Sea claims&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-engagement/taliban-rule-presents-aid-agencies-with-moral-fiscal-dilemma-idUSKBN2FP09C&amp;#34;&amp;gt;Taliban rule presents aid agencies with moral, fiscal dilemma&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-041642/</link>
      <pubDate>Tue, 24 Aug 2021 04:16:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-041642/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/g7-to-meet-on-afghanistan-deadline-taliban-recognition-idUSKBN2FP06G&amp;#34;&amp;gt;G7 to meet on Afghanistan deadline, Taliban recognition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Leaders of the Group of Seven countries were set to discuss on Tuesday whether to seek an extension to a Aug. 31 deadline for the evacuation of thousands of people trying to flee Afghanistan and whether to recognise or sanction a Taliban government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-g7-leaders/g7-leaders-plan-to-pledge-unity-on-taliban-recognition-sanctions-sources-idUSKBN2FO1S8&amp;#34;&amp;gt;G7 leaders plan to pledge unity on Taliban recognition, sanctions -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-politics/japan-ldp-executive-nikai-says-he-backs-pm-suga-for-party-chief-idUSKBN2FP049&amp;#34;&amp;gt;Japan LDP executive Nikai says he backs PM Suga for party chief&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210824-001827/</link>
      <pubDate>Tue, 24 Aug 2021 00:18:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210824-001827/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/08/23/espanol/facebook-workrooms-realidad-virtual.html&amp;#34;&amp;gt;La nueva apuesta de Facebook por la realidad virtual: salas de conferencias La pandemia renovó el interés por la realidad virtual. Facebook intenta sacar provecho con un nuevo servicio de salas de reuniones. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/19/technology/facebooks-new-bet-on-virtual-reality-conference-rooms.html&amp;#34;&amp;gt;Read in English&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/08/23/espanol/facebook-workrooms-realidad-virtual.html&amp;#34;&amp;gt;Leer en español&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-001627/</link>
      <pubDate>Tue, 24 Aug 2021 00:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210824-001627/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/biden-expected-to-decide-within-24-hours-on-afghan-evacuation-deadline-idUSKBN2FO0CM&amp;#34;&amp;gt;Biden expected to decide within 24 hours on Afghan evacuation deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL/WASHINGTON (Reuters) -With thousands of desperate Afghans and foreigners massed at  Kabul&amp;amp;#39;s airport in the hope of fleeing Afghanistan&amp;amp;#39;s new Taliban rulers, U.S. President Joe Biden is expected to decide as soon as Tuesday on whether to extend an Aug. 31 deadline to airlift Americans and their allies to safety.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-g7/other-g7-leaders-to-press-biden-to-extend-kabul-evacuation-deadline-idUSKBN2FO1Y6&amp;#34;&amp;gt;Other G7 leaders to press Biden to extend Kabul evacuation deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-201535/</link>
      <pubDate>Mon, 23 Aug 2021 20:15:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-201535/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/allies-step-up-pressure-on-biden-amid-kabul-evacuation-chaos-idUSKBN2FO0CM&amp;#34;&amp;gt;Allies step up pressure on Biden amid Kabul evacuation chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL/WASHINGTON (Reuters) -With thousands of desperate Afghans and foreigners crowding into Kabul airport in the hope of fleeing Afghanistan&amp;amp;#39;s new Taliban rulers, pressure grew on U.S. President Joe Biden on Monday to extend the deadline for the evacuation operation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/they-are-hungry-haiti-quake-survivors-fear-for-childrens-future-idUSKBN2FO138&amp;#34;&amp;gt;&amp;amp;#39;They are hungry&amp;amp;#39;: Haiti quake survivors fear for children&amp;amp;#39;s future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210823-161907/</link>
      <pubDate>Mon, 23 Aug 2021 16:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210823-161907/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133325_2022-volkswagen-jetta-gli-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Volkswagen Jetta GLI receives minor refresh&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-161555/</link>
      <pubDate>Mon, 23 Aug 2021 16:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-161555/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/amid-kabul-evacuation-chaos-biden-under-pressure-to-extend-deadline-idUSKBN2FO0CM&amp;#34;&amp;gt;Amid Kabul evacuation chaos, Biden under pressure to extend deadline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
With thousands of desperate Afghans and foreigners crowding into Kabul&amp;amp;#39;s airport in the hope of fleeing Afghanistan&amp;amp;#39;s new Taliban rulers, pressure grew on U.S. President Joe Biden on Monday to extend the deadline for the evacuation operation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-lawyers-insight/belarus-tightens-grip-on-lawyers-idUSKBN2FO0RZ&amp;#34;&amp;gt;Belarus tightens grip on lawyers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-greatgame-analys/analysis-china-pakistan-india-jockey-for-position-in-afghanistans-new-great-game-idUSKBN2FO0VC&amp;#34;&amp;gt;Analysis: China, Pakistan, India jockey for position in Afghanistan&amp;amp;#39;s new Great Game&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210823-121912/</link>
      <pubDate>Mon, 23 Aug 2021 12:19:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210823-121912/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133321_2021-24-hours-of-le-mans-results-toyota&amp;#34;&amp;gt;Toyota secures 4th-straight Le Mans victory&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132522_can-synthetic-fuels-save-the-combustion-engine&amp;#34;&amp;gt;Can synthetic fuels save the combustion engine?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210823-121745/</link>
      <pubDate>Mon, 23 Aug 2021 12:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210823-121745/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/games?campaignId=79FKF&amp;#34;&amp;gt;Get Games for $40/year&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/mike-isaac&amp;#34;&amp;gt;Log In&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/games?campaignId=79FKF&amp;#34;&amp;gt;Get Games for $40/year&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210823-120702/</link>
      <pubDate>Mon, 23 Aug 2021 12:07:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210823-120702/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://robertheaton.com/archive&amp;#34;&amp;gt;View full archive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-081552/</link>
      <pubDate>Mon, 23 Aug 2021 08:15:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-081552/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/germany-says-firefight-involving-western-forces-erupts-at-kabul-airport-idUSKBN2FO0CM&amp;#34;&amp;gt;Germany says firefight involving Western forces erupts at Kabul Airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A firefight broke out between unidentified gunmen, Western security forces and Afghan guards at Kabul airport on Monday, Germany&amp;amp;#39;s armed forces said, as thousands of Afghans and foreigners thronged the airport, seeking to flee Taliban rule.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-singapore/kamala-harris-says-u-s-focus-on-afghan-evacuations-pledges-open-south-china-sea-idUSKBN2FN0JS&amp;#34;&amp;gt;Kamala Harris says U.S. focus on Afghan evacuations, pledges open South China Sea&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>the mango zone</title>
      <link>https://www.whatsupup.com/blog/canton/ricketier/20210823-081200/</link>
      <pubDate>Mon, 23 Aug 2021 08:11:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/canton/ricketier/20210823-081200/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mango.pdf.zone/i-give-you-feedback-on-your-blog-post-draft-but-you-dont-send-it-to-me&amp;#34;&amp;gt;I give you feedback on your blog post draft but you don&amp;#39;t send it to me&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
That simply will not be necessary.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-041632/</link>
      <pubDate>Mon, 23 Aug 2021 04:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-041632/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-politics-suga-analysis/analysis-risks-of-party-revolt-grow-for-japans-pm-suga-after-local-poll-loss-idUSKBN2FO07M&amp;#34;&amp;gt;Analysis-Risks of party revolt grow for Japan&amp;#39;s PM Suga after local poll loss&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Unpopular Japanese Prime Minister Yoshihide Suga looks increasingly vulnerable to a challenge from within his party for the nation&amp;amp;#39;s top job after an ally&amp;amp;#39;s defeat in a local election on Sunday seen as a referendum on Suga&amp;amp;#39;s COVID-19 response.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210823-041109/</link>
      <pubDate>Mon, 23 Aug 2021 04:11:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210823-041109/</guid>
      <description>Correction, no show tomorrow 8/23, but we&amp;#39;ll be back soon and will use the questions from this round then! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/gRt5jMIYlS&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/gRt5jMIYlS&amp;#34;&amp;gt;https://t.co/gRt5jMIYlS&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-001602/</link>
      <pubDate>Mon, 23 Aug 2021 00:16:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210823-001602/</guid>
      <description>&amp;lt;p&amp;gt;U.S. has &amp;#39;unwavering commitment&amp;#39; to get its citizens and at-risk Afghans out of Afghanistan, President Biden says &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/taliban-fire-air-control-crowd-kabul-airport-2021-08-22/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-harris-singapore/kamala-harris-visits-singapore-to-deepen-ties-counter-chinas-influence-idUSKBN2FN0JS&amp;#34;&amp;gt;Kamala Harris visits Singapore to deepen ties, counter China&amp;#39;s influence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. Vice President Kamala Harris will meet Singapore&amp;amp;#39;s leaders on Monday on the first working day of a trip to Southeast Asia aimed at bolstering ties as part of Washington&amp;amp;#39;s efforts to counter China&amp;amp;#39;s growing influence.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/everyone-was-crying-grieving-haitians-bury-their-dead-a-week-after-quake-idUSKBN2FN05D&amp;#34;&amp;gt;&amp;amp;#39;Everyone was crying&amp;amp;#39;: Grieving Haitians bury their dead a week after quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210823-001546/</link>
      <pubDate>Mon, 23 Aug 2021 00:15:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210823-001546/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/cooking?campaignId=79FKF&amp;#34;&amp;gt;Get NYT Cooking for $1.25/week&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/cecilia-kang&amp;#34;&amp;gt;Log In&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/cooking?campaignId=79FKF&amp;#34;&amp;gt;Get NYT Cooking for $1.25/week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-201611/</link>
      <pubDate>Sun, 22 Aug 2021 20:16:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-201611/</guid>
      <description>&amp;lt;p&amp;gt;MARCELINE, Haiti (Reuters) -Families gathered in villages in southwestern Haiti this weekend to hold church and funeral services a week after an earthquake battered the region, killing more than 2,200 people and destroying tens of thousands of buildings.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-spain-basketball/in-spain-afghan-basketball-star-fears-for-the-country-she-has-left-idUSKBN2FN0F8&amp;#34;&amp;gt;In Spain, Afghan basketball star fears for the country she has left&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-shortage/rising-prices-shuttered-banks-add-to-misery-for-kabul-idUSKBN2FN0FS&amp;#34;&amp;gt;Rising prices, shuttered banks add to misery for Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-161615/</link>
      <pubDate>Sun, 22 Aug 2021 16:16:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-161615/</guid>
      <description>&amp;lt;p&amp;gt;Biden administration to use commercial airlines to carry Afghan evacuees &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/biden-administration-use-commercial-airlines-carry-afghan-evacuees-2021-08-22/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-beat-back-crowd-at-kabul-airport-after-seven-killed-in-crush-idUSKBN2FN02D&amp;#34;&amp;gt;Taliban beat back crowd at Kabul airport after seven killed in crush&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban fired in the air and used batons to force people desperate to flee Afghanistan to form orderly queues outside Kabul airport on Sunday, witnesses said, a day after seven people were killed in a crush at the gates.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/everyone-was-crying-grieving-haitians-bury-their-dead-a-week-after-quake-idUSKBN2FN05D&amp;#34;&amp;gt;&amp;amp;#39;Everyone was crying&amp;amp;#39;: grieving Haitians bury their dead a week after quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/he-never-stood-a-chance-the-fateful-downfall-of-haitis-president-idUSKBN2FN06J&amp;#34;&amp;gt;&amp;amp;#39;He never stood a chance&amp;amp;#39;: the fateful downfall of Haiti&amp;amp;#39;s president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-121525/</link>
      <pubDate>Sun, 22 Aug 2021 12:15:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-121525/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-fire-in-the-air-to-control-crowd-at-kabul-airport-idUSKBN2FN02D&amp;#34;&amp;gt;Taliban fire in the air to control crowd at Kabul airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban fired in the air and used batons to make people line up in orderly queues outside Kabul airport on Sunday, witnesses said, a day after seven people were killed in a crush at the gates.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/im-distraught-grieving-haitians-bury-their-dead-a-week-after-quake-idUSKBN2FN05D&amp;#34;&amp;gt;&amp;amp;#34;I&amp;amp;#39;m distraught&amp;amp;#34;: grieving Haitians bury their dead a week after quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-081610/</link>
      <pubDate>Sun, 22 Aug 2021 08:16:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-081610/</guid>
      <description>KABUL (Reuters) -Afghanistan&amp;#39;s new Taliban rulers imposed some order around chaotic Kabul airport on Sunday, firing in the air and using batons to make sure people formed orderly queues outside the main gates and did not gather at the perimeter, witnesses said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-japan-olympics/tokyo-weighs-use-of-olympic-venues-as-temporary-medical-facilities-paper-idUSKBN2FN046&amp;#34;&amp;gt;Tokyo weighs use of Olympic venues as temporary medical facilities -paper&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-041628/</link>
      <pubDate>Sun, 22 Aug 2021 04:16:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-041628/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-impose-some-order-around-kabul-airport-witnesses-idUSKBN2FN02D&amp;#34;&amp;gt;Taliban impose some order around Kabul airport - witnesses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Afghanistan&amp;amp;#39;s new Taliban rulers imposed some order around chaotic Kabul airport on Sunday, making sure people formed orderly queues outside the main gates and not allowing crowds to gather at the perimeter, witnesses said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australian-pm-morrison-defends-lockdown-strategy-as-daily-cases-hit-record-idUSKBN2FN00F&amp;#34;&amp;gt;Australian PM Morrison defends lockdown strategy as daily cases hit  record&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-001639/</link>
      <pubDate>Sun, 22 Aug 2021 00:16:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210822-001639/</guid>
      <description>&amp;lt;p&amp;gt;Afghans speak of despair, uncertainty after evacuation to Qatar &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/afghans-speak-despair-uncertainty-after-evacuation-qatar-2021-08-21/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-qatar/afghans-speak-of-despair-uncertainty-after-evacuation-to-qatar-idUSKBN2FM0FT&amp;#34;&amp;gt;Afghans speak of despair, uncertainty after evacuation to Qatar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Afghans who fled their country this week have spoken about their despair at leaving loved ones behind and the uncertain future ahead of them after the Taliban&amp;amp;#39;s rapid takeover.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-gaza/israeli-aircraft-strike-hamas-sites-in-gaza-after-border-clashes-idUSKBN2FM0F9&amp;#34;&amp;gt;Israeli aircraft strike Hamas sites in Gaza after border clashes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-201607/</link>
      <pubDate>Sat, 21 Aug 2021 20:16:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-201607/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-gaza/two-palestinians-israeli-soldier-seriously-injured-in-gaza-crossfire-idUSKBN2FM0F9&amp;#34;&amp;gt;Two Palestinians, Israeli soldier seriously injured in Gaza crossfire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
An Israeli soldier and two Palestinians, including a 13-year-old boy, were seriously injured in cross-border fire along the Gaza border on Saturday that wounded 39 other Palestinians, officials said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-germany-advise-against-travel-to-kabul-airport-amid-evacuation-chaos-idUSKBN2FM02V&amp;#34;&amp;gt;U.S., Germany advise against travel to Kabul airport amid evacuation chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-161543/</link>
      <pubDate>Sat, 21 Aug 2021 16:15:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-161543/</guid>
      <description>&amp;lt;p&amp;gt;&amp;#39;How confident are you?&amp;#39;: Taliban PR offensive falters as Kabul turmoil mounts &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/kabul-turmoil-mounts-talibans-pr-offensive-falters-2021-08-21/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-urges-americans-to-keep-clear-of-kabul-airport-as-crowd-chaos-grows-idUSKBN2FM02V&amp;#34;&amp;gt;U.S. urges Americans to keep clear of Kabul airport as crowd chaos grows&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The United States advised Americans in Afghanistan to avoid travelling to Kabul airport on Saturday as thousands gathered  trying to flee the country almost a week after the Islamist militants took control.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban-communic/as-kabul-turmoil-mounts-talibans-pr-offensive-falters-idUSKBN2FM097&amp;#34;&amp;gt;As Kabul turmoil mounts, Taliban&amp;amp;#39;s PR offensive falters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/haiti-faces-anger-and-despair-a-week-after-quake-fanning-security-fears-idUSKBN2FM06R&amp;#34;&amp;gt;Haiti faces anger and despair a week after quake, fanning security fears&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210821-121858/</link>
      <pubDate>Sat, 21 Aug 2021 12:18:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210821-121858/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133306_eluminator-is-ford-s-electric-crate-motor&amp;#34;&amp;gt;Eluminator is Ford&amp;#39;s electric crate motor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-121516/</link>
      <pubDate>Sat, 21 Aug 2021 12:15:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-121516/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/anger-and-despair-rise-in-haiti-one-week-after-devastating-quake-idUSKBN2FM06R&amp;#34;&amp;gt;Anger and despair rise in Haiti, one week after devastating quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Tensions in Haiti were rising on Saturday, one week after a devastating earthquake that killed more than 2,000 people, as scant aid has arrived in the remote regions of the impoverished Caribbean nation that were hit hardest.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-co-founder-arrives-in-kabul-to-hammer-out-new-government-as-airport-chaos-grows-idUSKBN2FM02V&amp;#34;&amp;gt;Taliban co-founder arrives in Kabul to hammer out new government as airport chaos grows&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-081538/</link>
      <pubDate>Sat, 21 Aug 2021 08:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-081538/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-vow-to-be-accountable-probe-reports-of-afghanistan-reprisals-idUSKBN2FM02V&amp;#34;&amp;gt;Taliban vow to be accountable, probe reports of Afghanistan reprisals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban will be accountable for its actions and will investigate reports of reprisals and atrocities carried out by members, an official of the Islamist militant group told Reuters on Saturday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/police-arrest-hundreds-of-protesters-as-australia-reports-record-covid-19-cases-idUSKBN2FM00Q&amp;#34;&amp;gt;Police arrest hundreds of protesters as Australia reports record COVID-19 cases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysias-new-pm-takes-office-amid-mounting-health-crisis-idUSKBN2FM055&amp;#34;&amp;gt;Malaysia&amp;amp;#39;s new PM takes office amid mounting health crisis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-041611/</link>
      <pubDate>Sat, 21 Aug 2021 04:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-041611/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-ambassador/in-shift-biden-taps-career-diplomat-not-politician-for-ambassador-to-china-idUSKBN2FL23M&amp;#34;&amp;gt;In shift, Biden taps career diplomat, not politician, for ambassador to China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australia-reports-record-covid-19-cases-as-police-block-sydney-protest-idUSKBN2FM00Q&amp;#34;&amp;gt;Australia reports record COVID-19 cases as police block Sydney protest&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210821-041446/</link>
      <pubDate>Sat, 21 Aug 2021 04:14:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210821-041446/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02279-y&amp;#34;&amp;gt;Home seismometers provide crucial data on Haiti’s quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A volunteer network helps to monitor aftershocks and illuminate the country’s earthquake hazards.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210821-001745/</link>
      <pubDate>Sat, 21 Aug 2021 00:17:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210821-001745/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/20/technology/facebook-popular-posts.html&amp;#34;&amp;gt;Facebook, Fearing Public Outcry, Shelved Earlier Report on Popular Posts The company praised itself this week for being “the most transparent platform on the internet.” By Davey Alba and Ryan Mac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-001607/</link>
      <pubDate>Sat, 21 Aug 2021 00:16:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210821-001607/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/west-struggles-with-afghanistan-chaos-biden-again-defends-withdrawal-idUSKBN2FL0CL&amp;#34;&amp;gt;West struggles with Afghanistan chaos, Biden again defends withdrawal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL/WASHINGTON (Reuters) -Chaos around the Kabul airport was so bad this week that the U.S. military was forced to use three helicopters to transport 169 Americans into the complex from a building just 200 meters (656 feet) away, the Pentagon said on Friday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-crisis-usa-europe-flights/u-s-says-a-dozen-countries-to-let-kabul-evacuation-flights-transit-idUSKBN2FL1OF&amp;#34;&amp;gt;U.S. says a dozen countries to let Kabul evacuation flights transit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Marc Andreessen - Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210821-001041/</link>
      <pubDate>Sat, 21 Aug 2021 00:10:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210821-001041/</guid>
      <description>Ben Horowitz @bhorowitz and I will be back with our Clubhouse @Clubhouse show, &amp;amp;quot;One On One with A &amp;amp;amp; Z&amp;amp;quot;, Monday, August 23 at 7:00 PM PST. Brought to you by the Lambda Variant. Please suggest great questions for us to answer by replying to this tweet!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-201847/</link>
      <pubDate>Fri, 20 Aug 2021 20:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-201847/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133309_2022-ford-explorer-st-aims-for-enthusiasts-with-rear-wheel-drive-option&amp;#34;&amp;gt;2022 Ford Explorer ST aims for enthusiasts with rear-wheel-drive option&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133248_mercedes-benz-cancels-v-8-models-in-us-for-2022-except-s-class&amp;#34;&amp;gt;Mercedes-Benz cancels V-8 models in US for 2022 except S-Class&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-201534/</link>
      <pubDate>Fri, 20 Aug 2021 20:15:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-201534/</guid>
      <description>&amp;lt;p&amp;gt;Cowering in the bathroom: Some Afghans dread the Taliban knock at the door &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/cowering-bathroom-some-afghans-dread-taliban-knock-door-2021-08-20/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/biden-again-defends-u-s-pullout-as-world-powers-struggle-with-afghanistan-evacuations-idUSKBN2FL0CL&amp;#34;&amp;gt;Biden again defends U.S. pullout as world powers struggle with Afghanistan evacuations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL/WASHINGTON (Reuters) -World powers struggled on Friday to hasten evacuations from Afghanistan after reports of Taliban reprisals, as U.S. President Joe Biden insisted that the chaos following the American troop withdrawal had not diminished Washington&amp;amp;#39;s international credibility.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-crisis-usa-europe-flights/exclusive-u-s-set-to-expand-evacuation-from-kabul-to-europe-officials-idUSKBN2FL1OF&amp;#34;&amp;gt;Exclusive-U.S. set to expand evacuation from Kabul to Europe- officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-backlash/cowering-in-the-bathroom-some-afghans-dread-the-taliban-knock-at-the-door-idUSKBN2FL1ZL&amp;#34;&amp;gt;Cowering in the bathroom: Some Afghans dread the Taliban knock at the door&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/20/greta-thunberg-celebrates-protest-annive?videoId=734403922&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Greta Thunberg celebrates protest anniversary&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-161933/</link>
      <pubDate>Fri, 20 Aug 2021 16:19:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-161933/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133308_2022-ford-mustang-and-mustang-mach-e-get-white-on-white-styling-packs&amp;#34;&amp;gt;2022 Ford Mustang and Mustang Mach-E get white-on-white styling packs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131251_2022-genesis-g90-spy-shots-video&amp;#34;&amp;gt;2022 Genesis G90 spy shots and video: Redesigned flagship sedan in the works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-161605/</link>
      <pubDate>Fri, 20 Aug 2021 16:16:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-161605/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/facing-backlash-over-chaos-foreign-powers-try-to-speed-afghanistan-exodus-idUSKBN2FL0CL&amp;#34;&amp;gt;Facing backlash over chaos, foreign powers try to speed Afghanistan exodus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Foreign powers sought to hasten evacuations from Afghanistan on Friday after reports of Taliban reprisals, including against people who had worked with U.S.-led forces or the previous Western-backed government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-crisis-usa-europe-flights/exclusive-u-s-set-to-expand-evacuation-flights-from-kabul-to-europe-officials-idUSKBN2FL1OF&amp;#34;&amp;gt;Exclusive-U.S. set to expand evacuation flights from Kabul to Europe- officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/aid-struggles-to-reach-remote-areas-of-haiti-quake-zone-idUSKBN2FL1FT&amp;#34;&amp;gt;Aid struggles to reach remote areas of Haiti quake zone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-121933/</link>
      <pubDate>Fri, 20 Aug 2021 12:19:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-121933/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133302_2022-infiniti-qx80-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Infiniti QX80 arrives with new infotainment screen&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133107_2022-subaru-forester-wilderness-teased-debuts-sept-9&amp;#34;&amp;gt;2022 Subaru Forester Wilderness teased, debuts Sept. 9&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133198_tom-cruise-s-old-1986-porsche-911-targa-is-for-sale&amp;#34;&amp;gt;Tom Cruise&amp;amp;#39;s old 1986 Porsche 911 Targa sells for $86,000&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1101279_2023-land-rover-defender-130-spy-shots&amp;#34;&amp;gt;2023 Land Rover Defender 130 spy shots: 8-seater SUV on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125819_2023-nissan-z-2022-lincoln-navigator-2022-mercedes-benz-c-class-all-terrain-today-s-car-news&amp;#34;&amp;gt;2023 Nissan Z, 2022 Lincoln Navigator, 2022 Mercedes-Benz C-Class All-Terrain: Today&amp;amp;#39;s Car News&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-121604/</link>
      <pubDate>Fri, 20 Aug 2021 12:16:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-121604/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: FBI finds scant evidence U.S. Capitol attack was coordinated &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/exclusive-fbi-finds-scant-evidence-us-capitol-attack-was-coordinated-sources-2021-08-20/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
KABUL (Reuters) -More than 18,000 people have been flown out of Kabul since the Taliban took over Afghanistan&amp;#39;s capital, a NATO official said on Friday, pledging to redouble evacuation efforts as criticism of the West&amp;#39;s handling of the crisis intensified.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-britain-raab/uks-raab-defends-afghanistan-crisis-response-after-criticism-idUSKBN2FL16J&amp;#34;&amp;gt;UK&amp;#39;s Raab defends Afghanistan crisis response after criticism&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-deportations/migrants-left-high-and-dry-at-guatemala-border-after-deportations-from-mexico-u-s-idUSKBN2FL15P&amp;#34;&amp;gt;Migrants left high and dry at Guatemala border after deportations from Mexico, U.S&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20210820-121546/</link>
      <pubDate>Fri, 20 Aug 2021 12:15:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20210820-121546/</guid>
      <description>Why are you reporting this ad?&amp;lt;br&amp;gt;
Please make a selection.&amp;lt;br&amp;gt;
Plays sound&amp;lt;br&amp;gt;
Contains adult content&amp;lt;br&amp;gt;
Covers the page&amp;lt;br&amp;gt;
Other&amp;lt;br&amp;gt;
Additional Information&amp;lt;br&amp;gt;
Please help us by describing the ad.&amp;lt;br&amp;gt;
Only 500 characters are allowed.&amp;lt;br&amp;gt;
Report ad&amp;lt;br&amp;gt;
Thank you for letting us know.&amp;lt;br&amp;gt;
Powered by&amp;lt;br&amp;gt;
×&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-081846/</link>
      <pubDate>Fri, 20 Aug 2021 08:18:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210820-081846/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133301_tesla-bot-ai-controlled-humanoid-robot-revealed&amp;#34;&amp;gt;Tesla Bot: AI-controlled humanoid robot revealed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133220_lamborghini-countach-2022-toyota-tundra-2022-acura-nsx-type-s-the-week-in-reverse&amp;#34;&amp;gt;Lamborghini Countach, 2022 Toyota Tundra, 2022 Acura NSX Type-S: The Week In Reverse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133237_2022-cadillac-ct5-v-blackwing-2022-ford-gt-2023-alfa-romeo-tonale-this-week-s-top-photos&amp;#34;&amp;gt;2022 Cadillac CT5-V Blackwing, 2022 Ford GT, 2023 Alfa Romeo Tonale: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-081546/</link>
      <pubDate>Fri, 20 Aug 2021 08:15:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-081546/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/nato-pledges-to-speed-evacuations-from-afghanistan-as-criticism-mounts-idUSKBN2FL0CL&amp;#34;&amp;gt;NATO pledges to speed evacuations from Afghanistan as criticism mounts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -More than 18,000 people have been flown out of Kabul since the Taliban took over Afghanistan&amp;amp;#39;s capital, a NATO official said on Friday, pledging to redouble evacuation efforts as criticism of the West&amp;amp;#39;s handling of the crisis mounted.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-sanctions/beijing-delays-vote-on-extending-anti-sanctions-law-to-hong-kong-scmp-idUSKBN2FL0BY&amp;#34;&amp;gt;Beijing delays vote on extending anti-sanctions law to Hong Kong -SCMP&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210820-081342/</link>
      <pubDate>Fri, 20 Aug 2021 08:13:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210820-081342/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html&amp;#34;&amp;gt;Understanding Network Access in Windows AppContainers&amp;lt;/a&amp;gt; (Aug)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-001601/</link>
      <pubDate>Fri, 20 Aug 2021 00:16:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210820-001601/</guid>
      <description>&amp;lt;p&amp;gt;KABUL (Reuters) -The Taliban called on Afghanistan&amp;#39;s imams to urge unity when they hold their first Friday prayers since the Islamist group seized control of the country, as protests against the takeover spread to more cities on Thursday, including the capital, Kabul.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-china/contrary-to-intent-bidens-afghan-pullout-could-undermine-asia-shift-idUSKBN2FK2HG&amp;#34;&amp;gt;Contrary to intent, Biden&amp;#39;s Afghan pullout could undermine Asia shift&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/foreign-aid-trickles-in-to-rural-haiti-amid-struggle-to-count-victims-idUSKBN2FK0YN&amp;#34;&amp;gt;Foreign aid trickles in to rural Haiti amid struggle to count victims&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-201818/</link>
      <pubDate>Thu, 19 Aug 2021 20:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-201818/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130899_2022-hyundai-kona-n-price-specs-review-photos-info-video&amp;#34;&amp;gt;Preview: 2022 Hyundai Kona N brings hot hatch attitude to the compact crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129768_2022-hyundai-elantra-n-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Hyundai Elantra N packs 276 hp, 8-speed DCT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210819-201711/</link>
      <pubDate>Thu, 19 Aug 2021 20:17:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210819-201711/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/19/technology/facebooks-new-bet-on-virtual-reality-conference-rooms.html&amp;#34;&amp;gt;Facebook’s New Bet on Virtual Reality: Conference Rooms The pandemic has renewed interest in virtual reality. Facebook is trying to capitalize with a new virtual meeting room service. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-201527/</link>
      <pubDate>Thu, 19 Aug 2021 20:15:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-201527/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-urge-afghan-unity-as-protests-spread-to-kabul-idUSKBN2FK0GM&amp;#34;&amp;gt;Taliban urge Afghan unity as protests spread to Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban called on Afghanistan&amp;amp;#39;s imams to urge unity when they hold their first Friday prayers since the Islamist group seized control of the country, as protests against the takeover spread to more cities on Thursday, including the capital Kabul.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-blacklist/taliban-are-rounding-up-afghans-on-blacklist-private-intel-report-idUSKBN2FK23J&amp;#34;&amp;gt;Taliban are rounding up Afghans on blacklist - private intel report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/aid-trickles-in-as-haitians-struggle-to-count-lives-lost-in-quake-idUSKBN2FK0YN&amp;#34;&amp;gt;Aid trickles in as Haitians struggle to count lives lost in quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210819-201511/</link>
      <pubDate>Thu, 19 Aug 2021 20:15:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210819-201511/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/19/technology/ftc-facebook-antitrust.html&amp;#34;&amp;gt;U.S. Revives Facebook Suit, Adding Details to Back Claim of a Monopoly After a judge slammed the F.T.C.’s original lawsuit, regulators returned with a more detailed case accusing the platform of being a monopoly. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210819-201335/</link>
      <pubDate>Thu, 19 Aug 2021 20:13:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210819-201335/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html&amp;#34;&amp;gt;Understanding Network Access in Windows AppContainers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by James Forshaw, Project Zero Recently I&amp;amp;#39;ve been delving into the inner workings of the Windows Firewall. This is interesting to me as it&amp;amp;#39;s used to enforce various restrictions such as whether AppContainer sandboxed applications can access the network. Being able to bypass network restrictions in AppContainer sandboxes is interesting as it expands the attack surface available to the application, such as being able to access services on localhost, as well as granting access to intranet resources in an Enterprise.&amp;lt;br&amp;gt;
I recently discovered a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2207&amp;#34;&amp;gt;configuration issue&amp;lt;/a&amp;gt; with the Windows Firewall which allowed the restrictions to be bypassed and allowed an AppContainer process to access the network. Unfortunately Microsoft decided it didn&amp;amp;#39;t meet the bar for a security bulletin so it&amp;amp;#39;s marked as WontFix.&amp;lt;br&amp;gt;
As the mechanism that the Windows Firewall uses to restrict access to the network from an AppContainer isn&amp;amp;#39;t officially documented as far as I know, I&amp;amp;#39;ll provide the details on how the restrictions are implemented. This will provide the background to understanding why my configuration issue allowed for network access.&amp;lt;br&amp;gt;
I&amp;amp;#39;ll also take the opportunity to give an overview of how the Windows Firewall functions and how you can use some of my tooling to inspect the current firewall configuration. This will provide security researchers with the information they need to better understand the firewall and assess its configuration to find other security issues similar to the one I reported. At the same time I&amp;amp;#39;ll note some interesting quirks in the implementation which you might find useful.&amp;lt;br&amp;gt;
Windows Firewall Architecture Primer&amp;lt;br&amp;gt;
Before we can understand how network access is controlled in an AppContainer we need to understand how the built-in Windows firewall functions. Prior to XP SP2 Windows didn&amp;amp;#39;t have a built-in firewall, and you would typically install a third-party firewall such as ZoneAlarm. These firewalls were implemented by hooking into &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows-hardware/drivers/network/&amp;#34;&amp;gt;Network Driver Interface Specification (NDIS)&amp;lt;/a&amp;gt; drivers or implementing user-mode &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/winsock/about-the-winsock-spi&amp;#34;&amp;gt;Winsock Service Providers&amp;lt;/a&amp;gt; but this was complex and error prone.&amp;lt;br&amp;gt;
While XP SP2 introduced the built-in firewall, the basis for the one used in modern versions of Windows was introduced in Vista as the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/windows-filtering-platform-start-page&amp;#34;&amp;gt;Windows Filtering Platform (WFP)&amp;lt;/a&amp;gt; . However, as a user you wouldn&amp;amp;#39;t typically interact directly with WFP. Instead you&amp;amp;#39;d use a firewall product which exposes a user interface, and then configures WFP to do the actual firewalling. On a default installation of Windows this would be the Windows Defender Firewall. If you installed a third-party firewall this would replace the Defender component but the actual firewall would still be implemented through configuring WFP.&amp;lt;br&amp;gt;
The diagram gives an overview of how various components in the OS are connected together to implement the firewall. A user would interact with the Windows Defender firewall using the GUI, or a command line interface such as PowerShell&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/powershell/module/netsecurity/&amp;#34;&amp;gt;NetSecurity&amp;lt;/a&amp;gt; module. This interface communicates with the Windows Defender Firewall Service (MPSSVC) over RPC to query and modify the firewall rules.&amp;lt;br&amp;gt;
MPSSVC converts its ruleset to the lower-level WFP firewall filters and sends them over RPC to the Base Filtering Engine (BFE) service. These filters are then uploaded to the TCP/IP driver (TCPIP.SYS) in the kernel which is where the firewall processing is handled. The device objects (such as \Device\WFP ) which the TCP/IP driver exposes are secured so that only the BFE service can access them. This means all access to the kernel firewall needs to be mediated through the service.&amp;lt;br&amp;gt;
When an application, such as a Web Browser, creates a new network socket the AFD driver responsible for managing sockets will communicate with the TCP/IP driver to configure the socket for IP. At this point the TCP/IP driver will capture the security context of the creating process and store that for later use by the firewall. When an operation is performed on the socket, such as making or accepting a new connection, the firewall filters will be evaluated.&amp;lt;br&amp;gt;
The evaluation is handled primarily by the NETIO driver as well as registered callout drivers. These callout drivers allow for more complex firewall rules to be implemented as well as inspecting and modifying network traffic. The drivers can also forward checks to user-mode services. As an example, the ability to forward checks to user mode allows the Windows Defender Firewall to display a UI when an unknown application listens on a wildcard address, as shown below.&amp;lt;br&amp;gt;
The end result of the evaluation is whether the operation is permitted or blocked. The behavior of a block depends on the operation. If an outbound connection is blocked the caller is notified. If an inbound connection is blocked the firewall will drop the packets and provide no notification to the peer, such as a TCP Reset or ICMP response. This default drop behavior can be changed through a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-gpfas/e0e681d3-0468-4796-b541-c5f9945041d8&amp;#34;&amp;gt;system wide configuration change&amp;lt;/a&amp;gt; . Let&amp;amp;#39;s dig into more detail on how the rules are configured for evaluation.&amp;lt;br&amp;gt;
Layers, Sublayers and Filters&amp;lt;br&amp;gt;
The firewall rules are configured using three types of object: layers, sublayers and filters as shown in the following diagram.&amp;lt;br&amp;gt;
The firewall layer is used to categorize the network operation to be evaluated. For example there are separate layers for inbound and outbound packets. This is typically further differentiated by IP version, so there are separate IPv4 and IPv6 layers for inbound and outbound packets. While the firewall is primarily focussed on IP traffic there does exist limited MAC and Virtual Switch layers to perform specialist firewalling operations. You can find the list of pre-defined layers on MSDN &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/management-filtering-layer-identifiers-&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . As the WFP needs to know what layer handles which operation there&amp;amp;#39;s no way for additional layers to be added to the system by a third-party application.&amp;lt;br&amp;gt;
When a packet is evaluated by a layer the WFP performs &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/filter-arbitration&amp;#34;&amp;gt;Filter Arbitration&amp;lt;/a&amp;gt; . This is a set of rules which determine the order of evaluation of the filters. First WFP enumerates all registered filters which are associated with the layer&amp;amp;#39;s unique GUID. Next, WFP groups the filters by their sublayer&amp;amp;#39;s GUID and orders the filter groupings by a weight value which was specified when the sublayer was registered. Finally, WFP evaluates each filter according to the order based on a weight value specified when the filter was registered.&amp;lt;br&amp;gt;
For every filter, WFP checks if the list of conditions match the packet and its associated meta-data. If the conditions match then the filter performs a specified action, which can be one of the following:&amp;lt;br&amp;gt;
Permit&amp;lt;br&amp;gt;
Block&amp;lt;br&amp;gt;
Callout Terminating&amp;lt;br&amp;gt;
Callout Unknown&amp;lt;br&amp;gt;
Callout Inspection&amp;lt;br&amp;gt;
If the action is Permit or Block then the filter evaluation for the current sublayer is terminated with that action as the result. If the action is a callout then WFP will invoke the filter&amp;amp;#39;s registered callout driver&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/fwpsk/nc-fwpsk-fwps_callout_classify_fn0&amp;#34;&amp;gt;classify function&amp;lt;/a&amp;gt; to perform additional checks. The classify function can evaluate the packet and its meta-data and specify a final result of Permit , Block or additionally Continue which indicates the filter should be ignored. In general if the action is Callout Terminating then it should only set Permit and Block , and if it&amp;amp;#39;s Callout Inspection then it should only set Continue . The Callout Unknown action is for callouts which might terminate or might not depending on the result of the classification.&amp;lt;br&amp;gt;
Once a terminating filter has been evaluated WFP stops processing that sublayer. However, WFP will continue to process the remaining sublayers in the same way regardless of the final result. In general if any sublayer returns a Block result then the packet will be blocked, otherwise it&amp;amp;#39;ll be permitted. This means that if a higher priority sublayer&amp;amp;#39;s result is Permit , it can still be blocked by a lower-priority sublayer.&amp;lt;br&amp;gt;
A filter can be configured with the FWPM_FILTER_FLAG_CLEAR_ACTION_RIGHT flag which indicates that the result should be considered “hard” allowing a higher priority filter to permit a packet which can&amp;amp;#39;t be overridden by a lower-priority blocking filter. The rules for the final result are even more complex than I make out including soft blocks and vetos, refer to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/filter-arbitration&amp;#34;&amp;gt;page in MSDN&amp;lt;/a&amp;gt; for more information.&amp;lt;br&amp;gt;
To simplify the classification of network traffic, WFP provides a set of stateful layers which correspond to major network events such as TCP connection and port binding. The stateful filtering is referred to as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/application-layer-enforcement--ale-&amp;#34;&amp;gt;Application Layer Enforcement (ALE)&amp;lt;/a&amp;gt; . For example the FWPM_LAYER_ALE_AUTH_CONNECT_V4 layer will be evaluated when a TCP connection using IPv4 is being made.&amp;lt;br&amp;gt;
For any given connection it will only be evaluated once, not for every packet associated with the TCP connection handshake. In general these &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/ale-layers&amp;#34;&amp;gt;ALE layers&amp;lt;/a&amp;gt; are the ones we&amp;amp;#39;ll focus on when inspecting the firewall configuration, as they&amp;amp;#39;re the most commonly used. The three main ALE layers you&amp;amp;#39;re going to need to inspect are the following:&amp;lt;br&amp;gt;
Name&amp;lt;br&amp;gt;
Description&amp;lt;br&amp;gt;
FWPM_LAYER_ALE_AUTH_CONNECT_V4/6&amp;lt;br&amp;gt;
Processed when TCP connect() called.&amp;lt;br&amp;gt;
FWPM_LAYER_ALE_AUTH_LISTEN_V4/6&amp;lt;br&amp;gt;
Processed when TCP listen() called.&amp;lt;br&amp;gt;
FWPM_LAYER_ALE_AUTH_RECV_ACCEPT_V4/6&amp;lt;br&amp;gt;
Processed when a packet/connection is received.&amp;lt;br&amp;gt;
What layers are used and in what order they are evaluated depend on the specific operation being performed. You can find the list of the layers for TCP packets &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/tcp-packet-flows&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; and UDP packets &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows/win32/fwp/udp-packet-flows&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . Now, let&amp;amp;#39;s dig into how filter conditions are defined and what information they can check.&amp;lt;br&amp;gt;
Filter Conditions&amp;lt;br&amp;gt;
Each filter contains an optional list of conditions which are used to match a packet. If no list is specified then the filter will always match any incoming packet and perform its defined action. If more than one condition is specified then the filter is only matched if all of the conditions match. If you have multiple conditions of the same type they&amp;amp;#39;re OR&amp;amp;#39;ed together, which allows a single filter …</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210819-200625/</link>
      <pubDate>Thu, 19 Aug 2021 20:06:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210819-200625/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/what-is-addiction&amp;#34;&amp;gt;What is addiction (series)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210819-200612/</link>
      <pubDate>Thu, 19 Aug 2021 20:06:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210819-200612/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/wanted-disgruntled-employees-to-deploy-ransomware/&amp;#34;&amp;gt;Wanted: Disgruntled Employees to Deploy Ransomware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Criminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and asking them to unleash the malware inside their employer’s network in exchange for a percentage of any ransom amount paid by the victim company.&amp;lt;br&amp;gt;
Image: Abnormal Security.&amp;lt;br&amp;gt;
Crane Hassold , director of threat intelligence at Abnormal Security , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://abnormalsecurity.com/blog/nigerian-ransomware-soliciting-employees-demonware/&amp;#34;&amp;gt;described&amp;lt;/a&amp;gt; what happened after he adopted a fake persona and responded to the proposal in the screenshot above. It offered to pay him 40 percent of a million-dollar ransom demand if he agreed to launch their malware inside his employer’s network.&amp;lt;br&amp;gt;
This particular scammer was fairly chatty, and over the course of five days it emerged that Hassold’s correspondent was forced to change up his initial approach in planning to deploy the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/03/ransomware-operators-are-piling-on-already-hacked-exchange-servers/&amp;#34;&amp;gt;DemonWare ransomware strain&amp;lt;/a&amp;gt; , which is freely available on GitHub .&amp;lt;br&amp;gt;
“According to this actor, he had originally intended to send his targets—all senior-level executives—phishing emails to compromise their accounts, but after that was unsuccessful, he pivoted to this ransomware pretext,” Hassold wrote.&amp;lt;br&amp;gt;
Abnormal Security documented how it tied the email back to a young man in Nigeria who acknowledged he was trying to save up money to help fund a new social network he is building called Sociogram .&amp;lt;br&amp;gt;
Reached via LinkedIn, Sociogram founder &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/in/oluwameda/&amp;#34;&amp;gt;Oluwaseun Medayedupin&amp;lt;/a&amp;gt; asked to have his startup’s name removed from the story, although he did not respond to questions about whether there were an inaccuracies in Hassold’s report.&amp;lt;br&amp;gt;
“Please don’t harm Sociogram’s reputation,” Medayedupin pleaded. “I beg you as a promising young man.”&amp;lt;br&amp;gt;
This attacker’s approach may seem fairly amateur, but it would be a mistake to dismiss the threat from West African cybercriminals dabbling in ransomware. While multi-million dollar ransomware payments are hogging the headlines, by far the biggest financial losses tied to cybercrime each year stem from so-called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/tag/business-email-compromise/&amp;#34;&amp;gt;Business Email Compromise (BEC) or CEO Scams&amp;lt;/a&amp;gt; , in which crooks mainly based in Africa and Southeast Asia will spoof communications from executives at the target firm in a bid to initiate unauthorized international wire transfers.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf&amp;#34;&amp;gt;the latest figures&amp;lt;/a&amp;gt; (PDF) released by the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ic3.gov&amp;#34;&amp;gt;FBI Internet Crime Complaint Center&amp;lt;/a&amp;gt; (IC3), the reported losses from BEC scams continue to dwarf other cybercrime loss categories, increasing to $1.86 billion in 2020.&amp;lt;br&amp;gt;
Image: FBI&amp;lt;br&amp;gt;
“Knowing the actor is Nigerian really brings the entire story full circle and provides some notable context to the tactics used in the initial email we identified,” Hassold wrote. “For decades, West African scammers, primarily located in Nigeria, have perfected the use of social engineering in cybercrime activity.”&amp;lt;br&amp;gt;
“While the most common cyber attack we see from Nigerian actors (and most damaging attack globally) is business email compromise (BEC), it makes sense that a Nigerian actor would fall back on using similar social engineering techniques, even when attempting to successfully deploy a more technically sophisticated attack like ransomware,” Hassold concluded.&amp;lt;br&amp;gt;
DON’T QUIT YOUR DAY JOB&amp;lt;br&amp;gt;
Cybercriminals trolling for disgruntled employees is hardly a new development. Big companies have long been worried about the very real threat of disgruntled employees creating identities on darknet sites and then offering to trash their employer’s network for a fee (for more on that, see my 2016 story, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2016/06/rise-of-darknet-stokes-fear-of-the-insider/&amp;#34;&amp;gt;Rise of the Darknet Stokes Fear of the Insider&amp;lt;/a&amp;gt; ). &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/wanted-disgruntled-employees-to-deploy-ransomware/#more-56667&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-161543/</link>
      <pubDate>Thu, 19 Aug 2021 16:15:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-161543/</guid>
      <description>Planes, guns, night-vision goggles: The Taliban&amp;#39;s new U.S.-made war chest &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/aerospace-defense/planes-guns-night-vision-goggles-talibans-new-us-made-war-chest-2021-08-19/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-protests-spread-to-kabul-in-early-challenge-to-taliban-idUSKBN2FK0GM&amp;#34;&amp;gt;Afghan protests spread to Kabul in early challenge to Taliban&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Protests against the Taliban&amp;amp;#39;s takeover in Afghanistan spread to more cities on Thursday, including the capital Kabul, and a witness said several people were killed when the militants fired on a crowd in Asadabad in the eastern province of Kunar.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-121812/</link>
      <pubDate>Thu, 19 Aug 2021 12:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-121812/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1118149_hennessey-venom-f5-hypercar-sells-out-following-monterey-car-week-showing&amp;#34;&amp;gt;Hennessey Venom F5 hypercar sells out following Monterey Car Week showing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123680_2022-bmw-2-series-active-tourer-spy-shots-video&amp;#34;&amp;gt;2022 BMW 2-Series Active Tourer spy shots: Sportier look for compact minivan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133262_nissan-z-reveal-livestream&amp;#34;&amp;gt;Watch the Nissan Z reveal live, here&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210819-121633/</link>
      <pubDate>Thu, 19 Aug 2021 12:16:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210819-121633/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/19/technology/can-facebook-make-virtual-reality-happen-for-real-this-time.html&amp;#34;&amp;gt;Can Facebook Make Virtual Reality Happen for Real This Time? The pandemic has renewed interest in virtual reality. Facebook is trying to capitalize with a new virtual meeting room service. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-121452/</link>
      <pubDate>Thu, 19 Aug 2021 12:14:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-121452/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/legal-us-apple-privacy/exclusive-policy-groups-ask-apple-to-drop-plans-to-inspect-imessages-scan-for-abuse-images-idUSKBN2FK0T2&amp;#34;&amp;gt;Exclusive: Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/protests-against-afghan-taliban-spread-in-early-signs-of-resistance-idUSKBN2FK0GM&amp;#34;&amp;gt;Protests against Afghan Taliban spread in early signs of resistance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Flag-waving protesters took to the streets of more Afghan cities on Thursday as popular opposition to the Taliban spread, and a witness said several people were killed when the militants fired on a crowd in Asadabad in the east.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-biden/biden-says-taliban-must-decide-if-it-wants-international-recognition-interview-idUSKBN2FK17E&amp;#34;&amp;gt;Biden says Taliban must decide if it wants international recognition - interview&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/painful-days-ahead-as-haitians-struggle-to-count-lives-lost-in-quake-idUSKBN2FK0YN&amp;#34;&amp;gt;&amp;amp;#39;Painful days ahead&amp;amp;#39; as Haitians struggle to count lives lost in quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-081855/</link>
      <pubDate>Thu, 19 Aug 2021 08:18:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-081855/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133288_genesis-gv60-electric-compact-crossover-coming-in-2022&amp;#34;&amp;gt;Genesis GV60 electric compact crossover coming in 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-081541/</link>
      <pubDate>Thu, 19 Aug 2021 08:15:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-081541/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/uk-apple-privacy/policy-groups-ask-apple-to-drop-plans-to-inspect-imessages-scan-for-abuse-images-idUSKBN2FK09P&amp;#34;&amp;gt;Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More than 90 policy and rights groups around the world published an open letter on Thursday urging Apple to abandon plans for scanning children’s messages for nudity and the phones of adults for images of child sex abuse.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/apple-privacy/exclusive-policy-groups-ask-apple-to-drop-plans-to-inspect-imessages-scan-for-abuse-images-idUSL1N2PQ03V&amp;#34;&amp;gt;EXCLUSIVE-Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Aug 18 More than 90 policy and rights groups
around the world will publish an open letter on Thursday urging
Apple to abandon plans for scanning children’s messages
for nudity and the phones of adults for images of child sex
abuse.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-urge-afghans-to-leave-kabul-airport-after-days-of-deadly-chaos-idUSKBN2FK0GM&amp;#34;&amp;gt;Taliban urge Afghans to leave Kabul airport after days of deadly chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban on Thursday urged crowds of Afghans waiting outside Kabul airport in the hope of fleeing the country to go home, saying they did not want to hurt anyone, a day after Taliban fighters fired at protesters, killing three, witnesses said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-activist-returned-from-chinese-prison-found-guilty-in-national-security-case-idUSKBN2FK0B5&amp;#34;&amp;gt;Hong Kong activist returned from Chinese prison found guilty in national security case&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-041548/</link>
      <pubDate>Thu, 19 Aug 2021 04:15:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-041548/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/uk-apple-privacy/exclusive-policy-groups-ask-apple-to-drop-plans-to-inspect-imessages-scan-for-abuse-images-idUSKBN2FK09P&amp;#34;&amp;gt;Exclusive-Policy groups ask Apple to drop plans to inspect iMessages, scan for abuse images&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More than 90 policy and rights groups around the world will publish an open letter on Thursday urging Apple to abandon plans for scanning children’s messages for nudity and the phones of adults for images of child sex abuse.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/quake-leaves-haiti-on-its-knees-as-impatience-grows-over-lack-of-aid-idUSKBN2FJ0OB&amp;#34;&amp;gt;Quake leaves Haiti &amp;amp;#39;on its knees&amp;amp;#39; as impatience grows over lack of aid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-001920/</link>
      <pubDate>Thu, 19 Aug 2021 00:19:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210819-001920/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129234_preview-2023-cadillac-lyriq-starts-brand-s-electric-slide-from-59-990&amp;#34;&amp;gt;Preview: 2023 Cadillac Lyriq shines brightly and starts brand&amp;#39;s electric slide from $59,990&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131482_2023-honda-cr-v-2022-polestar-2-pininfarina-battista-today-s-car-news&amp;#34;&amp;gt;2023 Honda CR-V, 2022 Polestar 2, Pininfarina Battista: Today&amp;amp;#39;s Car News&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-001614/</link>
      <pubDate>Thu, 19 Aug 2021 00:16:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210819-001614/</guid>
      <description>&amp;lt;p&amp;gt;Haitians grow angry at slow pace of quake aid after spending fifth night in the open, many without clean water and food &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas/haitians-sheltering-tents-grow-impatient-aid-after-devastating-quake-2021-08-18/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-keep-some-evacuees-from-reaching-kabul-airport-as-u-s-vows-to-finish-airlift-idUSKBN2FJ0EA&amp;#34;&amp;gt;Taliban keep some evacuees from reaching Kabul airport, as U.S. vows to finish airlift&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Armed members of the Taliban kept people desperate to flee Afghanistan from reaching Kabul&amp;amp;#39;s airport on Wednesday, witnesses said, while President Joe Biden vowed to keep U.S. troops in the country until all Americans are evacuated.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-pentagon/biden-says-aug-31-deadline-in-afghanistan-might-have-to-be-extended-idUSKBN2FJ1KD&amp;#34;&amp;gt;Biden says Aug. 31 deadline in Afghanistan might have to be extended&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/haitians-grow-impatient-for-quake-aid-as-hungry-crowd-gathers-idUSKBN2FJ0OB&amp;#34;&amp;gt;Haitians grow impatient for quake aid as hungry crowd gathers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210819-001514/</link>
      <pubDate>Thu, 19 Aug 2021 00:15:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210819-001514/</guid>
      <description>This website stores data such as cookies to enable essential site functionality, as well as marketing, personalization, and analytics. By remaining on this website you indicate your consent. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/privacy#cookies&amp;#34;&amp;gt;Cookie Policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-202029/</link>
      <pubDate>Wed, 18 Aug 2021 20:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-202029/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133278_the-nissan-z-was-dead-then-reborn-as-an-under-the-table-skunkworks-project&amp;#34;&amp;gt;The Nissan Z was dead, then reborn as an &amp;amp;quot;under the table&amp;amp;quot; skunkworks project&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-201710/</link>
      <pubDate>Wed, 18 Aug 2021 20:17:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-201710/</guid>
      <description>&amp;lt;p&amp;gt;KABUL (Reuters) -At least three people were killed in anti-Taliban protests in the Afghan city of Jalalabad on Wednesday, witnesses said, as the Islamist group moved to consolidate power and Western countries ramped up evacuations from a chaotic Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-scene/taliban-go-door-to-door-telling-fearful-afghans-to-work-idUSKBN2FJ1RC&amp;#34;&amp;gt;Taliban go door-to-door telling fearful Afghans to work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/18/arrival-takes-low-cost-road-to-mass-prod?videoId=734311562&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Arrival takes low-cost road to mass production&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210818-201645/</link>
      <pubDate>Wed, 18 Aug 2021 20:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210818-201645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/08/hackers-who-breached-t-mobile-stole-personal-data-for-49-million-accounts/&amp;#34;&amp;gt;Hackers who breached T-Mobile stole personal data for ~49 million accounts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PII includes first and last names, dates of birth, SSNs, and driver’s license numbers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210818-201602/</link>
      <pubDate>Wed, 18 Aug 2021 20:16:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210818-201602/</guid>
      <description>Request a demo&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210818-200631/</link>
      <pubDate>Wed, 18 Aug 2021 20:06:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210818-200631/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/&amp;#34;&amp;gt;T-Mobile: Breach Exposed SSN/DOB of 40M&#43; People&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
T-Mobile is warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. The acknowledgment came less than 48 hours after millions of the stolen T-Mobile customer records went up for sale in the cybercrime underground.&amp;lt;br&amp;gt;
In a statement Tuesday evening, T-Mobile said a “highly sophisticated” attack against its network led to the breach of data on millions of customers.&amp;lt;br&amp;gt;
“Our preliminary analysis is that approximately 7.8 million current T-Mobile postpaid customer accounts’ information appears to be contained in the stolen files, as well as just over 40 million records of former or prospective customers who had previously applied for credit with T-Mobile,” the company wrote in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.t-mobile.com/news/network/additional-information-regarding-2021-cyberattack-investigation&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; . “Importantly, no phone numbers, account numbers, PINs, passwords, or financial information were compromised in any of these files of customers or prospective customers.”&amp;lt;br&amp;gt;
Nevertheless, T-Mobile is urging all T-Mobile postpaid customers to proactively change their account PINs by going online into their T-Mobile account or calling customer care at 611. “This precaution is despite the fact that we have no knowledge that any postpaid account PINs were compromised,” the advisory reads.&amp;lt;br&amp;gt;
It is not clear how many people total may be impacted by this breach. T-Mobile hasn’t yet responded to requests for clarification regarding how many of the 7.8 million current customers may also have been affected by the credit application breach. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/#more-56638&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-161847/</link>
      <pubDate>Wed, 18 Aug 2021 16:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-161847/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133279_2022-jeep-commander-compass-based-3-row-crossover-debuts-in-brazil&amp;#34;&amp;gt;2022 Jeep Commander: Compass-based 3-row crossover debuts in Brazil&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133276_bmw-ix5-hydrogen-revealed-ahead-of-2022-start-of-production&amp;#34;&amp;gt;BMW iX5 Hydrogen revealed ahead of 2022 start of production&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210818-161649/</link>
      <pubDate>Wed, 18 Aug 2021 16:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210818-161649/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/spring-cleaning-mdn-part-2/&amp;#34;&amp;gt;Spring cleaning MDN: Part 2 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/spring-cleaning-mdn-part-2/&amp;#34;&amp;gt;Spring cleaning MDN: Part 2&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Last month we removed a bunch of content from MDN. MDN is 16 years old (and yes it can drink in some countries), all that time ago it was a great place for all of Mozilla to document all of their things. As MDN evolved and the web reference became our core content, other areas became less relevant to the overall site. We have ~11k active pages on MDN, so keeping them up to date is a big task and we feel our focus should be there.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-161601/</link>
      <pubDate>Wed, 18 Aug 2021 16:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-161601/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: Taliban to reach out to former soldiers and pilots to join its ranks, country may be governed by a ruling council &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/exclusive-council-may-rule-afghanistan-taliban-reach-out-soldiers-pilots-senior-2021-08-18/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/three-killed-as-afghan-protests-test-talibans-promise-of-peaceful-rule-idUSKBN2FJ0EA&amp;#34;&amp;gt;Three killed as Afghan protests test Taliban&amp;#39;s promise of peaceful rule&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -At least three people were killed in anti-Taliban protests in the Afghan city of Jalalabad on Wednesday, witnesses said, as the militant group moved to create a government and Western countries ramped up evacuations from a chaotic Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-future-exclusive/exclusive-council-may-rule-afghanistan-taliban-to-reach-out-to-soldiers-pilots-senior-member-idUSKBN2FJ1LA&amp;#34;&amp;gt;Exclusive-Council may rule Afghanistan, Taliban to reach out to soldiers, pilots-senior member&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-tajikistan-diplo/afghan-envoy-says-hold-out-panjshir-province-can-resist-taliban-rule-idUSKBN2FJ1LW&amp;#34;&amp;gt;Afghan envoy says hold-out Panjshir province can resist Taliban rule&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20210818-160814/</link>
      <pubDate>Wed, 18 Aug 2021 16:08:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20210818-160814/</guid>
      <description>You’ve probably seen a syringe before. When its plunger is pressed, the contents of the syringe come out on the other end. In the demonstration below we have a syringe connected through a thin hose to another container that has a spring in it. The entire system is filled with water . As you increase the force on the plunger observe the little spring being compressed at the other end of the hose:&amp;lt;br&amp;gt;
If the cargo is placed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;relatively low&amp;lt;/a&amp;gt; , it can actually significantly increase the stability of the ship. However, for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;some positions&amp;lt;/a&amp;gt; of cargo, the ship’s stable position is tilted to one side or the other, even though the geometry of the hull and carried load are perfectly symmetrical – that angle is known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Angle_of_loll&amp;#34;&amp;gt;angle of loll&amp;lt;/a&amp;gt; . When the cargo is placed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;very high&amp;lt;/a&amp;gt; this ship becomes completely unstable.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Inside My Mind | Words from my brain</title>
      <link>https://www.whatsupup.com/blog/lynch/tiddly/20210818-160611/</link>
      <pubDate>Wed, 18 Aug 2021 16:06:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/lynch/tiddly/20210818-160611/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;#34;&amp;gt;[Guest Writer] My Thoughts On Afghanistan As A Member Of The US Military&amp;lt;/a&amp;gt; August 18, 2021&amp;lt;br&amp;gt;
I’ve decided that in light of the current atrocities happening across Afghanistan, I need to write this informal blog to get some things off my chest about the American Experience … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ryanandrewlangdon.wordpress.com/2021/08/18/guest-writer-my-thoughts-on-afghanistan-as-a-member-of-the-us-military/&amp;#34;&amp;gt;Continue reading [Guest Writer] My Thoughts On Afghanistan As A Member Of The US Military&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-121910/</link>
      <pubDate>Wed, 18 Aug 2021 12:19:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-121910/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133275_2022-mercedes-benz-c-class-wagon-spawns-all-terrain-soft-roader&amp;#34;&amp;gt;2022 Mercedes-Benz C-Class Wagon spawns All-Terrain soft-roader&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133266_2022-lincoln-navigator-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Lincoln Navigator reads the road ahead and adds highway hands-free driver-assist system&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-121601/</link>
      <pubDate>Wed, 18 Aug 2021 12:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-121601/</guid>
      <description>&amp;lt;p&amp;gt;Apple Inc on Tuesday appealed a copyright case it lost against security startup Corellium, which helps researchers examine programs like Apple&amp;#39;s planned new method for detecting child sex abuse images &amp;lt;a href=&amp;#34;https://www.reuters.com/technology/after-criticism-apple-only-seek-abuse-images-flagged-multiple-nations-2021-08-13&amp;#34;&amp;gt;https://www.reuters.com/technology/after-criticism-apple-only-seek-abuse-images-flagged-multiple-nations-2021-08-13&amp;lt;/a&amp;gt;.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/evacuations-from-afghanistan-gain-momentum-as-taliban-promise-peace-idUSKBN2FJ0EA&amp;#34;&amp;gt;Evacuations from Afghanistan gain momentum as Taliban promise peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -More than 2,200 diplomats and civilians have been evacuated from Afghanistan on military flights, a Western security official said on Wednesday, as the Taliban made first efforts to set up a government after their lightning sweep into the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-germany-evacuees/afghans-evacuated-to-germany-describe-terrifying-scenes-at-kabul-airport-idUSKBN2FJ0VP&amp;#34;&amp;gt;Afghans evacuated to Germany describe terrifying scenes at Kabul airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/haitians-sheltering-in-tents-grow-impatient-for-aid-after-devastating-quake-idUSKBN2FJ0OB&amp;#34;&amp;gt;Haitians sheltering in tents grow impatient for aid after devastating quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-081849/</link>
      <pubDate>Wed, 18 Aug 2021 08:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-081849/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128713_2022-audi-e-tron-s-review-price-photos-specs-info&amp;#34;&amp;gt;2022 Audi E-Tron S electric crossover revealed with 3-motor powertrain, $85,895 price tag&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-081600/</link>
      <pubDate>Wed, 18 Aug 2021 08:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-081600/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/evacuations-from-afghanistan-gather-momentum-as-taliban-promise-peace-idUSKBN2FJ0EA&amp;#34;&amp;gt;Evacuations from Afghanistan gather momentum as Taliban promise peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -More than 2,200 diplomats and other civilians have been evacuated from Afghanistan on military flights, a Western security official told Reuters on Wednesday, as efforts gathered pace to get people out after the Taliban seized the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-germany-election/german-spd-overtakes-greens-close-in-on-conservatives-before-election-idUSKBN2FJ0LC&amp;#34;&amp;gt;German SPD overtakes Greens, close in on conservatives before election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Robert Heaton</title>
      <link>https://www.whatsupup.com/blog/glooming/wrackful/20210818-080704/</link>
      <pubDate>Wed, 18 Aug 2021 08:07:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/glooming/wrackful/20210818-080704/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://advancedbeginners.substack.com&amp;#34;&amp;gt;Programming Feedback for Advanced Beginners&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-041720/</link>
      <pubDate>Wed, 18 Aug 2021 04:17:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-041720/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-apple-corellium/apple-appeals-against-security-research-firm-while-touting-researchers-idUSKBN2FI24O&amp;#34;&amp;gt;Apple appeals against security research firm while touting researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Apple Inc on Tuesday appealed a copyright case it lost against security startup Corellium, which helps researchers examine programs like Apple&amp;amp;#39;s planned new method for detecting child sex abuse images.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-002029/</link>
      <pubDate>Wed, 18 Aug 2021 00:20:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210818-002029/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133257_2023-nissan-z-price-specs-review-info-photos&amp;#34;&amp;gt;2023 Nissan Z arrives with 400 hp, retro styling, optional blue or red interiors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-001647/</link>
      <pubDate>Wed, 18 Aug 2021 00:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210818-001647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-pledge-peace-and-womens-rights-under-islam-as-they-strike-conciliatory-tone-idUSKBN2FI0AT&amp;#34;&amp;gt;Taliban pledge peace and women&amp;#39;s rights under Islam as they strike conciliatory tone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban said on Tuesday they wanted peaceful relations with other countries and would respect the rights of women within the framework of Islamic law, as they held their first official news briefing since their lightning seizure of Kabul.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-201957/</link>
      <pubDate>Tue, 17 Aug 2021 20:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-201957/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133259_2024-land-rover-range-rover-sport-svr-spy-shots&amp;#34;&amp;gt;2024 Land Rover Range Rover Sport SVR spy shots: High-performance crossover takes shape&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-201621/</link>
      <pubDate>Tue, 17 Aug 2021 20:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-201621/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-striking-dovish-tone-pledge-peace-and-womens-rights-under-islam-idUSKBN2FI0AT&amp;#34;&amp;gt;Taliban, striking dovish tone, pledge peace and women&amp;#39;s rights under Islam&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Afghan Taliban said on Tuesday they wanted peaceful relations with other countries and would respect the rights of women within the framework of Islamic law, as they held their first official news briefing since their shock seizure of Kabul.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-eu-taliban/eu-says-it-will-work-with-taliban-only-if-human-rights-respected-idUSKBN2FI1VJ&amp;#34;&amp;gt;EU says it will work with Taliban only if human rights respected&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-refugees/bidens-vow-to-airlift-afghan-allies-meets-ticking-clock-risky-rescue-idUSKBN2FI241&amp;#34;&amp;gt;Biden&amp;amp;#39;s vow to airlift Afghan allies meets ticking clock, risky rescue&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-161954/</link>
      <pubDate>Tue, 17 Aug 2021 16:19:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-161954/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133261_2021-shelby-f-150-super-snake-bites-with-775-hp-0-60-mph-in-3-45-seconds&amp;#34;&amp;gt;2021 Shelby F-150 Super Snake bites with 775 hp, 0-60 mph in 3.45 seconds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128713_2022-audi-e-tron-s-review-price-photos-specs-info&amp;#34;&amp;gt;2022 Audi E-Tron S electric SUV revealed with 3-motor powertrain for $85,895&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-161634/</link>
      <pubDate>Tue, 17 Aug 2021 16:16:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-161634/</guid>
      <description>&amp;lt;p&amp;gt;How the Taliban engineered a political collapse of Afghanistan &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/how-taliban-engineered-political-collapse-afghanistan-2021-08-17/%20&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-say-they-want-peace-will-respect-womens-rights-under-islamic-law-idUSKBN2FI0AT&amp;#34;&amp;gt;Taliban say they want peace, will respect women&amp;#39;s rights under Islamic law&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The Taliban held their first official news conference in Kabul on Tuesday since the shock seizure of the city, declaring they wanted peaceful relations with other countries and would respect the rights of women within the framework of Islamic law.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-vice-president/afghan-vice-president-saleh-says-on-twitter-he-is-legitimate-caretaker-president-idUSKBN2FI1GK&amp;#34;&amp;gt;Afghan vice president Saleh says on Twitter he is legitimate caretaker president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/we-need-food-heavy-rains-lash-haiti-quake-survivors-idUSKBN2FI0RP&amp;#34;&amp;gt;&amp;amp;#39;We need food&amp;amp;#39;: heavy rains lash Haiti quake survivors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210817-161619/</link>
      <pubDate>Tue, 17 Aug 2021 16:16:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210817-161619/</guid>
      <description>Data reportedly includes SSNs, driver&amp;#39;s license numbers, and more for 100 million people.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-121944/</link>
      <pubDate>Tue, 17 Aug 2021 12:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210817-121944/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133255_2023-chevrolet-corvette-e-ray-spy-shots-hybrid-corvette-coming&amp;#34;&amp;gt;2023 Chevrolet Corvette E-Ray spy shots: Hybrid Corvette coming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131809_2022-toyota-86-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Toyota GR86 teaches the old-school performance-driving basics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133256_surf-s-up-ford-previews-beach-inspired-bronco-accessories-with-riptide-concept&amp;#34;&amp;gt;Surf&amp;amp;#39;s up: Ford previews beach-inspired Bronco accessories with Riptide concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-121615/</link>
      <pubDate>Tue, 17 Aug 2021 12:16:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-121615/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/evacuation-flights-restart-from-kabul-after-afghans-desperate-to-flee-cleared-from-airfield-idUSKBN2FI0AT&amp;#34;&amp;gt;Evacuation flights restart from Kabul after Afghans desperate to flee cleared from airfield&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -U.S. military flights evacuating diplomats and civilians from Afghanistan restarted on Tuesday after the runway at Kabul airport was cleared of thousands desperate to flee following the Taliban&amp;amp;#39;s sudden takeover of the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-germany-aircraft/afghan-turmoil-shames-the-west-says-german-president-idUSKBN2FI0F9&amp;#34;&amp;gt;Afghan turmoil &amp;amp;#39;shames&amp;amp;#39; the West, says German president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/hopes-for-quake-survivors-dwindle-as-storm-lashes-haiti-idUSKBN2FI0RP&amp;#34;&amp;gt;Hopes for quake survivors dwindle as storm lashes Haiti&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-081606/</link>
      <pubDate>Tue, 17 Aug 2021 08:16:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-081606/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/evacuation-flights-resume-at-kabul-airport-as-biden-defends-u-s-withdrawal-idUSKBN2FI0AT&amp;#34;&amp;gt;Evacuation flights resume at Kabul airport as Biden defends U.S. withdrawal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Military flights evacuating diplomats and civilians from Afghanistan resumed early on Tuesday after the runway at Kabul airport was cleared of thousands of people desperate to flee after the Taliban seized the capital.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210817-081052/</link>
      <pubDate>Tue, 17 Aug 2021 08:10:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210817-081052/</guid>
      <description>The Bob Noyce Esquire profile by Tom Wolfe that @pmarca and @bhorowitz mentioned today. Fantastic read on multiple levels. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/atol9YUv0a&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/atol9YUv0a&amp;#34;&amp;gt;https://t.co/atol9YUv0a&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/SM2dcfM4wp&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/SM2dcfM4wp&amp;#34;&amp;gt;https://t.co/SM2dcfM4wp&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-041600/</link>
      <pubDate>Tue, 17 Aug 2021 04:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-041600/</guid>
      <description>&amp;lt;p&amp;gt;Military evacuation flights start taking off from Kabul airport &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/military-evacuation-flights-taking-off-kabul-western-official-2021-08-17/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/chaos-desperation-at-kabul-airport-as-biden-defends-withdrawal-from-afghanistan-idUSKBN2FG01T&amp;#34;&amp;gt;Chaos, desperation at Kabul airport as Biden defends withdrawal from Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Thousands of people desperate to flee Afghanistan thronged Kabul&amp;amp;#39;s airport on Monday after the Taliban seized the capital, prompting the United States to pause evacuations, as President Joe Biden confronted mounting criticism over the U.S. withdrawal.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kongs-lam-tells-solicitors-group-to-stay-out-of-politics-idUSKBN2FI05K&amp;#34;&amp;gt;Hong Kong&amp;amp;#39;s Lam tells solicitors&amp;amp;#39; group to stay out of politics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210817-041545/</link>
      <pubDate>Tue, 17 Aug 2021 04:15:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210817-041545/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/08/t-mobile-has-been-hacked-yet-again-but-still-doesnt-know-what-was-taken/&amp;#34;&amp;gt;T-Mobile has been hacked yet again—but still doesn’t know what was taken&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Data reportedly includes SSNs, driver license numbers, and more for 100 million people.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210817-040557/</link>
      <pubDate>Tue, 17 Aug 2021 04:05:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210817-040557/</guid>
      <description>Communications giant T-Mobile said today it is investigating the extent of a breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device.&amp;lt;br&amp;gt;
On Sunday, Vice.com &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million&amp;#34;&amp;gt;broke the news&amp;lt;/a&amp;gt; that someone was selling data on 100 million people, and that the data came from T-Mobile. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.t-mobile.com/news/network/cybersecurity-incident-update-august-2021&amp;#34;&amp;gt;a statement&amp;lt;/a&amp;gt; published on its website today, the company confirmed it had suffered an intrusion involving “some T-Mobile data,” but said it was too soon in its investigation to know what was stolen and how many customers might be affected.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-001618/</link>
      <pubDate>Tue, 17 Aug 2021 00:16:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210817-001618/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/chaos-death-at-kabul-airport-as-biden-defends-withdrawal-from-afghanistan-idUSKBN2FG01T&amp;#34;&amp;gt;Chaos, death at Kabul airport as Biden defends withdrawal from Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Thousands of people desperate to flee Afghanistan thronged Kabul&amp;amp;#39;s airport on Monday after the Taliban seized the capital, prompting the United States to pause evacuations much of the day as President Joe Biden confronted mounting criticism over the U.S. withdrawal.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-biden-afghanistan/biden-defends-afghanistan-decision-blames-afghan-armys-unwillingness-to-fight-idUSKBN2FH27J&amp;#34;&amp;gt;Biden defends Afghanistan decision, blames Afghan army&amp;amp;#39;s unwillingness to fight&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-russia/russia-says-kabul-seems-safer-under-taliban-than-it-was-under-ghani-idUSKBN2FH2AB&amp;#34;&amp;gt;Russia says Kabul seems safer under Taliban than it was under Ghani&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210817-001059/</link>
      <pubDate>Tue, 17 Aug 2021 00:10:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210817-001059/</guid>
      <description>I&amp;#39;m discussing “One on One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Today, Aug 16 at 7:00 PM PDT in @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/4RrK1b887J&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/4RrK1b887J&amp;#34;&amp;gt;https://t.co/4RrK1b887J&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210817-000618/</link>
      <pubDate>Tue, 17 Aug 2021 00:06:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210817-000618/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-investigating-claims-of-massive-data-breach/&amp;#34;&amp;gt;T-Mobile Investigating Claims of Massive Data Breach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Communications giant T-Mobile said today it is investigating the extent of a data breach that hackers claim has exposed sensitive personal data on 100 million T-Mobile USA customers, in many cases including the name, Social Security number, address, date of birth, phone number, security PINs and details that uniquely identify each customer’s mobile device.&amp;lt;br&amp;gt;
On Sunday, Vice.com &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million&amp;#34;&amp;gt;broke the news&amp;lt;/a&amp;gt; that someone was selling data on 100 million people, and that the data came from T-Mobile. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.t-mobile.com/news/network/cybersecurity-incident-update-august-2021&amp;#34;&amp;gt;a statement&amp;lt;/a&amp;gt; published on its website today, T-Mobile confirmed it had suffered an intrusion involving customer data, but said it was too soon in its investigation to know what was stolen and how many customers may be affected.&amp;lt;br&amp;gt;
A sales thread tied to the allegedly stolen T-Mobile customer data.&amp;lt;br&amp;gt;
“We have determined that unauthorized access to some T-Mobile data occurred, however we have not yet determined that there is any personal customer data involved,” T-Mobile wrote.&amp;lt;br&amp;gt;
“We are confident that the entry point used to gain access has been closed, and we are continuing our deep technical review of the situation across our systems to identify the nature of any data that was illegally accessed,” the statement continued. “This investigation will take some time but we are working with the highest degree of urgency. Until we have completed this assessment we cannot confirm the reported number of records affected or the validity of statements made by others.”&amp;lt;br&amp;gt;
The intrusion came to light on Twitter when the account &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/und0xxed&amp;#34;&amp;gt;@und0xxed&amp;lt;/a&amp;gt; started tweeting the details. Reached via direct message, Und0xxed said they were not involved in stealing the databases but was instead in charge of finding buyers for the stolen T-Mobile customer data.&amp;lt;br&amp;gt;
Und0xxed said the hackers found an opening in T-Mobile’s wireless data network that allowed access to two of T-Mobile’s customer data centers. From there, the intruders were able to dump a number of customer databases totaling more than 100 gigabytes.&amp;lt;br&amp;gt;
They claim one of those databases holds the name, date of birth, SSN, drivers license information, plaintext security PIN, address and phone number of 36 million T-Mobile customers in the United States — all going back to the mid-1990s.&amp;lt;br&amp;gt;
The hacker(s) claim the purloined data also includes &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.guidingtech.com/imei-vs-imsi-number/&amp;#34;&amp;gt;IMSI and IMEI data&amp;lt;/a&amp;gt; for 36 million customers. These are unique numbers embedded in customer mobile devices that identify the device and the SIM card that ties that customer’s device to a telephone number.&amp;lt;br&amp;gt;
“If you want to verify that I have access to the data/the data is real, just give me a T-Mobile number and I’ll run a lookup for you and return the IMEI and IMSI of the phone currently attached to the number and any other details,” @und0xxed said. “All T-Mobile USA prepaid and postpaid customers are affected; Sprint and the other telecoms that T-Mobile owns are unaffected.”&amp;lt;br&amp;gt;
Other databases allegedly accessed by the intruders included one for prepaid accounts, which had far fewer details about customers.&amp;lt;br&amp;gt;
“Prepaid customers usually are just phone number and IMEI and IMSI,” Und0xxed said. “Also, the collection of databases includes historical entries, and many phone numbers have 10 or 20 IMEIs attached to them over the years, and the service dates are provided. There’s also a database that includes credit card numbers with six digits of the cards obfuscated.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/t-mobile-investigating-claims-of-massive-data-breach/#more-56613&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-202009/</link>
      <pubDate>Mon, 16 Aug 2021 20:20:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-202009/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133252_travis-pastrana-shatters-mt-washington-hillclimb-record-in-862-hp-subaru-wrx-sti&amp;#34;&amp;gt;Travis Pastrana shatters Mt. Washington Hillclimb record in 862-hp Subaru WRX STI&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133246_genesis-hints-at-move-into-motorsport-with-trio-of-race-car-concepts&amp;#34;&amp;gt;Genesis hints at move into motorsport with trio of race car concepts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210816-201644/</link>
      <pubDate>Mon, 16 Aug 2021 20:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210816-201644/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/08/hospitals-hamstrung-by-ransomware-are-turning-away-patients/&amp;#34;&amp;gt;Hospitals hamstrung by ransomware are turning away patients&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The ransomware epidemic continues to grow.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-201637/</link>
      <pubDate>Mon, 16 Aug 2021 20:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-201637/</guid>
      <description>&amp;lt;p&amp;gt;Chaos reigns at Kabul airport, where several people were killed and thousands of Afghans thronged hoping to escape &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/talibans-rapid-advance-across-afghanistan-2021-08-10/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/kabul-evacuations-stall-amid-runway-chaos-as-u-s-denounced-for-pullout-idUSKBN2FG01T&amp;#34;&amp;gt;Kabul evacuations stall amid runway chaos as U.S. denounced for pullout&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Thousands of civilians desperate to flee Afghanistan thronged Kabul airport&amp;amp;#39;s single runway on Monday after the Taliban seized the capital, prompting the United States to suspend evacuations as it came under mounting criticism at home over its pullout.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-women/afghans-will-not-tolerate-womens-removal-from-society-mp-says-idUSKBN2FH20Z&amp;#34;&amp;gt;Afghans will not tolerate women&amp;amp;#39;s removal from society, MP says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-jalali/former-afghan-minister-says-he-was-not-considered-as-transitional-president-idUSKBN2FH23K&amp;#34;&amp;gt;Former Afghan minister says he was not considered as transitional president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210816-201127/</link>
      <pubDate>Mon, 16 Aug 2021 20:11:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210816-201127/</guid>
      <description>One On One with A &amp;amp;amp; Z is back tonight at 7pm PST on @Clubhouse! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/63srZPjEHr&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/63srZPjEHr&amp;#34;&amp;gt;https://t.co/63srZPjEHr&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-162031/</link>
      <pubDate>Mon, 16 Aug 2021 16:20:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-162031/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133242_artcenter-college-of-design-students-imagine-the-lincoln-of-the-future&amp;#34;&amp;gt;ArtCenter College of Design students imagine the Lincoln of the future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132571_ford-shelby-cobra-concept-fetches-2-64m-at-monterey-auction&amp;#34;&amp;gt;Ford Shelby Cobra concept fetches $2.64M at Monterey auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-161645/</link>
      <pubDate>Mon, 16 Aug 2021 16:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-161645/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/kabul-airport-chaos-stalls-evacuations-amid-criticism-of-u-s-pullout-idUSKBN2FG01T&amp;#34;&amp;gt;Kabul airport chaos stalls evacuations amid criticism of U.S. pullout&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Thousands of civilians desperate to flee Afghanistan thronged Kabul airport on Monday after the Taliban seized the capital, prompting the U.S. military to suspend evacuations as the United States came under mounting criticism at home over its pullout.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/as-storm-looms-medics-rush-to-hospitals-overrun-by-haiti-quake-idUSKBN2FH1FY&amp;#34;&amp;gt;As storm looms, medics rush to hospitals overrun by Haiti quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-121951/</link>
      <pubDate>Mon, 16 Aug 2021 12:19:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-121951/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133240_gunther-werks-shows-off-993-speedster-in-monterey&amp;#34;&amp;gt;Gunther Werks shows off 993 Speedster in Monterey&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133118_rights-to-first-2022-acura-nsx-type-s-receives-1m-final-bid&amp;#34;&amp;gt;Rights to first 2022 Acura NSX Type S receives $1M final bid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133239_1938-mercedes-benz-540k-best-of-show-2021-pebble-beach-concours&amp;#34;&amp;gt;1938 Mercedes-Benz 540K wins Best of Show at 2021 Pebble Beach Concours&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210816-121818/</link>
      <pubDate>Mon, 16 Aug 2021 12:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210816-121818/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/16/technology/twitter-culture-change-conflict.html&amp;#34;&amp;gt;Culture Change and Conflict at Twitter Two years ago, the company brought in a blunt executive to make things move faster and to promote diversity. Then the problems began. By Kate Conger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-121626/</link>
      <pubDate>Mon, 16 Aug 2021 12:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-121626/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/five-killed-at-chaotic-afghan-airport-as-taliban-proclaim-peace-idUSKBN2FG01T&amp;#34;&amp;gt;Five killed at chaotic Afghan airport as Taliban proclaim peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Five people were killed in chaos at Kabul airport on Monday, witnesses said, as people tried to flee a day after Taliban insurgents seized the Afghan capital and declared the war against foreign and local forces over.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-mood/kabuls-former-green-zone-abandoned-as-diplomats-flee-afghan-capital-idUSKBN2FH0E0&amp;#34;&amp;gt;Kabul&amp;amp;#39;s former &amp;amp;#39;Green Zone&amp;amp;#39; abandoned as diplomats flee Afghan capital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-081919/</link>
      <pubDate>Mon, 16 Aug 2021 08:19:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-081919/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132865_time-capsule-1995-mclaren-f1-with-242-miles-headed-to-auction&amp;#34;&amp;gt;Time capsule 1995 McLaren F1 with 243 miles sells for more than $20M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-081611/</link>
      <pubDate>Mon, 16 Aug 2021 08:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-081611/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghanistan-is-peaceful-taliban-say-chaos-engulfs-airport-idUSKBN2FG01T&amp;#34;&amp;gt;Afghanistan is peaceful, Taliban say, chaos engulfs airport&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Peace prevailed across Afghanistan on Monday, Taliban officials said, as the militants declared the war over a day after seizing the capital, while Western nations scrambled to evacuate their citizens from an increasingly chaotic Kabul airport.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysias-king-keeps-muhyiddin-as-interim-pm-after-resignation-idUSKBN2FH01U&amp;#34;&amp;gt;Malaysia&amp;amp;#39;s king keeps Muhyiddin as interim PM after resignation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-042017/</link>
      <pubDate>Mon, 16 Aug 2021 04:20:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210816-042017/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129473_2022-jeep-wagoneer-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Jeep Wagoneer sets new standards for American luxury and capability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-041651/</link>
      <pubDate>Mon, 16 Aug 2021 04:16:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-041651/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-declares-war-is-over-as-president-and-diplomats-flee-kabul-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban declares &amp;#39;war is over&amp;#39; as president and diplomats flee Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Taliban declared the war in Afghanistan was over after insurgents took control of the presidential palace in Kabul as U.S.-led forces departed and Western nations scrambled on Monday to evacuate their citizens.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/haiti-hospitals-overwhelmed-by-quake-victims-as-death-toll-hits-1297-idUSKBN2FG046&amp;#34;&amp;gt;Haiti hospitals overwhelmed by quake victims as death toll hits 1,297&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysian-pm-expected-to-resign-after-months-of-political-turmoil-idUSKBN2FH01U&amp;#34;&amp;gt;Malaysian PM expected to resign after months of political turmoil&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-001710/</link>
      <pubDate>Mon, 16 Aug 2021 00:17:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210816-001710/</guid>
      <description>&amp;lt;p&amp;gt;More than 1,200 dead, 5,700 injured after Haiti quake as rescuers search for survivors before tropical storm hits &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas/haitians-scramble-rescue-survivors-ruins-major-quake-2021-08-15/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-return-to-power-as-president-and-diplomats-flee-kabul-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban return to power as president and diplomats flee Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents were returning to power in Kabul on Monday after a military advance across Afghanistan as U.S-led forces departed, and Western nations stepped up efforts to evacuate their citizens from the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/rescuers-race-to-find-haiti-quake-survivors-as-death-toll-hits-1297-idUSKBN2FG046&amp;#34;&amp;gt;Rescuers race to find Haiti quake survivors as death toll hits 1,297&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban/taliban-spokesman-says-war-is-over-in-afghanistan-al-jazeera-idUSKBN2FG0N5&amp;#34;&amp;gt;Taliban spokesman says &amp;amp;#34;war is over in Afghanistan&amp;amp;#34; - Al Jazeera&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210815-201752/</link>
      <pubDate>Sun, 15 Aug 2021 20:17:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210815-201752/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/#comments&amp;#34;&amp;gt;4 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-201557/</link>
      <pubDate>Sun, 15 Aug 2021 20:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-201557/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-enter-afghan-capital-president-and-diplomats-flee-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban enter Afghan capital, president and diplomats flee&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents entered Kabul on Sunday and President Ashraf Ghani left Afghanistan saying he wanted to avoid bloodshed, bringing the Islamist militants close to taking over the country two decades after they were overthrown by a U.S.-led invasion.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-advances-timelin/timeline-the-talibans-rapid-advance-across-afghanistan-idUSKBN2FG03Q&amp;#34;&amp;gt;Timeline: The Taliban&amp;amp;#39;s rapid advance across Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-zambia-election/zambian-opposition-leader-hichilema-heads-closer-to-victory-in-presidential-vote-idUSKBN2FG0JS&amp;#34;&amp;gt;Zambian opposition leader Hichilema heads closer to victory in presidential vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-161643/</link>
      <pubDate>Sun, 15 Aug 2021 16:16:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-161643/</guid>
      <description>&amp;lt;p&amp;gt;More than 700 dead after Haiti earthquake as tropical storm looms &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas/haitians-scramble-rescue-survivors-ruins-major-quake-2021-08-15/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-want-full-power-after-return-to-afghanistan-capital-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban want full power after return to Afghanistan capital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Afghanistan&amp;amp;#39;s Taliban entered the capital Kabul on Sunday and Western-backed President Ashraf Ghani left the country, with the insurgents saying they were seeking complete power.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-ghani-profile/ashraf-ghani-departing-afghan-president-who-failed-to-make-peace-with-taliban-idUSKBN2FG0F3&amp;#34;&amp;gt;Ashraf Ghani: departing Afghan president who failed to make peace with Taliban&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-blinken/u-s-moves-kabul-embassy-staff-to-airport-as-taliban-enter-afghan-capital-idUSKBN2FG0D7&amp;#34;&amp;gt;U.S. moves Kabul embassy staff to airport as Taliban enter Afghan capital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210815-122013/</link>
      <pubDate>Sun, 15 Aug 2021 12:20:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210815-122013/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133229_volkswagen-gti-bbs-concept-channels-classic-vw-tuner-builds&amp;#34;&amp;gt;Volkswagen GTI BBS concept channels classic VW tuner builds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-121641/</link>
      <pubDate>Sun, 15 Aug 2021 12:16:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-121641/</guid>
      <description>&amp;lt;p&amp;gt;Taliban enter Afghan capital Kabul as U.S. diplomats evacuate by chopper &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/us-troops-arrive-afghan-capital-assist-evacuations-2021-08-14/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-enter-afghan-capital-as-us-diplomats-evacuate-by-chopper-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban enter Afghan capital as US diplomats evacuate by chopper&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents entered Afghanistan&amp;amp;#39;s capital Kabul on Sunday as the United States evacuated diplomats from its embassy by helicopter and a government minister said power would be handed over to an interim administration.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-mexico-flights/pressed-by-u-s-mexico-hastens-migrant-expulsions-with-flights-south-idUSKBN2FG0B1&amp;#34;&amp;gt;Pressed by U.S., Mexico hastens migrant expulsions with flights south&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-081715/</link>
      <pubDate>Sun, 15 Aug 2021 08:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-081715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/haitians-scramble-to-rescue-survivors-from-ruins-of-major-quake-idUSKBN2FG046&amp;#34;&amp;gt;Haitians scramble to rescue survivors from ruins of major quake&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Haitians labored overnight to pick through shattered buildings in search of friends and relatives trapped in the rubble after a devastating earthquake struck the Caribbean country on Saturday, killing more than 300 people and injuring many more.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-at-door-of-afghan-capital-after-eastern-city-falls-us-starts-evacuating-embassy-idUSKBN2FG01T&amp;#34;&amp;gt;Taliban at door of Afghan capital after eastern city falls, US starts evacuating embassy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysia-pm-muhyiddin-to-resign-on-monday-report-idUSKBN2FG040&amp;#34;&amp;gt;Malaysia PM Muhyiddin to resign on Monday - report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-041757/</link>
      <pubDate>Sun, 15 Aug 2021 04:17:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-041757/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-government-seeks-to-hold-capital-as-taliban-takes-jalalabad-idUSKBN2FG01T&amp;#34;&amp;gt;Afghan government seeks to hold capital as Taliban takes Jalalabad&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Taliban insurgents took control of the key eastern Afghanistan  city of Jalalabad without a fight on Sunday, leaving the territory controlled by the crumbling government to little more than the capital Kabul.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-lebanon-crisis-fuel-explosion/at-least-20-killed-in-lebanon-fuel-tank-explosion-red-cross-idUSKBN2FG00Z&amp;#34;&amp;gt;At least 20 killed in Lebanon fuel tank explosion -Red Cross&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-001839/</link>
      <pubDate>Sun, 15 Aug 2021 00:18:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210815-001839/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-government-seeks-to-hold-last-strongholds-as-taliban-extend-capture-of-cities-idUSKBN2FF03M&amp;#34;&amp;gt;Afghan government seeks to hold last strongholds as Taliban extend capture of cities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban fighters captured the major city of Mazar-i-Sharif in northern Afghanistan on Saturday, sending Afghan forces fleeing, and drew closer to Kabul as Western countries scrambled to evacuate their citizens from the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/quake-kills-hundreds-in-haiti-worsening-caribbean-nations-plight-idUSKBN2FF08X&amp;#34;&amp;gt;Quake kills hundreds in Haiti, worsening Caribbean nation&amp;amp;#39;s plight&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210814-201950/</link>
      <pubDate>Sat, 14 Aug 2021 20:19:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210814-201950/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133216_acura-integra-nameplate-returns-in-2022&amp;#34;&amp;gt;Acura Integra nameplate returns in 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-201625/</link>
      <pubDate>Sat, 14 Aug 2021 20:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-201625/</guid>
      <description>&amp;lt;p&amp;gt;At least 227 people dead in Haiti earthquake, hundreds injured or missing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/environment/magnitude-7-quake-strikes-western-haiti-usgs-2021-08-14/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-capture-major-city-in-northern-afghanistan-draw-closer-to-kabul-idUSKBN2FF03M&amp;#34;&amp;gt;Taliban capture major city in northern Afghanistan, draw closer to Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban forces captured a major city in northern Afghanistan on Saturday, sending Afghan forces fleeing, and drew closer to Kabul, where Western countries scrambled to evacuate their citizens from the capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/hundreds-killed-in-magnitude-7-2-quake-in-haiti-idUSKBN2FF08X&amp;#34;&amp;gt;Hundreds killed in magnitude 7.2 quake in Haiti&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210814-200608/</link>
      <pubDate>Sat, 14 Aug 2021 20:06:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210814-200608/</guid>
      <description>“Worried about dirty funds in your BTC address? Come check out Antinalysis, the new address risk analyzer,” reads the service’s announcement, pointing to a link only accessible via &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Tor_(network)&amp;#34;&amp;gt;Tor&amp;lt;/a&amp;gt; . “This service is dedicated to individuals that have the need to possess complete privacy on the blockchain, offering a perspective from the opponent’s point of view in order for the user to comprehend the possibility of his/her funds getting flagged down under autocratic illegal charges.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-163320/</link>
      <pubDate>Sat, 14 Aug 2021 16:33:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-163320/</guid>
      <description>&amp;lt;p&amp;gt;Major earthquake in Haiti felt across Caribbean, U.S. issues tsunami warning &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/environment/magnitude-7-quake-strikes-western-haiti-usgs-2021-08-14/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-president-in-urgent-talks-as-taliban-take-key-town-near-kabul-idUSKBN2FF03M&amp;#34;&amp;gt;Afghan president in urgent talks as Taliban take key town near Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Afghanistan&amp;amp;#39;s President Ashraf Ghani held urgent talks with  local leaders and international partners on Saturday as Taliban rebels pushed closer to Kabul, capturing a town south of the capital that is one of the gateways to the city.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-investors-analys/analysis-taliban-gains-give-investors-cause-for-concern-beyond-afghanistan-idUSKBN2FF0BN&amp;#34;&amp;gt;Analysis-Taliban gains give investors cause for concern beyond Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-quake/major-quake-in-haiti-kills-several-people-reduces-buildings-to-rubble-idUSKBN2FF08X&amp;#34;&amp;gt;Major quake in Haiti kills several people, reduces buildings to rubble&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-081725/</link>
      <pubDate>Sat, 14 Aug 2021 08:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-081725/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-troops-arrive-in-afghan-capital-to-assist-evacuations-idUSKBN2FF03M&amp;#34;&amp;gt;U.S. troops arrive in Afghan capital to assist evacuations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
American troops have flown into Kabul to help evacuate embassy personnel and other civilians in the Afghan capital, a U.S. official said on Saturday, a day after Taliban insurgents seized the country&amp;amp;#39;s second- and third-biggest cities.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-china-analysis/analysis-as-taliban-advances-china-lays-groundwork-to-accept-an-awkward-reality-idUSKBN2FF03D&amp;#34;&amp;gt;Analysis-As Taliban advances, China lays groundwork to accept an awkward reality&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-lockdown-extended-statewide-fines-hiked-as-australia-faces-worst-covid-episode-idUSKBN2FE24K&amp;#34;&amp;gt;Sydney lockdown extended statewide, fines hiked as Australia faces &amp;amp;#39;worst&amp;amp;#39; COVID episode&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-041749/</link>
      <pubDate>Sat, 14 Aug 2021 04:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-041749/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-floods/one-dead-two-missing-as-torrential-rains-slam-japan-risk-alerts-broadened-idUSKBN2FF02I&amp;#34;&amp;gt;One dead, two missing as torrential rains slam Japan, risk alerts broadened&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-malaysia-politics/malaysias-opposition-key-ally-reject-pms-offer-for-bipartisan-support-idUSKBN2FF02R&amp;#34;&amp;gt;Malaysia&amp;amp;#39;s opposition, key ally reject PM&amp;amp;#39;s offer for bipartisan support&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210814-041619/</link>
      <pubDate>Sat, 14 Aug 2021 04:16:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210814-041619/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2020/04/03/does-zoom-use-end-to-end-encryption/&amp;#34;&amp;gt;Does Zoom use end-to-end encryption?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-001802/</link>
      <pubDate>Sat, 14 Aug 2021 00:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210814-001802/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-apple-privacy/after-criticism-apple-to-only-seek-abuse-images-flagged-in-multiple-nations-idUSKBN2FE21K&amp;#34;&amp;gt;After criticism, Apple to only seek abuse images flagged in multiple nations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
After a week of criticism over a its planned new system for detecting images of child sex abuse, Apple Inc said on Friday that it will hunt only for pictures that have been flagged by clearinghouses in multiple countries.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210814-001212/</link>
      <pubDate>Sat, 14 Aug 2021 00:12:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210814-001212/</guid>
      <description>Marc Andreessen &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/pmarca&amp;#34;&amp;gt;@pmarca&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Ben Horowitz @bhorowitz and I will be back with our Clubhouse @joinClubhouse show, &amp;amp;quot;One On One with A &amp;amp;amp; Z&amp;amp;quot;, Monday, August 16 at 7:00 PM PST. Brought to you by the Delta Variant. Please suggest great questions for us to answer by replying to this tweet!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210814-000713/</link>
      <pubDate>Sat, 14 Aug 2021 00:07:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210814-000713/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/new-anti-anti-money-laundering-services-for-crooks/&amp;#34;&amp;gt;New Anti Anti-Money Laundering Services for Crooks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A new dark web service is marketing to cybercriminals who are curious to see how their various cryptocurrency holdings and transactions may be linked to known criminal activity. Dubbed “ Antinalysis,” the service purports to offer a glimpse into how one’s payment activity might be flagged by law enforcement agencies and private companies that try to link suspicious cryptocurrency transactions to real people.&amp;lt;br&amp;gt;
Sample provided by Antinalysis.&amp;lt;br&amp;gt;
“Worried about dirty funds in your BTC address? Come check out Antinalysis, the new address risk analyzer,” reads the service’s announcement, pointing to a link only accessible via ToR. “This service is dedicated to individuals that have the need to possess complete privacy on the blockchain, offering a perspective from the opponent’s point of view in order for the user to comprehend the possibility of his/her funds getting flagged down under autocratic illegal charges.”&amp;lt;br&amp;gt;
The ad continues:&amp;lt;br&amp;gt;
Some people might ask, why go into all that? Just cash out in XMR and be done with it. The problem is, cashing out in Monero raises eyebrows on exchanges and mail by cash method is sometimes risky as well. If you use BTC-&amp;amp;gt;XMR-&amp;amp;gt;BTC method, you’ll still get flagged down by our services labelled as high risk exchange (not to mention LE and exchanges). Our service provides you with a view from LE/exchange’s perspective of things (with similar accuracy, but quite different approach) that provides you with basic knowledge of how “clean” your address is.”&amp;lt;br&amp;gt;
Tom Robinson , co-founder of blockchain intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eliptic.co&amp;#34;&amp;gt;Elliptic&amp;lt;/a&amp;gt; , said Antinalysis is designed to help crypto money launderers test whether their funds will be identified as proceeds of crime by regulated financial exchanges.&amp;lt;br&amp;gt;
“Cryptoassets have become an important tool for cybercriminals,” Robinson &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.elliptic.co/blog/cybercriminals-have-built-their-own-blockchain-analytics-tool&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; . “The likes of ransomware and darknet markets rely on payments being made in Bitcoin and other cryptocurrencies. However, laundering and cashing-out these proceeds is a major challenge.”&amp;lt;br&amp;gt;
Cryptocurrency exchanges make use of blockchain analytics tools, he said, to check customer deposits for links to illicit activity. By tracing a transaction back through the blockchain, these tools can identify whether the funds originated from a wallet associated with ransomware or any other criminal activity.&amp;lt;br&amp;gt;
“The launderer therefore risks being identified as a criminal and being reported to law enforcement whenever they send funds to a business using such a tool,” Robinson said. “Antinalysis seeks to help crypto launderers to avoid this, by giving them a preview of what a blockchain analytics tool will make of their bitcoin wallet and the funds it contains.”&amp;lt;br&amp;gt;
Each lookup at Antinalysis costs roughly USD $3, with a minimum $30 purchase. Other plans go as high as $6,000 for 5,000 requests.&amp;lt;br&amp;gt;
Robinson says the creator of Antinalysis is also one of the developers of Incognito Market , a darknet marketplace specializing in the sale of narcotics.&amp;lt;br&amp;gt;
“Incognito was launched in late 2020, and accepts payments in both Bitcoin and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Monero&amp;#34;&amp;gt;Monero&amp;lt;/a&amp;gt; , a cryptoasset offering heightened anonymity,” he wrote. “The launch of Antinalysis likely reflects the difficulties faced by the market and its vendors in cashing out their Bitcoin proceeds.”&amp;lt;br&amp;gt;
Elliptic wasn’t impressed with the quality of the intelligence provided by Antinalysis, saying it performs poorly on detecting links to major darknet markets and other criminal entities. But with countless criminals now making millions from ransomware, there is certainly a vast, untapped market for services that help those folks improve their operational security.&amp;lt;br&amp;gt;
“It is also significant because it makes blockchain analytics available to the public for the first time,” Robinson wrote. “To date, this type of analysis has been used primarily by regulated financial service providers.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/new-anti-anti-money-laundering-services-for-crooks/#more-56578&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-202120/</link>
      <pubDate>Fri, 13 Aug 2021 20:21:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-202120/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133232_bugatti-bolide-headed-to-production&amp;#34;&amp;gt;Bugatti Bolide headed to production&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133223_lamborghini-countach-reborn-as-803-hp-hybrid-supercar&amp;#34;&amp;gt;Lamborghini Countach reborn as 803-hp hybrid supercar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-201739/</link>
      <pubDate>Fri, 13 Aug 2021 20:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-201739/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-seize-more-afghan-cities-assault-on-capital-kabul-expected-idUSKBN2FE0B3&amp;#34;&amp;gt;Taliban seize more Afghan cities, assault on capital Kabul expected&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents have seized Afghanistan&amp;amp;#39;s second- and third-biggest cities, local officials said on Friday, as resistance from government forces crumbled and fears grew that an assault on the capital Kabul could be just days away.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-refugees/in-desperation-u-s-scours-for-countries-willing-to-house-afghan-refugees-idUSKBN2FE1Q5&amp;#34;&amp;gt;In desperation, U.S. scours for countries willing to house Afghan refugees&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-161721/</link>
      <pubDate>Fri, 13 Aug 2021 16:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-161721/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-tighten-grip-on-afghanistan-as-all-eyes-turn-to-capital-kabul-idUSKBN2FE0B3&amp;#34;&amp;gt;Taliban tighten grip on Afghanistan as all eyes turn to capital Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents tightened their grip on Afghanistan on Friday, seizing the second- and third-biggest cities and raising fears that an assault on the capital Kabul could be just days away.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-shooting-plymouth/in-rare-british-mass-shooting-gunman-kills-five-including-3-year-old-girl-idUSKBN2FE148&amp;#34;&amp;gt;In rare British mass shooting, gunman kills five, including 3-year-old girl&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/13/the-week-in-numbers-messi-coin-and-fruga?videoId=734120430&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: Messi-coin and frugal Google&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-122151/</link>
      <pubDate>Fri, 13 Aug 2021 12:21:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-122151/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133217_mini-takes-sustainability-to-the-extreme-with-cooper-se-based-strip-concept&amp;#34;&amp;gt;Mini takes sustainability to the extreme with Cooper SE-based Strip concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-121809/</link>
      <pubDate>Fri, 13 Aug 2021 12:18:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-121809/</guid>
      <description>&amp;lt;p&amp;gt;Pfizer and Moderna could reap billions from COVID-19 vaccine booster market &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/healthcare-pharmaceuticals/pfizer-moderna-seen-reaping-billions-covid-19-vaccine-booster-market-2021-08-13/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-captures-two-major-cities-tightening-grip-on-afghanistan-idUSKBN2FE0B3&amp;#34;&amp;gt;Taliban captures two major cities, tightening grip on Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-herat/afghan-commander-ismail-khan-captured-as-taliban-seize-herat-idUSKBN2FE13R&amp;#34;&amp;gt;Afghan commander Ismail Khan captured as Taliban seize Herat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-shooting-plymouth/english-shooter-killed-five-including-very-young-girl-idUSKBN2FE148&amp;#34;&amp;gt;English shooter killed five, including very young girl&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-082031/</link>
      <pubDate>Fri, 13 Aug 2021 08:20:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-082031/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133086_open-top-aston-martin-valkyrie-spider-is-closest-representation-to-f1-car-for-the-road&amp;#34;&amp;gt;Open-top Aston Martin Valkyrie Spider is ultimate representation of F1 car for the road&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-081654/</link>
      <pubDate>Fri, 13 Aug 2021 08:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-081654/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-capture-afghanistans-kandahar-herat-embassies-getting-staff-out-idUSKBN2FE0B3&amp;#34;&amp;gt;Taliban capture Afghanistan&amp;#39;s Kandahar, Herat; embassies getting staff out&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents tightened their grip on Afghanistan on Friday, wresting control of its second and third biggest cities while Western embassies prepared to send in troops to help evacuate staff from the capital, Kabul.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia-voluntee/pretty-devastating-sydney-councillor-delivers-food-in-lockdown-districts-idUSKBN2FE0J5&amp;#34;&amp;gt;&amp;amp;#39;Pretty devastating&amp;amp;#39;: Sydney councillor delivers food in lockdown districts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-emergency-incident/six-people-killed-in-mass-shooting-in-plymouth-england-idUSKBN2FD247&amp;#34;&amp;gt;Six people killed in mass shooting in Plymouth, England&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-042154/</link>
      <pubDate>Fri, 13 Aug 2021 04:21:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-042154/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133209_2022-bentley-flying-spur-mulliner-takes-its-place-as-the-brand-s-flagship&amp;#34;&amp;gt;2022 Bentley Flying Spur Mulliner takes its place as the brand&amp;#39;s flagship&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-041819/</link>
      <pubDate>Fri, 13 Aug 2021 04:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-041819/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-apple-privacy-exclusive/exclusive-apples-child-protection-features-spark-concern-within-its-own-ranks-sources-idUSKBN2FD28E&amp;#34;&amp;gt;Exclusive: Apple&amp;#39;s child protection features spark concern within its own ranks -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     A backlash over Apple&amp;amp;#39;s move to scan U.S. customer phones and computers https://www.reuters.com/world/middle-east/apple-not-pass-icloud-photo-uploads-law-enforcement-if-they-do-not-contain-child-2021-08-06 for child sex abuse images has grown to include employees speaking out internally, a notable turn in a company famed for its secretive culture, as well as provoking intensified protests from leading technology policy groups.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/embassies-get-staff-out-of-afghanistan-as-taliban-claim-two-big-cities-idUSKBN2FE0B3&amp;#34;&amp;gt;Embassies get staff out of Afghanistan as Taliban claim two big cities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Western embassies and aid agencies began evacuating civilian staff from Afghanistan on Friday after the Taliban claimed to have captured two of its biggest cities in an advance that has raised fears of the collapse of the U.S.-backed government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-readies-for-more-military-support-as-delta-sweeps-city-idUSKBN2FD2BQ&amp;#34;&amp;gt;Sydney readies for more military support as Delta sweeps city&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210813-041534/</link>
      <pubDate>Fri, 13 Aug 2021 04:15:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210813-041534/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#puzzles&amp;#34;&amp;gt;puzzles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#science&amp;#34;&amp;gt;science&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Via Hacker News: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://timroughgarden.org/notes.html&amp;#34;&amp;gt;lecture notes&amp;lt;/a&amp;gt; from several of Tim Roughgarden’s courses at Stanford, particularly CS269I “Incentives in Computer Science.”
They’re worth reading from start to finish. Here are two gems I thought were especially neat.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-002229/</link>
      <pubDate>Fri, 13 Aug 2021 00:22:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210813-002229/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133213_2022-acura-nsx-type-s-debuts-as-600-hp-171-495-swan-song&amp;#34;&amp;gt;2022 Acura NSX Type S debuts as 600 hp, $171,495 swan song&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-001829/</link>
      <pubDate>Fri, 13 Aug 2021 00:18:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210813-001829/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-apple-privacy-exclusive/apples-child-protection-features-spark-concern-within-its-own-ranks-sources-idUSKBN2FD28E&amp;#34;&amp;gt;Apple&amp;#39;s child protection features spark concern within its own ranks -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -A backlash over Apple&amp;amp;#39;s move to scan U.S. customer phones and computers https://www.reuters.com/world/middle-east/apple-not-pass-icloud-photo-uploads-law-enforcement-if-they-do-not-contain-child-2021-08-06 for child sex abuse images has grown to include employees speaking out internally, a notable turn in a company famed for its secretive culture, as well as provoking intensified protests from leading technology policy groups.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/apple-privacy/exclusive-apples-child-protection-features-spark-concern-within-its-own-ranks-sources-idUSL1N2PJ2PU&amp;#34;&amp;gt;EXCLUSIVE-Apple&amp;amp;#39;s child protection features spark concern within its own ranks -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO, Aug 12 A backlash over Apple&amp;amp;#39;s
move to scan U.S. customer phones and computers https://www.reuters.com/world/middle-east/apple-not-pass-icloud-photo-uploads-law-enforcement-if-they-do-not-contain-child-2021-08-06
for child sex abuse images has grown to include employees
speaking out internally, a notable turn in a company famed for
its secretive culture, as well as provoking intensified protests
from leading technology policy groups.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-advance-on-major-afghan-cities-as-u-s-uk-troops-to-aid-evacuations-idUSKBN2FD0GP&amp;#34;&amp;gt;Taliban advance on major Afghan cities as U.S., UK troops to aid evacuations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The United States and Britain said on Thursday they would send thousands of troops to Afghanistan to help evacuate civilians, as the Taliban stood poised for their two biggest military victories since they began a broad offensive in May.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-exclusive/u-s-mobilizes-3000-troops-to-kabul-for-embassy-staff-drawdown-idUSKBN2FD1UV&amp;#34;&amp;gt;U.S. mobilizes 3,000 troops to Kabul for embassy staff drawdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-readies-for-tighter-lockdown-rules-as-delta-gains-ground-idUSKBN2FD2BQ&amp;#34;&amp;gt;Sydney readies for tighter lockdown rules as Delta gains ground&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-202117/</link>
      <pubDate>Thu, 12 Aug 2021 20:21:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-202117/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133086_open-top-aston-martin-valkyrie-spider-is-closest-representation-to-f1-car-for-the-road&amp;#34;&amp;gt;Open-top Aston Martin Valkyrie Spider is closest representation to F1 car for the road&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133148_president-joe-biden-said-gm-ceo-promised-he-can-drive-the-first-electric-chevrolet-corvette&amp;#34;&amp;gt;President Joe Biden said GM CEO promised he can drive the first electric Chevrolet Corvette&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-201729/</link>
      <pubDate>Thu, 12 Aug 2021 20:17:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-201729/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/u-s-british-troops-to-aid-afghan-evacuation-as-taliban-poised-to-take-key-cities-idUSKBN2FD0GP&amp;#34;&amp;gt;U.S., British troops to aid Afghan evacuation as Taliban poised to take key cities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -The United States and Britain said on Thursday they would send thousands of troops to Afghanistan to protect and help evacuate civilians, as the Taliban stood poised for their two biggest military victories since they began a broad offensive in May.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-exclusive/u-s-to-reduce-kabul-embassy-to-core-staff-add-3000-troops-to-help-idUSKBN2FD1UV&amp;#34;&amp;gt;U.S. to reduce Kabul embassy to core staff, add 3,000 troops to help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-politics-election/canada-pm-trudeau-planning-snap-election-seeks-approval-for-covid-response-sources-idUSKBN2FD1I8&amp;#34;&amp;gt;Canada PM Trudeau planning snap election, seeks approval for COVID response - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210812-201612/</link>
      <pubDate>Thu, 12 Aug 2021 20:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210812-201612/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02208-z&amp;#34;&amp;gt;Why NASA’s Mars rover failed to collect its first rock core&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Intriguing rocks turned out to be too crumbly for Perseverance to drill successfully. It’s moving on to try elsewhere.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210812-200815/</link>
      <pubDate>Thu, 12 Aug 2021 20:08:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210812-200815/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/solera-health-customer-story/&amp;#34;&amp;gt;Why Solera Health chose Retool over React for internal tools Solera Health chose to build custom apps in Retool instead of using React. Learn how those CRUD apps reduced friction and sped up workflows for customer support agents.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-162133/</link>
      <pubDate>Thu, 12 Aug 2021 16:21:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-162133/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133208_2022-ford-gt-heritage-edition-honors-the-earliest-gt40s&amp;#34;&amp;gt;2022 Ford GT Heritage Edition honors the earliest GT40s&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131901_2022-polestar-2-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Polestar 2 adds base model with single motor, 265-mile range&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210812-161957/</link>
      <pubDate>Thu, 12 Aug 2021 16:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210812-161957/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210812-161957/</link>
      <pubDate>Thu, 12 Aug 2021 16:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210812-161957/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/12/technology/reddit-new-funding.html&amp;#34;&amp;gt;Reddit is valued at more than $10 billion in latest funding round. Just six months ago it was valued at $6 billion. It raised $410 million in its latest round. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-161754/</link>
      <pubDate>Thu, 12 Aug 2021 16:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-161754/</guid>
      <description>&amp;lt;p&amp;gt;LIVE NOW: Qatar&amp;#39;s Olympic gold medalist Mutaz Barshim speaks with Reuters on Instagram about Tokyo Games &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.instagram.com/reuters/live/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-take-strategic-afghan-city-of-ghazni-on-road-to-kabul-idUSKBN2FD0GP&amp;#34;&amp;gt;Taliban take strategic Afghan city of Ghazni on road to Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban fighters captured the strategic Afghan city of Ghazni on Thursday, taking them to within 150 km (95 miles) of Kabul following days of fierce clashes as the Islamist group ruled out sharing power with the government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-citizens/u-s-embassy-in-kabul-urges-u-s-citizens-to-leave-afghanistan-immediately-idUSKBN2FD1MD&amp;#34;&amp;gt;U.S. Embassy in Kabul urges U.S. citizens to leave Afghanistan immediately&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-politics-election/canada-pm-trudeau-planning-snap-election-seeks-approval-for-covid-response-idUSKBN2FD1I8&amp;#34;&amp;gt;Canada PM Trudeau planning snap election, seeks approval for COVID response&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-122024/</link>
      <pubDate>Thu, 12 Aug 2021 12:20:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-122024/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131423_2023-honda-cr-v-spy-shots&amp;#34;&amp;gt;2023 Honda CR-V spy shots: Redesign coming for popular crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123274_production-ready-pininfarina-battista-debuts-at-2021-monterey-car-week&amp;#34;&amp;gt;Production-ready Pininfarina Battista debuts at 2021 Monterey Car Week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210812-121859/</link>
      <pubDate>Thu, 12 Aug 2021 12:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210812-121859/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/12/technology/reddit-new-funding.html&amp;#34;&amp;gt;Reddit raises $410 million in new funding. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Aug. 12, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-121704/</link>
      <pubDate>Thu, 12 Aug 2021 12:17:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-121704/</guid>
      <description>&amp;lt;p&amp;gt;Out of Control: How the pandemic laid bare America’s diabetes crisis &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/usa-diabetes-covid/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-take-strategic-ghazni-city-on-road-to-kabul-idUSKBN2FD0GP&amp;#34;&amp;gt;Taliban take strategic Ghazni city on road to Kabul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban fighters in Afghanistan captured the strategic city of Ghazni on Thursday, the ninth provincial capital they have seized in a week and another gain after U.S. intelligence said the insurgents could take the capital Kabul within 90 days.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/12/how-covid-19-laid-bare-americas-diabetes?videoId=734073083&amp;amp;videoChannel=118169&amp;#34;&amp;gt;How COVID-19 laid bare America&amp;amp;#39;s diabetes crisis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-081955/</link>
      <pubDate>Thu, 12 Aug 2021 08:19:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-081955/</guid>
      <description>&amp;lt;p&amp;gt;Lionel Messi&amp;#39;s financial package in Paris St Germain transfer includes payment in cryptocurrency fan tokens &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports/exclusive-messis-paris-st-germain-package-includes-crypto-fan-tokens-2021-08-12/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-take-ghazni-city-on-road-to-afghan-capital-idUSKBN2FD0GP&amp;#34;&amp;gt;Taliban take Ghazni city on road to Afghan capital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents captured the city of Ghazni on Thursday, the ninth provincial capital they have seized in a week, as U.S. intelligence said the capital, Kabul, just 150 km to the northeast, could fall to the insurgents within 90 days.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-law/china-signals-crackdown-on-privacy-data-anti-trust-to-go-on-idUSKBN2FD09J&amp;#34;&amp;gt;China signals crackdown on privacy, data, anti-trust to go on&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-ship/ship-sailing-under-panama-flag-runs-aground-in-northern-japan-splits-in-two-idUSKBN2FD04K&amp;#34;&amp;gt;Ship sailing under Panama flag runs aground in northern Japan, splits in two&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-042101/</link>
      <pubDate>Thu, 12 Aug 2021 04:21:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-042101/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-newzealand/fortress-new-zealand-eyes-opening-to-vaccinated-travellers-early-2022-idUSKBN2FC2GJ&amp;#34;&amp;gt;Fortress New Zealand eyes opening to vaccinated travellers early 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-climate-wildfires-mediterranean/at-least-65-killed-in-algerian-wildfires-greece-and-italy-burn-idUSKBN2FC23V&amp;#34;&amp;gt;At least 65 killed in Algerian wildfires, Greece and Italy burn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210812-042034/</link>
      <pubDate>Thu, 12 Aug 2021 04:20:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210812-042034/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/home-delivery?campaignId=79FKF&amp;#34;&amp;gt;Get Home Delivery 50% off&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/cecilia-kang&amp;#34;&amp;gt;Log In&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/subscription/home-delivery?campaignId=79FKF&amp;#34;&amp;gt;Get Home Delivery 50% off&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/08/10/world/covid-delta-variant-vaccine/bidens-ire-at-facebook-over-vaccine-falsehoods-was-fueled-by-a-series-of-meetings&amp;#34;&amp;gt;Biden’s ire at Facebook over vaccine falsehoods was fueled by a series of meetings. This was featured in live coverage. By Zolan Kanno-Youngs and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Aug. 10, 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/10/technology/facebook-vaccine-misinformation.html&amp;#34;&amp;gt;Inside the White House-Facebook Rift Over Vaccine Misinformation Frustrations grew behind the scenes among top leaders on both sides, potentially hurting the government’s efforts to overcome the pandemic. By Zolan Kanno-Youngs and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210812-040747/</link>
      <pubDate>Thu, 12 Aug 2021 04:07:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210812-040747/</guid>
      <description>Microsoft today released software updates to plug at least 44 security vulnerabilities in its Windows operating systems and related products. The software giant warned that attackers already are pouncing on one of the flaws, which ironically enough involves an easy-to-exploit bug in the software component responsible for patching Windows 10 PCs and Windows Server 2019 machines.&amp;lt;br&amp;gt;
Microsoft said attackers have seized upon &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36948&amp;#34;&amp;gt;CVE-2021-36948&amp;lt;/a&amp;gt; , which is a weakness in the Windows Update Medic service. Update Medic is a new service that lets users repair Windows Update components from a damaged state so that the device can continue to receive updates.&amp;lt;br&amp;gt;
Redmond says while CVE-2021-36948 is being actively exploited, it is not aware of exploit code publicly available. The flaw is an “elevation of privilege” vulnerability that affects Windows 10 and Windows Server 2019 , meaning it can be leveraged in combination with another vulnerability to let attackers run code of their choice as administrator on a vulnerable system.&amp;lt;br&amp;gt;
“CVE-2021-36948 is a privilege escalation vulnerability – the cornerstone of modern intrusions as they allow attackers the level of access to do things like hide their tracks and create user accounts,” said Kevin Breen of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.immersivelabs.com&amp;#34;&amp;gt;Immersive Labs&amp;lt;/a&amp;gt; . “In the case of ransomware attacks, they have also been used to ensure maximum damage.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/microsoft-patch-tuesday-august-2021-edition/#more-56563&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-002558/</link>
      <pubDate>Thu, 12 Aug 2021 00:25:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210812-002558/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133170_lamborghini-s-bringing-back-the-countach&amp;#34;&amp;gt;Lamborghini&amp;#39;s bringing back the Countach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133198_tom-cruise-s-old-1986-porsche-911-targa-is-for-sale&amp;#34;&amp;gt;Tom Cruise&amp;amp;#39;s old 1986 Porsche 911 Targa is for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125565_2023-mercedes-benz-amg-c63-wagon-spy-shots-and-video&amp;#34;&amp;gt;2023 Mercedes-Benz AMG C63 Wagon spy shots and video: More power, fewer cylinders&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133193_1-400-hp-hongqi-s9-hypercar-to-debut-in-production-form-at-2021-milan-design-week&amp;#34;&amp;gt;1,400-hp Hongqi S9 hypercar to debut in production form at 2021 Milan Design Week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124450_2022-mercedes-benz-g-class-4x4-squared-spy-shots-video&amp;#34;&amp;gt;2022 Mercedes-Benz G-Class 4x4 Squared spy shots and video: Luxury monster truck set for return&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133096_toyota-trademarks-hybrid-max-name-perhaps-for-a-tundra-hybrid&amp;#34;&amp;gt;Toyota trademarks Hybrid Max name, perhaps for a Tundra hybrid?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132650_toyota-reveals-more-of-its-redesigned-2022-tundra&amp;#34;&amp;gt;Toyota reveals more of its redesigned 2022 Tundra, including rear coil springs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210812-002415/</link>
      <pubDate>Thu, 12 Aug 2021 00:24:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210812-002415/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/&amp;#34;&amp;gt;Competitive programming in Haskell: monoidal accumulation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/&amp;#34;&amp;gt;my last competitive programming post&amp;lt;/a&amp;gt; , I challenged you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/pleasegofirst&amp;#34;&amp;gt;Please, Go First&amp;lt;/a&amp;gt; . In that problem, we are presented with a hypothetical scenario with people waiting in a queue for a ski lift. Each person is part of a friend group (possibly just themselves), but friend groups are not necessarily consecutive in line; when someone gets to the top they will wait for the last person in their friend group to arrive before skiing. We are asked to consider how much waiting time could be saved if people start letting others go ahead of them in line as long as it doesn’t cost them any waiting time and decreases the waiting time for the others.&amp;lt;br&amp;gt;
There is actually a bit of ambiguity that we need to resolve first; to be honest, it’s not the most well-written problem statement. Consider this scenario, with three people in group and two in group :&amp;lt;br&amp;gt;
Consider the person labelled . Should they let pass? Letting pass would not change ’s waiting time: they have to wait for anyway and it does not matter whether they do the waiting at the top or bottom of the mountain. But it would not immediately change ’s waiting time, either: they still have to wait for . What the problem literally says is “someone lets another pass if doing this doesn’t change his own total waiting time, but saves time for the other person”, so taking this literally would seem to imply that in this scenario does not let pass. However, the given example inputs and outputs imply that in this scenario should let pass; indeed, right after doing so, can then let pass as well, which saves time for both and . So in the end, it seems we really want to say something like “ should let pass if it doesn’t increase ’s waiting time and will eventually save time for ”.&amp;lt;br&amp;gt;
The solution idea&amp;lt;br&amp;gt;
It took me an embarrassingly long time to come up with the following key insight: after doing this process as much as possible, I claim that (1) all the friends within each friend group will be consecutive, and (2) the groups will be sorted by the original position of the last person in each group. To see why claim (2) is true, note that whenever someone is last in their friend group, moving backward in the line always increases their waiting time; so any two people who are both last in their friend group will never pass each other, since it would make the waiting time worse for the one who moves backward. That means the people who are last in their friend group will always remain in the same relative order. As for claim (1), I thought about it for a while and am so far unable to come up with a short, convincing proof, though I still believe it is true (and my solution based on it was accepted). If anyone has a good way to show why this must be true, I’d love to hear about it in the comments.&amp;lt;br&amp;gt;
My second key insight is that the total amount of time saved for a given friend group depends only on (1) how many people are in the group and (2) how many places the last person in the group got to move up (although there are other ways to solve the problem; more below). In particular, the total time saved for the group will be the product of these two numbers, times five minutes. It’s irrelevant how many places someone moves if they are not last in their group, because they have to wait until that last person arrives, and it makes no difference if they do their waiting at the top or bottom of the mountain.&amp;lt;br&amp;gt;
So here’s my solution, based on the above insights. First, let’s set up the main pipeline to read the input, solve each test case, and produce the output.&amp;lt;br&amp;gt;
main = C.interact $ runScanner ( numberOf ( int *&amp;amp;gt; str ) ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map ( solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; showB ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.unlines&amp;lt;br&amp;gt;
showB&amp;lt;br&amp;gt;
is just a utility function I’ve recently added to my solution template which calls&amp;lt;br&amp;gt;
show&amp;lt;br&amp;gt;
and then converts the result to a&amp;lt;br&amp;gt;
ByteString&amp;lt;br&amp;gt;
using&amp;lt;br&amp;gt;
pack&amp;lt;br&amp;gt;
For a given test case, we need to first do a pass through the lift queue in order to accumulate some information about friend groups: for each group, we need to know how big it is, as well as the index of the last member of the group. In an imperative language, we would make accumulator variables to hold this information (probably two maps, aka dictionaries), and then iterate through the queue, imperatively updating the accumulator variables for each item. We can translate that approach more or less mechanically into Haskell, by having an update function that takes a single item and a tuple of accumulators as input, and returns a new tuple of accumulators as output. This is the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://gist.github.com/aaronallen8455/5f73e76428bf8ed8566457d032ccf90f&amp;#34;&amp;gt;approach taken by Aaron Allen&amp;lt;/a&amp;gt; , and sometimes that’s the best way to do something like this. However, in this particular scenario—looping over a list and accumulating some information—the accumulators are often monoidal, which gives us much nicer tools to work with, such as&amp;lt;br&amp;gt;
Data.Map.fromListWith (&amp;amp;lt;&amp;amp;gt;)&amp;lt;br&amp;gt;
We’ll make a type&amp;lt;br&amp;gt;
Group&amp;lt;br&amp;gt;
to represent the needed information about a friend group: the number of people and the index of the last person. We can use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ghc.gitlab.haskell.org/ghc/doc/users_guide/exts/deriving_via.html&amp;#34;&amp;gt;DerivingVia&amp;lt;/a&amp;gt; to create an appropriate&amp;lt;br&amp;gt;
Semigroup&amp;lt;br&amp;gt;
instance for it (in this case we actually don’t need&amp;lt;br&amp;gt;
since there is no such thing as an empty group). Note that we use&amp;lt;br&amp;gt;
First Int&amp;lt;br&amp;gt;
instead of the expected&amp;lt;br&amp;gt;
Last Int&amp;lt;br&amp;gt;
; this is explained below.&amp;lt;br&amp;gt;
newtype Group = Group { unGroup :: ( Int , Int ) } deriving Semigroup via ( Sum Int , First Int ) deriving Show&amp;lt;br&amp;gt;
Now we can write the code to calculate the total time save for a given starting queue.&amp;lt;br&amp;gt;
solve :: ByteString -&amp;amp;gt; Int solve ( C.unpack -&amp;amp;gt; queue ) = timeSaved where&amp;lt;br&amp;gt;
We first map over the queue and turn each item into a singleton&amp;lt;br&amp;gt;
imap&amp;lt;br&amp;gt;
is a utility to do an indexed map, with type&amp;lt;br&amp;gt;
(Int -&amp;amp;gt; a -&amp;amp;gt; b) -&amp;amp;gt; [a] -&amp;amp;gt; [b]&amp;lt;br&amp;gt;
); then we use&amp;lt;br&amp;gt;
M.fromListWith (&amp;amp;lt;&amp;amp;gt;)&amp;lt;br&amp;gt;
to build a&amp;lt;br&amp;gt;
Map&amp;lt;br&amp;gt;
associating each distinct character to a&amp;lt;br&amp;gt;
. The&amp;lt;br&amp;gt;
instance will take care of summing the number of friends and keeping only the last index in each group. Note that&amp;lt;br&amp;gt;
fromListWith&amp;lt;br&amp;gt;
is implemented via a left fold, which explains why we needed to use&amp;lt;br&amp;gt;
: the list items will actually be combined in reverse order. (Alternatively, we could use&amp;lt;br&amp;gt;
M.fromListWith (flip (&amp;amp;lt;&amp;amp;gt;))&amp;lt;br&amp;gt;
; of course, this is only something we need to worry about when using a non-commutative&amp;lt;br&amp;gt;
).&amp;lt;br&amp;gt;
groupInfo :: Map Char Group groupInfo = queue &amp;amp;gt;$&amp;amp;gt; imap ( \ i c -&amp;amp;gt; ( c , Group ( 1 , i ) ) ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; M.fromListWith ( &amp;amp;lt;&amp;amp;gt; )&amp;lt;br&amp;gt;
Now we can sort the queue by index of the last member of each friend group, producing its final form:&amp;lt;br&amp;gt;
sortedQueue = sortOn ( ( groupInfo ! ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; unGroup &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; snd ) queue&amp;lt;br&amp;gt;
Computing the total time saved is now just a matter of figuring out how much each last friend moved and summing the time save for each friend group:&amp;lt;br&amp;gt;
timeSaved = sortedQueue &amp;amp;gt;$&amp;amp;gt; zip [ 0 :: Int .. ] -- final positions &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; groupBy ( ( == ) `on` snd ) -- put groups together &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map ( last &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; timeSaveForGroup ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; sum -- get the time save based on the last person in each group timeSaveForGroup ( i , c ) = 5 * size * ( idx - i ) where Group ( size , idx ) = groupInfo ! c&amp;lt;br&amp;gt;
This is not the fastest way to solve the problem—in fact, my solution is slowest of the five Haskell solutions so far!—but I wanted to illustrate this technique of accumulating over an array using a&amp;lt;br&amp;gt;
M.fromListWith&amp;lt;br&amp;gt;
can be used similarly when we need just a single result value rather than a&amp;lt;br&amp;gt;
of some sort.&amp;lt;br&amp;gt;
Other solutions&amp;lt;br&amp;gt;
Several people linked to their own solutions. I already mentioned Aaron Allen’s solution above. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/anurudhp/CPHaskell/blob/master/contests/kattis/pleasegofirst.hs&amp;#34;&amp;gt;Anurudh Peduri’s solution&amp;lt;/a&amp;gt; works by computing the initial and final wait time for each group and subtracting; notably, it simply sorts the groups alphabetically, not by index of the final member of the group. I don’t quite understand it, but I think this works because the initial and final wait times would change by the same amount when permuting the groups in line, so ultimately this cancels out.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/TimPut/KattisProblems/blob/master/pleasegofirst.hs&amp;#34;&amp;gt;Tim Put’s solution&amp;lt;/a&amp;gt; is by far the fastest (and, in my opinion, the cleverest). For each friend in a friend group, it computes the number of people in other friend groups who stand between them and the last person in their group (using a clever combination of functions including&amp;lt;br&amp;gt;
ByteString.elemIndices&amp;lt;br&amp;gt;
). Each such person represents a potential time save of 5 minutes, all of which will be realized once the groups are all consecutive. Hence all we have to do is sum these numbers and multiply by 5. It is instructive thinking about why this works. It does not compute the actual time saved by each group, just the potential time save represented by each group. That potential time save might be realized by the group itself (if the last person in the group gets to move up) or by a different group (if someone in the group lets others go ahead of them). Ultimately, though, it does not matter how much time is saved by each group, only the total amount of time saved.&amp;lt;br&amp;gt;
Next time: Purple Rain&amp;lt;br&amp;gt;
For next time, I invite you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/purplerain&amp;#34;&amp;gt;Purple Rain&amp;lt;/a&amp;gt; . This problem has a solution which is “well known” in competitive programming (if you need a hint, ybbx hc Xnqnar’f Nytbevguz); the challenge is to translate it into idiomatic (and, ideally, reusable) Haskell.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/08/11/competitive-programming-in-haskell-monoidal-accumulation/&amp;#34;&amp;gt;Competitive programming in Haskell: monoidal accumulation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210812-002259/</link>
      <pubDate>Thu, 12 Aug 2021 00:22:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210812-002259/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/hopping-on-firefox-91/&amp;#34;&amp;gt;Hopping on Firefox 91 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/hopping-on-firefox-91/&amp;#34;&amp;gt;Hopping on Firefox 91&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
August is already here, which means so is Firefox 91! For developers, Firefox 91 supports the Visual Viewport API and Intl.DateTimeFormat object additions.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210812-002258/</link>
      <pubDate>Thu, 12 Aug 2021 00:22:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210812-002258/</guid>
      <description>August 11, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/11/Debugging-your-new-PL.html&amp;#34;&amp;gt;Tips for debugging your new programming language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
August 10, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/10/Apple-CSAM-scanning.html&amp;#34;&amp;gt;Police to begin regular, warrant-free searches of homes for child abuse material&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-002132/</link>
      <pubDate>Thu, 12 Aug 2021 00:21:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210812-002132/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-could-take-afghan-capital-within-90-days-after-rapid-gains-u-s-intelligence-idUSKBN2FC0I8&amp;#34;&amp;gt;Taliban could take Afghan capital within 90 days after rapid gains -U.S. intelligence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON/KABUL (Reuters) -Taliban fighters could isolate Afghanistan&amp;amp;#39;s capital in 30 days and possibly take it over within 90, a U.S. defence official cited U.S. intelligence as saying, as the resurgent militants made more advances across the country.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban/taliban-denies-killing-civilians-calls-for-independent-inquiry-idUSKBN2FC2B7&amp;#34;&amp;gt;Taliban denies killing civilians, calls for independent inquiry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-poland-media/polish-lower-house-passes-media-reform-bill-which-u-s-denounces-idUSKBN2FC0LS&amp;#34;&amp;gt;Polish lower house passes media reform bill, which U.S. denounces&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210812-001822/</link>
      <pubDate>Thu, 12 Aug 2021 00:18:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210812-001822/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/allstar-continuous-security-policy.html&amp;#34;&amp;gt;AllStar: Continuous Security Policy Enforcement for GitHub Projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Mike Maraya, Google Open Source Security Team&amp;lt;br&amp;gt;
As an active member of the open source software (OSS) community, Google recognizes the growing threat of software supply chain &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sonatype.com/hubfs/Corporate/Software%20Supply%20Chain/2020/SON_SSSC-Report-2020_final_aug11.pdf#page=7&amp;#34;&amp;gt;attacks&amp;lt;/a&amp;gt; against OSS we use and develop. Building on our efforts to improve OSS security with an end-to-end framework ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html&amp;#34;&amp;gt;SLSA&amp;lt;/a&amp;gt; ), metrics ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/measuring-security-risks-in-open-source.html&amp;#34;&amp;gt;Scorecards&amp;lt;/a&amp;gt; ), and coordinated vulnerability disclosure ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-vulnerability-guide&amp;#34;&amp;gt;guide&amp;lt;/a&amp;gt; ), we are excited to announce &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/allstar&amp;#34;&amp;gt;Allstar&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Allstar is a GitHub app that continuously enforces security policy settings through selectable automated enforcement actions. Allstar is already filing and closing security &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/search?q=%22Issue&#43;created&#43;by&#43;Allstar.&#43;https%3A%2F%2Fgithub.com%2Fossf%2Fallstar%22&amp;amp;type=issues&amp;#34;&amp;gt;issues&amp;lt;/a&amp;gt; for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.envoyproxy.io/&amp;#34;&amp;gt;Envoy&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/GoogleContainerTools&amp;#34;&amp;gt;GoogleContainerTools&amp;lt;/a&amp;gt; , with more organizations and repositories lined up.&amp;lt;br&amp;gt;
See the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://openssf.org/blog/2021/08/11/introducing-the-allstar-github-app/&amp;#34;&amp;gt;OpenSSF announcement&amp;lt;/a&amp;gt; for more information on Allstar.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Signal &gt;&gt; Blog</title>
      <link>https://www.whatsupup.com/blog/alamode/heartsore/20210812-001348/</link>
      <pubDate>Thu, 12 Aug 2021 00:13:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/alamode/heartsore/20210812-001348/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://signal.org/blog/disappearing-by-default/&amp;#34;&amp;gt;Embrace ephemerality with default disappearing messages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/jimio&amp;#34;&amp;gt;jimio&amp;lt;/a&amp;gt; on 10 Aug 2021&amp;lt;br&amp;gt;
As the norms for how people connect have changed, much of the communication that once took place through the medium of coffee shops, bars, and parks now takes place through the medium of digital devices. One side effect of this shift from analog to digital is the conjoined shift from the ephemeral to the eternal: words once transiently spoken are now – more often than not – data stored forever.&amp;lt;br&amp;gt;
We’ve designed Signal so that your data always stays in your hands. We think there’s something special about sharing a private fleeting moment between friends, so Signal also supports disappearing messages. Now, we’ve added the ability to preconfigure all conversations you initiate with a default disappearing messages timer.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210812-001031/</link>
      <pubDate>Thu, 12 Aug 2021 00:10:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210812-001031/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/behind-the-curtain-how-three-communities-found-success-in-stage-events-fbfae0c7f856?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;How Three Discord Communities Found Success in Stage Events&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/behind-the-curtain-how-three-communities-found-success-in-stage-events-fbfae0c7f856?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;How Three Discord Communities Found Success in Stage Events Three great communities are here to share their experiences, plus some tips for hosting your own successful Stage events.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20210812-000947/</link>
      <pubDate>Thu, 12 Aug 2021 00:09:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20210812-000947/</guid>
      <description>&amp;lt;p&amp;gt;I&amp;#39;m an Associate Professor in Computer Science at Brown University. My research is in Human-Computer Interaction, where I am &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hci.brown.edu&amp;#34;&amp;gt;building personalized systems based on user behavior data&amp;lt;/a&amp;gt; . These systems are applied to attention, mobile, and health. I am primarily funded by the NSF, NIH, and ARO, and have received the NSF CAREER award, Facebook Fellowship, and ARO Young Investigator Award.&amp;lt;br&amp;gt;
My Ph.D. is in Information Science from the University of Washington in Seattle, and my masters and undergraduate degrees are in Computer Science from the University of Illinois at Urbana-Champaign (UIUC). Before joining Brown, I analyzed search behavior at Microsoft Research, Google, Yahoo, and Bing; and co-founded World Blender, a Techstars-backed company that makes geolocation mobile games.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hci.brown.edu/&amp;#34;&amp;gt;The HCI Group&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.google.com/document/d/1M3MXfClgl03K_Dfn1ZI4REgh96I4HIge8Apc2a6cmvk/edit?usp=sharing&amp;#34;&amp;gt;Research Prep&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Zainab Iftikhar&amp;lt;br&amp;gt;
Ji Won Chung&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210810-082856/</link>
      <pubDate>Tue, 10 Aug 2021 08:28:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210810-082856/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1112267_2022-hyundai-santa-cruz-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Hyundai Santa Cruz cures the common crossover blues&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133166_little-car-company-returns-with-3-4-scale-ferrari-250-testa-rossa&amp;#34;&amp;gt;Little Car Company returns with 3/4-scale Ferrari 250 Testa Rossa&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1028665_2021-mercedes-benz-s-class-guard-keeps-you-comfy-and-protected&amp;#34;&amp;gt;2021 Mercedes-Benz S-Class Guard keeps you comfy...and protected&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133161_czech-brand-praga-signs-first-us-dealership&amp;#34;&amp;gt;Czech brand Praga signs first US dealership&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133160_audi-signs-off-on-rs-q-e-tron-hot-weather-testing&amp;#34;&amp;gt;Audi signs off on RS Q E-Tron hot-weather testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133158_2022-acura-nsx-type-s-2022-cadillac-ct4-v-blackwing-brabham-bt63-gt2-this-week-s-top-photos&amp;#34;&amp;gt;2022 Acura NSX Type S, 2022 Cadillac CT4-V Blackwing, Brabham BT63 GT2: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210810-082503/</link>
      <pubDate>Tue, 10 Aug 2021 08:25:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210810-082503/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/legal-us-apple-privacy-scanning/apple-says-photos-in-icloud-will-be-checked-by-child-abuse-detection-system-idUSKBN2FA1ZZ&amp;#34;&amp;gt;Apple says photos in iCloud will be checked by child abuse detection system&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Apple Inc on Monday said that iPhone users&amp;amp;#39; entire photo libraries will be checked for known child abuse images if they are stored in the online iCloud service.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-canada-schellenberg/china-court-upholds-canadians-death-sentence-as-huawei-executive-fights-extradition-idUSKBN2FB05H&amp;#34;&amp;gt;China court upholds Canadian&amp;amp;#39;s death sentence as Huawei executive fights extradition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A Chinese court upheld on Tuesday a Canadian man&amp;amp;#39;s death sentence for drug smuggling a day before another court is due to rule on the case of another Canadian accused of spying.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-southkorea-usa/north-korea-says-south-u-s-should-pay-a-price-for-military-drills-idUSKBN2FA25E&amp;#34;&amp;gt;North Korea says South, U.S. should &amp;amp;#39;pay a price&amp;amp;#39; for military drills&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-tighten-control-of-afghan-north-as-residents-weigh-options-idUSKBN2FB0K7&amp;#34;&amp;gt;Taliban tighten control of Afghan north as residents weigh options&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210810-082205/</link>
      <pubDate>Tue, 10 Aug 2021 08:22:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210810-082205/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/simplifying-titan-security-key-options.html&amp;#34;&amp;gt;Simplifying Titan Security Key options for our users&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Christiaan Brand, Product Manager, Google Cloud&amp;lt;br&amp;gt;
Today we are excited to announce some changes to our lineup of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://store.google.com/us/product/titan_security_key&amp;#34;&amp;gt;Titan Security Keys on the Google Store&amp;lt;/a&amp;gt; which provide a simpler experience and make choosing the right security key for you even easier. We will now offer only two types of Titan Security Keys: a USB-A and a USB-C version. Both of these keys have Near Field Communication (NFC) functionality, which allows you to use it with most mobile devices by simply tapping it on the back of your mobile device in order to sign in securely. These keys will be available for all users starting tomorrow, August 10. In 2018, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/blog/products/identity-security/titan-security-keys-now-available-on-the-google-store&amp;#34;&amp;gt;Google introduced the Titan Security Key&amp;lt;/a&amp;gt; as a direct defense against credential phishing. Phishing occurs when an attacker tries to trick you into giving them your username and password, and it remains one of the easiest and most successful ways of breaching accounts online. Paired with our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://landing.google.com/advancedprotection/&amp;#34;&amp;gt;Advanced Protection Program&amp;lt;/a&amp;gt; and its industry-leading automatic protections, the Titan Security Key remains one of the best ways to keep your Google Account safe.&amp;lt;br&amp;gt;
Introducing new Titan Security Key options&amp;lt;br&amp;gt;
Since NFC functionality is now supported by a wide range of Android phones and iPhones, we are discontinuing the Bluetooth Titan Security Key and focusing on the easier and more widely available NFC capability. However, for existing users with our Bluetooth Titan Security Keys, these will continue to work with Bluetooth and will continue to work as an NFC key on most modern mobile devices. Applicable warranties for existing Bluetooth Titan Security Keys will continue to be honored per their terms.  All Titan Security Keys are built with a hardware secure element chip that includes firmware engineered by Google to verify the key’s integrity. If you have a computer with USB-A ports, we recommend you get the USB-A &#43; NFC security key:&amp;lt;br&amp;gt;
If you have a computer with USB-C ports, we recommend you get the USB-C &#43; NFC security key:&amp;lt;br&amp;gt;
If you have an iPad with a USB-C connector you can use the USB-C Titan Security Key. If you have an iPad with a lightning connector, it’s recommended to get a USB-A Titan Security Key with an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.apple.com/shop/product/MD821AM/A/lightning-to-usb-camera-adapter&amp;#34;&amp;gt;Apple Lightning adapter&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
To purchase a Titan Security Key, visit the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://store.google.com/us/product/titan_security_key&amp;#34;&amp;gt;Google Store&amp;lt;/a&amp;gt; . The USB-A&#43;NFC key,which includes a USB-A to USB-C adapter, is available for $30 and the USB-C&#43;NFC key retails for $35.&amp;lt;br&amp;gt;
To learn more about how security keys can help protect you against phishing, visit the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/titan-security-key&amp;#34;&amp;gt;Titan Security Key product page&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Internal Register | Software and hardware projects for fun from a guy who loves retro computing</title>
      <link>https://www.whatsupup.com/blog/giuseppe/fibroma/20210810-082136/</link>
      <pubDate>Tue, 10 Aug 2021 08:21:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/giuseppe/fibroma/20210810-082136/</guid>
      <description>2021-08-08 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2021/08/08/Another-Homebrew-Console.html&amp;#34;&amp;gt;Another ‘Homebrew’ Video Game Console&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210810-082020/</link>
      <pubDate>Tue, 10 Aug 2021 08:20:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210810-082020/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/05/Western-Electric&amp;#34;&amp;gt;Western Electric&amp;lt;/a&amp;gt; · At 6:30 PM on Wednesday August 4 th my 15-year-old daughter and I pulled up the Jaguar I-Pace electric car     in front of my 91-year-old Mom’s place in Regina, Saskatchewan. I was tired and achey because I’d just finished driving 1,725km     (1,072 miles) across two days to see her for the first time since Covid started.  I was happy to see Mom, happy about the first road-trip in a     long time, and happy to have tested the hypothesis that, in 2021, a fully-electric vehicle can handle long-haul travel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/05/Western-Electric&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [11 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Security Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/sovietizing/ohioan/20210810-081149/</link>
      <pubDate>Tue, 10 Aug 2021 08:11:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sovietizing/ohioan/20210810-081149/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/08/04/advancing-advertising-transparency-in-the-us-congress/&amp;#34;&amp;gt;Advancing advertising transparency in the US Congress&amp;lt;/a&amp;gt; August 4, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>privacy Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/evildoer/onionskin/20210810-081129/</link>
      <pubDate>Tue, 10 Aug 2021 08:11:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/evildoer/onionskin/20210810-081129/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/08/04/advancing-advertising-transparency-in-the-us-congress/&amp;#34;&amp;gt;Advancing advertising transparency in the US Congress&amp;lt;/a&amp;gt; August 4, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210810-081102/</link>
      <pubDate>Tue, 10 Aug 2021 08:11:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210810-081102/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/nitro-users-now-get-an-enhanced-video-experience-with-three-months-of-youtube-premium-9d86db0a4a7c?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Nitro Users Now Get an Enhanced Video Experience with Three Months of YouTube Premium&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/nitro-users-now-get-an-enhanced-video-experience-with-three-months-of-youtube-premium-9d86db0a4a7c?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Nitro Users Now Get an Enhanced Video Experience with Three Months of YouTube Premium We’ve put together a deal with another amazing streaming service: YouTube Premium.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20210810-081007/</link>
      <pubDate>Tue, 10 Aug 2021 08:10:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20210810-081007/</guid>
      <description>Links&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210810-080841/</link>
      <pubDate>Tue, 10 Aug 2021 08:08:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210810-080841/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/phishing-sites-targeting-scammers-and-thieves/&amp;#34;&amp;gt;Phishing Sites Targeting Scammers and Thieves&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
I was preparing to knock off work for the week on a recent Friday evening when a curious and annoying email came in via &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/about/&amp;#34;&amp;gt;the contact form&amp;lt;/a&amp;gt; on this site:&amp;lt;br&amp;gt;
“Hello I go by the username Nuclear27 on your site Briansclub[.]com ,” wrote “ Mitch ,” confusing me with the proprietor of perhaps the underground’s largest bazaar for stolen credit and identity data. “I made a deposit to my wallet on the site but nothing has shown up yet and I would like to know why.”&amp;lt;br&amp;gt;
The real BriansClub login page.&amp;lt;br&amp;gt;
Several things stood out in Mitch’s message. For starters, that is not the actual domain for BriansClub. And it’s easy to see why Mitch got snookered: The real BriansClub site is currently not at the top of search results when one queries that shop name at Google.&amp;lt;br&amp;gt;
Also, this greenhorn criminal clearly had bought into BriansClub’s advertising, which uses my name and likeness in a series of ads that run on all the top cybercrime forums. In those ads, a crab with my head on it zigs and zags on the sand. This is all meant to be a big joke: Krebs means “crab” or “cancer” in German, but a “crab” is sometimes used in Russian hacker slang to refer to a “carder,” or a person who regularly engages in street-level credit card fraud. Like Mitch.&amp;lt;br&amp;gt;
In late 2019, BriansClub changed its homepage to include doctored images of my Social Security and passport cards, credit report and mobile phone bill information. That was right after KrebsOnSecurity broke the news that someone had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/10/briansclub-hack-rescues-26m-stolen-cards/&amp;#34;&amp;gt;hacked BriansClub and siphoned information on 26 million stolen debit and credit accounts&amp;lt;/a&amp;gt; . The hacked BriansClub database had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/10/takeaways-from-the-566m-briansclub-breach/&amp;#34;&amp;gt;an estimated collective street value of $566 million&amp;lt;/a&amp;gt; , and that data was subsequently shared with thousands of financial institutions.&amp;lt;br&amp;gt;
Mitch said he’d just made a deposit of $240 worth of bitcoin at BriansClub[.]com, and was wondering when the funds would be reflected in the balance of his account on the shop.&amp;lt;br&amp;gt;
Playing along, I said I was sorry to hear about his ordeal, and asked Mitch if there were any stolen cards issued by a particular bank or to a specific region that he was seeking.&amp;lt;br&amp;gt;
Mitch didn’t bite, but neither would he be dissuaded that I was at fault for his wayward funds. He shared a picture showing funds he’d sent to the bitcoin address instructed by BriansClub[.]com — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blockchain.com/btc/address/1PLALmM5rrmLTGGVRHHTnB6VnZd3FFwh1Z&amp;#34;&amp;gt;1PLALmM5rrmLTGGVRHHTnB6VnZd3FFwh1Z&amp;lt;/a&amp;gt; — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/wp-content/uploads/2021/08/mitch.png&amp;#34;&amp;gt;using a Bitcoin ATM in Canada&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
The real BriansClub uses a dodgy virtual currency exchange service based in St. Petersburg, Russia called PinPays . The company’s website has long featured little more than a brand icon and an instant messenger address to reach the proprietor. The fake BriansClub told Mitch the Bitcoin address he was asked to pay was a PinPays address that would change with each transaction.&amp;lt;br&amp;gt;
The payment message displayed by the carding site phishing domain BriansClub[.]com.&amp;lt;br&amp;gt;
However, upon registering at the phishing site and clicking to fund my account, I was presented with the exact same Bitcoin address that Mitch said he paid. Also, the site wasn’t using PinPays; it was just claiming to do so to further mimic the real BriansClub.&amp;lt;br&amp;gt;
According to the Blockchain, that Bitcoin address Mitch paid has received more than a thousand payments over the past five months totaling more than USD $40,000 worth of Bitcoin. Most are relatively small payments like Mitch’s.&amp;lt;br&amp;gt;
The screenshot Mitch sent of his deposit.&amp;lt;br&amp;gt;
Unwary scammers like Mitch are a dime a dozen, as are phishing sites that spoof criminal services online. Shortly after it came online as a phishing site last year, BriansClub[.]com was hosted at a company in Moscow with just a handful of other domains phishing popular cybercrime stores, including Jstashbazar[.]com, vclub[.]cards, vclubb[.]com and vclub[.]credit.&amp;lt;br&amp;gt;
Whoever’s behind these sites is making a decent income fleecing clueless crooks. A review of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blockchain.com/btc/address/16c3rDKaySmnk5cdnm6xBvSPqs9aZweEG3?page=1&amp;#34;&amp;gt;the Bitcoin wallet&amp;lt;/a&amp;gt; listed as the payment address for BriansClub[.]org , for example, shows a similar haul: 704 transactions totaling $38,000 in Bitcoin over the past 10 months.&amp;lt;br&amp;gt;
“Wow, thanks for ripping me off,” Mitch wrote, after I’d dozed off for the evening without responding to his increasingly strident emails. “Should have spent the last money on my bills I’m trying to pay off. Should have known you were nothing but a thief.”&amp;lt;br&amp;gt;
Deciding the ruse had gone too far, I confessed to Mitch that I wasn’t really the administrator of BriansClub, and that the person he’d reached out to was an independent journalist who writes about cybercrime. I told him not to feel bad, as more than a thousand people had been similarly duped by the carding shop.&amp;lt;br&amp;gt;
But Mitch did not appear to accept my confession.&amp;lt;br&amp;gt;
“If that’s the case then why is your name all over it including in the window that opens up when you go to make a deposit?,” Mitch demanded, referring to the phishing site.&amp;lt;br&amp;gt;
Clearly, nothing I said was going to deter Mitch at this point. He asked in a follow-up email if a link he included in the message was indeed the “legitimate” BriansClub address. My only reply was that he should maybe consider another line of work before he got ripped off yet again, or the Royal Canadian Mounted Police showed up at his doorstep. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/phishing-sites-targeting-scammers-and-thieves/#more-56513&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-122523/</link>
      <pubDate>Sun, 08 Aug 2021 12:25:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-122523/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/taliban-seize-government-buildings-in-afghan-cities-kunduz-sar-e-pul-idUSKBN2F908T&amp;#34;&amp;gt;Taliban seize government buildings in Afghan cities Kunduz, Sar-e Pul&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban fighters overran two provincial capitals, including the strategic northeastern city of Kunduz and northern Sar-e Pul on Sunday, local officials said, as the insurgents intensified pressure on the north and threatened further cities.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-usa/biden-envoy-told-brazils-bolsonaro-important-not-to-undermine-elections-source-idUSKBN2F90CK&amp;#34;&amp;gt;Biden envoy told Brazil&amp;amp;#39;s Bolsonaro important not to undermine elections - source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-082423/</link>
      <pubDate>Sun, 08 Aug 2021 08:24:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-082423/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-minister-signals-path-to-adopting-china-anti-sanctions-law-idUSKBN2F907G&amp;#34;&amp;gt;Hong Kong minister signals path to adopting China anti-sanctions law&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hong Kong&amp;amp;#39;s justice secretary said on Sunday that a mainland Chinese law to counter foreign sanctions could also be adopted in the China-ruled city by writing it into Hong Kong&amp;amp;#39;s mini-constitution, pending a decision by the Chinese parliament.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/anti-military-protests-in-myanmar-on-anniversary-of-1988-uprising-idUSKBN2F907E&amp;#34;&amp;gt;Anti-military protests in Myanmar on anniversary of 1988 uprising&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-greece-wildfires/blaze-ravages-evia-island-on-sixth-day-of-greek-wildfires-idUSKBN2F906V&amp;#34;&amp;gt;Blaze ravages Evia island on sixth day of Greek wildfires&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-042432/</link>
      <pubDate>Sun, 08 Aug 2021 04:24:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210808-042432/</guid>
      <description>&amp;lt;p&amp;gt;Tokyo feared that the Olympic Games would spread COVID-19; numbers suggest that didn&amp;#39;t happen &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports/tokyo-has-shown-pandemic-can-be-beaten-games-health-adviser-says-2021-08-07/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-rain/n-koreas-kim-calls-for-relief-campaign-in-rain-hit-areas-idUSKBN2F901P&amp;#34;&amp;gt;N.Korea&amp;#39;s Kim calls for relief campaign in rain-hit areas&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nicaragua-politics/top-u-s-diplomat-nicaraguas-ortega-clinging-to-power-at-all-costs-idUSKBN2F900G&amp;#34;&amp;gt;Top U.S. diplomat: Nicaragua&amp;amp;#39;s Ortega clinging to power &amp;amp;#39;at all costs&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210808-042043/</link>
      <pubDate>Sun, 08 Aug 2021 04:20:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210808-042043/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implicit-move&amp;#34;&amp;gt;implicit-move&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#llvm&amp;#34;&amp;gt;llvm&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#proposal&amp;#34;&amp;gt;proposal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A few months ago, Matheus Izvekov implemented my WG21 proposal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2021/p2266r1.html&amp;#34;&amp;gt;P2266 “Simpler Implicit Move”&amp;lt;/a&amp;gt; in Clang. As of Clang 13, it’s enabled by default under&amp;lt;br&amp;gt;
-std=c&#43;&#43;2b&amp;lt;br&amp;gt;
.&amp;lt;br&amp;gt;
We’ve received some feedback from the field already (leading up to the Clang 13 release).
Here are the punch lines as far as I can recall. These examples will all appear in
P2266R2, whenever I get around to submitting it.&amp;lt;br&amp;gt;
Many thanks to Matheus Izvekov for the implementation, and to Stephan Bergmann for reporting
these issues! …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-202218/</link>
      <pubDate>Sat, 07 Aug 2021 20:22:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-202218/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-air-force-pilot-killed-in-kabul-bombing-attack-claimed-by-taliban-idUSKBN2F80L1&amp;#34;&amp;gt;Afghan Air Force pilot killed in Kabul bombing, attack claimed by Taliban&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -An Afghan Air Force pilot was killed by a bomb in Kabul on Saturday, officials said, in an attack claimed by the Taliban.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-un/u-s-says-plot-against-myanmar-u-n-envoy-fits-disturbing-pattern-idUSKBN2F80LD&amp;#34;&amp;gt;U.S. says plot against Myanmar U.N. envoy fits &amp;amp;#39;disturbing pattern&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-lebanon-israel/hezbollah-chief-nasrallah-says-group-could-escalate-its-response-to-israel-idUSKBN2F80MU&amp;#34;&amp;gt;Hezbollah chief Nasrallah says group could escalate its response to Israel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210807-201028/</link>
      <pubDate>Sat, 07 Aug 2021 20:10:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210807-201028/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-a-mongodb-gui-in-minutes/&amp;#34;&amp;gt;Build a MongoDB GUI in minutes In this post, we’ll show you how to build a simple yet powerful admin panel for your MongoDB instance. Using MongoDB’s sample data, we’ll demonstrate how to query data, build&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-162339/</link>
      <pubDate>Sat, 07 Aug 2021 16:23:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-162339/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-migrants-italy/rescue-ship-carrying-257-migrants-docks-in-sicily-port-idUSKBN2F80HM&amp;#34;&amp;gt;Rescue ship carrying 257 migrants docks in Sicily port&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A ship carrying 257 migrants docked in the Italian port of Trapani on Saturday almost a week after rescuing the people from international waters off Tunisia.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-greece-wildfires/greece-battles-wildfires-for-fifth-day-in-nightmarish-summer-idUSKBN2F8074&amp;#34;&amp;gt;Greece battles wildfires for fifth day in &amp;amp;#39;nightmarish summer&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210807-122757/</link>
      <pubDate>Sat, 07 Aug 2021 12:27:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210807-122757/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133154_1966-rcr-ford-gt40-replica-stunt-car-from-ford-v-ferrari-heads-to-auction&amp;#34;&amp;gt;1966 RCR Ford GT40 replica stunt car from &amp;amp;quot;Ford v. Ferrari&amp;amp;quot; heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133107_2022-subaru-forester-wilderness-teased&amp;#34;&amp;gt;2022 Subaru Forester Wilderness teased&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-122312/</link>
      <pubDate>Sat, 07 Aug 2021 12:23:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-122312/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-thailand-protests/thai-anti-govt-protesters-clash-with-police-in-bangkok-idUSKBN2F809Q&amp;#34;&amp;gt;Thai anti-govt protesters clash with police in Bangkok&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More than a thousand Thai anti-government protesters clashed with police on Saturday, as they protested against the government&amp;amp;#39;s failure to handle coronavirus outbreaks and its impact on the economy.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-shipping-security-gulf-oman-iran/iran-denies-role-in-tanker-attack-says-seeks-gulf-security-idUSKBN2F808T&amp;#34;&amp;gt;Iran denies role in tanker attack, says seeks Gulf security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-poland-eu-judiciary/poland-to-dissolve-judges-disciplinary-chamber-to-meet-eu-demands-idUSKBN2F8076&amp;#34;&amp;gt;Poland to dissolve judges&amp;amp;#39; Disciplinary Chamber to meet EU demands&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-082256/</link>
      <pubDate>Sat, 07 Aug 2021 08:22:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-082256/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia-wales/australia-suffers-worst-covid-day-this-year-with-millions-in-lockdown-idUSKBN2F800S&amp;#34;&amp;gt;Australia suffers worst COVID day this year with millions in lockdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MELBOURNE (Reuters) -Australia saw a record daily number of new coronavirus cases this year on Saturday, with the country&amp;amp;#39;s most populous states of New South Wales, Victoria and Queensland recording a total of 361 cases of the highly infectious Delta variant.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-johnson/uk-pm-johnson-wont-isolate-after-staff-members-positive-covid-test-idUSKBN2F806D&amp;#34;&amp;gt;UK PM Johnson won&amp;amp;#39;t isolate after staff member&amp;amp;#39;s positive COVID test&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210807-082103/</link>
      <pubDate>Sat, 07 Aug 2021 08:21:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210807-082103/</guid>
      <description>The sample collected by NASA’s Perseverance rover might be volcanic, helping scientists to understand the red planet&amp;#39;s evolution.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-042310/</link>
      <pubDate>Sat, 07 Aug 2021 04:23:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210807-042310/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-border-strike-deal/canadian-government-border-staff-reach-deal-ending-strike-union-idUSKBN2F802D&amp;#34;&amp;gt;Canadian government, border staff reach deal, ending strike -union&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-tokyo-stabbing/knife-attacker-on-tokyo-commuter-train-wanted-to-kill-happy-women-nhk-idUSKBN2F801L&amp;#34;&amp;gt;Knife attacker on Tokyo commuter train wanted to kill &amp;amp;#39;happy women&amp;amp;#39;- NHK&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210807-041938/</link>
      <pubDate>Sat, 07 Aug 2021 04:19:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210807-041938/</guid>
      <description>std&amp;lt;br&amp;gt;
templates&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#sd-8-adjacent&amp;#34;&amp;gt;sd-8-adjacent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I hope by now everybody knows not to forward-declare standard library types.
For example, this code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/938oqY4f7&amp;#34;&amp;gt;Godbolt&amp;lt;/a&amp;gt; ) is wrong:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210807-002713/</link>
      <pubDate>Sat, 07 Aug 2021 00:27:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210807-002713/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02166-6&amp;#34;&amp;gt;Excitement as Mars rover drills first rock core for return to Earth&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210807-002014/</link>
      <pubDate>Sat, 07 Aug 2021 00:20:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210807-002014/</guid>
      <description>1/ If the last-minute amendment introduced to the infrastructure bill introduced by @MarkWarner passes, it will impose an unworkable reporting requirement on the shoulders of software developers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210806-202526/</link>
      <pubDate>Fri, 06 Aug 2021 20:25:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210806-202526/</guid>
      <description>August 6, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/06/goproxy-breaks-go.html&amp;#34;&amp;gt;proxy.golang.org allows many Go packages to be silently broken&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210806-202322/</link>
      <pubDate>Fri, 06 Aug 2021 20:23:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210806-202322/</guid>
      <description>&amp;lt;p&amp;gt;U.S. job growth rose solidly in July amid demand for workers in the services industry &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us/us-job-growth-solid-july-unemployment-rate-falls-54-2021-08-06/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/uk-apple-privacy/apple-to-roll-out-photo-checking-system-on-country-by-country-basis-idUSKBN2F720T&amp;#34;&amp;gt;Apple to roll out photo checking system on country-by-country basis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -Apple Inc will roll out a system for checking photos for child abuse imagery on a country-by-country basis, depending on local laws, the company said on Friday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/legal-us-usa-cyber-providers/kaseya-ransomware-attack-sets-off-race-to-hack-service-providers-researchers-idUSKBN2F42D8&amp;#34;&amp;gt;Kaseya ransomware attack sets off race to hack service providers -researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Aug 03 2021&amp;lt;br&amp;gt;
SAN FRANCISCO     A ransomware attack in July that paralyzed as many as 1,500 organizations by compromising tech-management software from a company called Kaseya has set off a race among criminals looking for similar vulnerabilities, cyber security experts said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/resurgent-taliban-take-provincial-capital-kill-afghan-govt-spokesman-idUSKBN2F712F&amp;#34;&amp;gt;Resurgent Taliban take provincial capital, kill Afghan govt spokesman&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban insurgents captured an Afghan provincial capital and killed the government&amp;amp;#39;s senior media officer in Kabul on Friday amid a deteriorating security situation as U.S. and other foreign troops withdraw.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-response/talibans-actions-wont-help-them-gain-international-legitimacy-white-house-idUSKBN2F7287&amp;#34;&amp;gt;Taliban&amp;amp;#39;s actions won&amp;amp;#39;t help them gain international legitimacy -White House&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-sanctions-un/north-korea-developing-nuclear-missile-programs-in-2021-u-n-report-idUSKBN2F727E&amp;#34;&amp;gt;North Korea developing nuclear, missile programs in 2021 -U.N. report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/02/disrupted-why-gen-z-is-turning-to-depop?videoId=733666723&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Disrupted: Why Gen Z is turning to Depop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/08/01/will-venices-ban-end-the-cruise-ship-bat?videoId=733634075&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Will Venice&amp;amp;#39;s ban end the cruise ship battle?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/30/the-week-in-numbers-techs-tower-robin-re?videoId=733562112&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: techs tower, Robin reels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/29/climbing-brothers-shoot-for-olympic-meda?videoId=733524915&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Climbing brothers shoot for Olympic medal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-162603/</link>
      <pubDate>Fri, 06 Aug 2021 16:26:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-162603/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133149_mazda-patent-drawing-shows-coupe-resembling-stunning-rx-vision-concept&amp;#34;&amp;gt;Mazda patent drawing shows coupe resembling stunning RX-Vision concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210806-161730/</link>
      <pubDate>Fri, 06 Aug 2021 16:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210806-161730/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/01/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to the August 1st edition of “Long Links”, which assembles long-form pieces that I have the luxury of enjoying due to   semi-retirement. Nobody with a real job has time to read all this stuff, but one or two items might enrich your life without burning too   many minutes.   Note: There was no July 1st Long Links because either I was busier or the world’s long-form authors less prolific in June.   Highlights this time out: Taxing wealth, attacking Amazon, guitar music, and God &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/08/01/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-122713/</link>
      <pubDate>Fri, 06 Aug 2021 12:27:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-122713/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129224_2022-bmw-m3-touring-spy-shots-and-video&amp;#34;&amp;gt;2022 BMW M3 Touring spy shots: Speedy wagon coming, but not to US&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133145_porsche-offers-final-run-of-991-generation-911-gt2-rs-clubsport-to-mark-manthey-racing-partnership&amp;#34;&amp;gt;Porsche offers final run of 991-generation 911 GT2 RS Clubsport to mark Manthey-Racing partnership&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133113_dodge-plug-in-hybrid-coming-in-2022&amp;#34;&amp;gt;Dodge plug-in hybrid coming in 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-082611/</link>
      <pubDate>Fri, 06 Aug 2021 08:26:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-082611/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133144_pagani-huayra-bc-pacchetto-tempesta-arrives-with-816-hp-6-exhaust-tips&amp;#34;&amp;gt;Pagani Huayra BC Pacchetto Tempesta arrives with 816 hp, 6 exhaust tips&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-002911/</link>
      <pubDate>Fri, 06 Aug 2021 00:29:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210806-002911/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133139_2022-lexus-gx-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Lexus GX gets new tech and Black Line Special Edition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133130_morgan-gets-into-the-overlanding-spirit-with-plus-four-cx-t&amp;#34;&amp;gt;Morgan gets into the overlanding spirit with Plus Four CX-T&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210806-001048/</link>
      <pubDate>Fri, 06 Aug 2021 00:10:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210806-001048/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/an-update-on-racial-equity-at-discord-through-inclusion-diversity-and-purpose-efforts-1c1b76bac47c?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;An Update on Racial Equity at Discord Through Inclusion, Diversity and Purpose Efforts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/an-update-on-racial-equity-at-discord-through-inclusion-diversity-and-purpose-efforts-1c1b76bac47c?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;An Update on Racial Equity at Discord Through Inclusion, Diversity and Purpose Efforts Our work to prevent Discord from being used for hate and violence is never done. It’s vital that we continue to hold ourselves accountable.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Aug 5&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210805-203127/</link>
      <pubDate>Thu, 05 Aug 2021 20:31:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210805-203127/</guid>
      <description>× Close&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210805-202522/</link>
      <pubDate>Thu, 05 Aug 2021 20:25:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210805-202522/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/04/05/icloud-who-holds-key/&amp;#34;&amp;gt;iCloud: Who holds the key?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-162537/</link>
      <pubDate>Thu, 05 Aug 2021 16:25:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-162537/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133133_czinger-claims-21c-prototype-already-laps-laguna-seca-2s-faster-than-a-mclaren-senna&amp;#34;&amp;gt;Czinger claims 21C prototype already laps Laguna Seca 2s faster than a McLaren Senna&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210805-162233/</link>
      <pubDate>Thu, 05 Aug 2021 16:22:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210805-162233/</guid>
      <description>August 5, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/08/05/In-praise-of-Postgres.html&amp;#34;&amp;gt;In praise of PostgreSQL&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-122629/</link>
      <pubDate>Thu, 05 Aug 2021 12:26:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-122629/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133128_brabham-bt63-gt2-ready-to-start-racing-in-2022&amp;#34;&amp;gt;Brabham BT63 GT2 ready to start racing in 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132677_watch-the-2022-audi-rs-3-lap-the-ring-in-7-40&amp;#34;&amp;gt;Watch the 2022 Audi RS 3 lap the &amp;amp;#39;Ring in 7:40&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133127_2023-bmw-8-series-spy-shots&amp;#34;&amp;gt;2023 BMW 8-Series spy shots: Mid-cycle update for mega coupe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210805-122148/</link>
      <pubDate>Thu, 05 Aug 2021 12:21:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210805-122148/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/08/critical-cobalt-strike-bug-leaves-botnet-servers-vulnerable-to-takedown/&amp;#34;&amp;gt;Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
New exploit available for download lets hackers crash Cobalt Strike team servers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210805-120822/</link>
      <pubDate>Thu, 05 Aug 2021 12:08:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210805-120822/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/&amp;#34;&amp;gt;Ransomware Gangs and the Name Game Distraction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
It’s nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. We hang on to these occasional victories because history tells us that most ransomware moneymaking collectives don’t go away so much as reinvent themselves under a new name, with new rules, targets and weaponry. Indeed, some of the most destructive and costly ransomware groups are now in their third incarnation.&amp;lt;br&amp;gt;
A rough timeline of major ransomware operations and their reputed links over time.&amp;lt;br&amp;gt;
Reinvention is a basic survival skill in the cybercrime business. Among the oldest tricks in the book is to fake one’s demise or retirement and invent a new identity. A key goal of such subterfuge is to throw investigators off the scent or to temporarily direct their attention elsewhere.&amp;lt;br&amp;gt;
Cybercriminal syndicates also perform similar disappearing acts whenever it suits them. These organizational reboots are an opportunity for ransomware program leaders to set new ground rules for their members — such as which types of victims aren’t allowed (e.g., hospitals, governments, critical infrastructure), or how much of a ransom payment an affiliate should expect for bringing the group access to a new victim network.&amp;lt;br&amp;gt;
I put together the above graphic to illustrate some of the more notable ransom gang reinventions over the past five years. What it doesn’t show is what we already know about the cybercriminals behind many of these seemingly disparate ransomware groups, some of whom were pioneers in the ransomware space almost a decade ago. We’ll explore that more in the latter half of this story.&amp;lt;br&amp;gt;
One of the more intriguing and recent revamps involves DarkSide , the group that extracted a $5 million ransom from Colonial Pipeline earlier this year, only to watch &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/&amp;#34;&amp;gt;much of it get clawed back in an operation by the U.S. Department of Justice&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
After acknowledging someone had also seized their Internet servers, DarkSide &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/&amp;#34;&amp;gt;announced it was folding&amp;lt;/a&amp;gt; . But a little more than a month later, a new ransomware affiliate program called BlackMatter emerged, and experts quickly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/darkside-ransomware-gang-returns-as-new-blackmatter-operation/&amp;#34;&amp;gt;determined&amp;lt;/a&amp;gt; BlackMatter was using the same unique encryption methods that DarkSide had used in their attacks.&amp;lt;br&amp;gt;
DarkSide’s demise roughly coincided with that of REvil , a long-running ransomware group that claims to have extorted more than $100 million from victims. REvil’s last big victim was Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. That attack let REvil deploy ransomware to as many as 1,500 organizations that used Kaseya.&amp;lt;br&amp;gt;
REvil demanded a whopping $70 million to release a universal decryptor for all victims of the Kaseya attack. Just days later, President Biden &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cnbc.com/2021/07/09/ransomware-biden-presses-putin-to-disrupt-cybercriminals-in-russia.html&amp;#34;&amp;gt;reportedly&amp;lt;/a&amp;gt; told Russian President Vladimir Putin that he expects Russia to act when the United States shares information on specific Russians involved in ransomware activity.&amp;lt;br&amp;gt;
A REvil ransom note.&amp;lt;br&amp;gt;
Whether that conversation prompted actions is unclear. But REvil’s victim shaming blog would disappear from the dark web just four days later.&amp;lt;br&amp;gt;
Mark Arena , CEO of cyber threat intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.intel471.com&amp;#34;&amp;gt;Intel 471&amp;lt;/a&amp;gt; , said it remains unclear whether BlackMatter is the REvil crew operating under a new banner, or if it is simply the reincarnation of DarkSide.&amp;lt;br&amp;gt;
But one thing is clear, Arena said: “Likely we will see them again unless they’ve been arrested.”&amp;lt;br&amp;gt;
Likely, indeed. REvil is widely considered a reboot of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=gandcrab&amp;#34;&amp;gt;GandCrab&amp;lt;/a&amp;gt; , a prolific ransomware gang that boasted of extorting more than $2 billion over 12 months before abruptly closing up shop in June 2019. “We are living proof that you can do evil and get off scot-free,” Gandcrab bragged.&amp;lt;br&amp;gt;
And wouldn’t you know it: Researchers have found GandCrab &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://research.checkpoint.com/2018/gandcrab-ransomware-mindset/&amp;#34;&amp;gt;shared key behaviors&amp;lt;/a&amp;gt; with Cerber , an early ransomware-as-a-service operation that stopped claiming new victims at roughly the same time that GandCrab came on the scene. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/#more-56464&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20210805-082209/</link>
      <pubDate>Thu, 05 Aug 2021 08:22:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20210805-082209/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/&amp;#34;&amp;gt;Back to GitHub.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/&amp;#34;&amp;gt;The GitHub Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/community/&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/company/&amp;#34;&amp;gt;Company&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/education/&amp;#34;&amp;gt;Education&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/engineering/&amp;#34;&amp;gt;Engineering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/enterprise/&amp;#34;&amp;gt;Enterprise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/policy/&amp;#34;&amp;gt;Policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/product/&amp;#34;&amp;gt;Product&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/security/&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/changelog/&amp;#34;&amp;gt;Changelog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Search by Keyword&amp;lt;br&amp;gt;
Search&amp;lt;br&amp;gt;
Primary Menu&amp;lt;br&amp;gt;
Posts by&amp;lt;br&amp;gt;
Abby Vollmer&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/vollmera&amp;#34;&amp;gt;@vollmera&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-04-08-safe-harbors-for-software-collaboration-part-2/&amp;#34;&amp;gt;April 8, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-04-08-safe-harbors-for-software-collaboration-part-2/&amp;#34;&amp;gt;Safe harbors for software collaboration, part 2&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The modern internet was built on a legal framework of safe harbors for user-generated content. These safe harbors are widely credited with having enabled global internet innovation by protecting online platforms from liability for user&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/vollmera/&amp;#34;&amp;gt;Abby Vollmer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-02-25-2020-transparency-report/&amp;#34;&amp;gt;2020 Transparency Report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
At GitHub, we put developers first, and we work hard to provide a safe, open, and inclusive platform for code collaboration. This means we are committed to minimizing the disruption of software projects, protecting developer&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-11-16-standing-up-for-developers-youtube-dl-is-back/&amp;#34;&amp;gt;Standing up for developers: youtube-dl is back&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Today we reinstated youtube-dl, a popular project on GitHub, after we received additional information about the project that enabled us to reverse a Digital Millennium Copyright Act (DMCA) takedown.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-10-15-updates-to-our-terms-of-service-and-our-privacy-statement/&amp;#34;&amp;gt;Updates to our Terms of Service and Privacy Statement&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We regularly update our policies to reflect the evolution of our products, changing legal requirements, and user feedback. In this update, we’ve made some changes to our Terms of Service, Privacy Statement, and other site&amp;lt;br&amp;gt;
As policymakers grapple with how to address hate speech and disinformation on the internet, they’re eying the legal structure underpinning collaborative software development: legal safe harbors. These safe harbors protect online platforms from liability for&amp;lt;br&amp;gt;
We’re excited to share GitHub’s 2019 Transparency Report, a by-the-numbers look at how we handle requests for user data and moderate content on GitHub.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-06-25-github-scores-high-in-content-moderation-report/&amp;#34;&amp;gt;GitHub scores high in content moderation report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
See how GitHub protects users against online censorship.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-04-17-github-shares-lessons-learned-from-eu-copyright-directive-at-us-dmca-roundtable/&amp;#34;&amp;gt;GitHub shares lessons learned from EU Copyright Directive at US DMCA roundtable&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Find out what we shared at the US Copyright Office based on our experience with the EU Copyright Directive.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-03-20-our-contribution-to-the-united-nations-report-on-free-assembly-and-association-online/&amp;#34;&amp;gt;Our contribution to the United Nations report on free assembly and association online&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Read about how collaboration on GitHub connects to free assembly and association online as part of our input to the United Nations Human Rights Council.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-02-13-the-eu-copyright-directive-what-happens-from-here/&amp;#34;&amp;gt;The EU Copyright Directive: what happens from here&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The EU Copyright Directive has come down to a final vote. Read on for more on what’s at stake and how the developer community shaped the debate.&amp;lt;br&amp;gt;
Previous 1 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/vollmera/page/2/&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/vollmera/page/3/&amp;#34;&amp;gt;3&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/vollmera/page/2/&amp;#34;&amp;gt;Next&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Product&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/features&amp;#34;&amp;gt;Features&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pricing&amp;#34;&amp;gt;Pricing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://resources.github.com/&amp;#34;&amp;gt;Resources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Platform&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.github.com/&amp;#34;&amp;gt;Developer API&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://partner.github.com/&amp;#34;&amp;gt;Partners&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://atom.io/&amp;#34;&amp;gt;Atom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.electronjs.org/&amp;#34;&amp;gt;Electron&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://desktop.github.com/&amp;#34;&amp;gt;GitHub Desktop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Support&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/&amp;#34;&amp;gt;Docs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.community/&amp;#34;&amp;gt;Community Forum&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://services.github.com/&amp;#34;&amp;gt;Training&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.githubstatus.com/&amp;#34;&amp;gt;Status&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.github.com/&amp;#34;&amp;gt;Contact&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Company&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about/careers&amp;#34;&amp;gt;Careers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about/press&amp;#34;&amp;gt;Press&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shop.github.com/&amp;#34;&amp;gt;Shop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/github&amp;#34;&amp;gt;Github Twitter link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/GitHub&amp;#34;&amp;gt;Github Facebook link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/github&amp;#34;&amp;gt;Github Youtube link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/company/github&amp;#34;&amp;gt;Github LinkedIn link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/github&amp;#34;&amp;gt;Github link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
© 2021 GitHub, Inc.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/github/site-policy/github-terms-of-service&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/github/site-policy/github-privacy-statement&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20210805-082204/</link>
      <pubDate>Thu, 05 Aug 2021 08:22:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20210805-082204/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/&amp;#34;&amp;gt;Back to GitHub.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/&amp;#34;&amp;gt;The GitHub Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/community/&amp;#34;&amp;gt;Community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/company/&amp;#34;&amp;gt;Company&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/education/&amp;#34;&amp;gt;Education&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/engineering/&amp;#34;&amp;gt;Engineering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/enterprise/&amp;#34;&amp;gt;Enterprise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/policy/&amp;#34;&amp;gt;Policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/product/&amp;#34;&amp;gt;Product&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/category/security/&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/changelog/&amp;#34;&amp;gt;Changelog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Search by Keyword&amp;lt;br&amp;gt;
Search&amp;lt;br&amp;gt;
Primary Menu&amp;lt;br&amp;gt;
Posts by&amp;lt;br&amp;gt;
Nat Friedman&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/nat&amp;#34;&amp;gt;@nat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-06-29-introducing-github-copilot-ai-pair-programmer/&amp;#34;&amp;gt;June 29, 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/nat/&amp;#34;&amp;gt;Nat Friedman&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-04-19-open-source-goes-to-mars/&amp;#34;&amp;gt;Open source goes to Mars&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
This morning, we watched in awe as the first Mars Helicopter, Ingenuity, took flight in the thin Martian atmosphere. This is an incredible achievement for the teams at NASA and the Jet Propulsion Lab (JPL).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-01-05-advancing-developer-freedom-github-is-fully-available-in-iran/&amp;#34;&amp;gt;Advancing developer freedom: GitHub is fully available in Iran&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Today we are announcing a breakthrough: we have secured a license from the US government to offer GitHub to developers in Iran. This includes all services for individuals and organizations, private and public, free and paid.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-12-17-no-cookie-for-you/&amp;#34;&amp;gt;No cookie for you&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Good news: we removed all cookie banners from GitHub! No one likes cookie banners. But cookie banners are everywhere. So how did we pull this off? Well, EU law requires you to use cookie&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-04-14-github-is-now-free-for-teams/&amp;#34;&amp;gt;GitHub is now free for teams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Every developer and team can now get private repositories with unlimited collaborators at no cost with GitHub Free, and we reduced prices for some of our paid plans.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2020-03-16-npm-is-joining-github/&amp;#34;&amp;gt;npm is joining GitHub&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We’re excited to announce that npm will be joining GitHub.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-10-09-github-and-us-government-developers/&amp;#34;&amp;gt;GitHub and US Government developers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
At GitHub, we believe in empowering developers around the world. We also believe in basic human rights and treating people with respect and dignity. Today, I wanted to share a message I sent to all employees yesterday that is related to this, as it is important that we share our views on immigration policy with the world and not just internally with employees.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-09-18-github-welcomes-semmle/&amp;#34;&amp;gt;Welcoming Semmle to GitHub&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Today we’re announcing a big step in securing the open source supply chain: we’re welcoming Semmle to the GitHub.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-08-08-github-actions-now-supports-ci-cd/&amp;#34;&amp;gt;GitHub Actions now supports CI/CD, free for public repositories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Since we introduced GitHub Actions last year, the response has been phenomenal, and developers have created thousands of inspired workflows. But we’ve also heard clear feedback from almost everyone: you want CI/CD! And that’s what we’re announcing today.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2019-05-23-building-an-interconnected-community-together/&amp;#34;&amp;gt;Building an interconnected community, together&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Today, we joined hundreds of developers in Berlin for GitHub Satellite, our global developer conference. To celebrate our interconnected community, we launched GitHub Sponsors to help support open source maintainers and contributors, released new security features to enable more secure software development from start to finish, and introduced new capabilities that address the needs of enterprises and large organizations.&amp;lt;br&amp;gt;
Previous 1 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/nat/page/2/&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/author/nat/page/2/&amp;#34;&amp;gt;Next&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Product&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/features&amp;#34;&amp;gt;Features&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pricing&amp;#34;&amp;gt;Pricing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://resources.github.com/&amp;#34;&amp;gt;Resources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Platform&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.github.com/&amp;#34;&amp;gt;Developer API&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://partner.github.com/&amp;#34;&amp;gt;Partners&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://atom.io/&amp;#34;&amp;gt;Atom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.electronjs.org/&amp;#34;&amp;gt;Electron&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://desktop.github.com/&amp;#34;&amp;gt;GitHub Desktop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Support&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/&amp;#34;&amp;gt;Docs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.community/&amp;#34;&amp;gt;Community Forum&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://services.github.com/&amp;#34;&amp;gt;Training&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.githubstatus.com/&amp;#34;&amp;gt;Status&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.github.com/&amp;#34;&amp;gt;Contact&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Company&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about/careers&amp;#34;&amp;gt;Careers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/about/press&amp;#34;&amp;gt;Press&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shop.github.com/&amp;#34;&amp;gt;Shop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/github&amp;#34;&amp;gt;Github Twitter link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/GitHub&amp;#34;&amp;gt;Github Facebook link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/github&amp;#34;&amp;gt;Github Youtube link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/company/github&amp;#34;&amp;gt;Github LinkedIn link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/github&amp;#34;&amp;gt;Github link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
© 2021 GitHub, Inc.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/github/site-policy/github-terms-of-service&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/github/site-policy/github-privacy-statement&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210805-081521/</link>
      <pubDate>Thu, 05 Aug 2021 08:15:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210805-081521/</guid>
      <description>Kathryn Haun &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/katie_haun&amp;#34;&amp;gt;@katie_haun&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
We @a16z (@bhorowitz, @pmarca, myself &amp;amp;amp; @cdixon) just sent a letter to @SenSchumer and @LeaderMcConnell in support of the bipartisan Wyden-Lummis-Toomey Amendment to the Infrastructure Bill &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/980hP7kdlT&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/980hP7kdlT&amp;#34;&amp;gt;https://t.co/980hP7kdlT&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/K6zmT22ink&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/K6zmT22ink&amp;#34;&amp;gt;https://t.co/K6zmT22ink&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210805-042655/</link>
      <pubDate>Thu, 05 Aug 2021 04:26:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210805-042655/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog&amp;#34;&amp;gt;× Close&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-042632/</link>
      <pubDate>Thu, 05 Aug 2021 04:26:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210805-042632/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133118_first-2022-acura-nsx-type-s-headed-to-auction&amp;#34;&amp;gt;First 2022 Acura NSX Type S headed to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133115_bespoke-mclaren-speedtail-combines-two-very-special-colors&amp;#34;&amp;gt;Bespoke McLaren Speedtail combines two very special colors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1121646_5-000-hp-devel-sixteen-not-dead-prototype-starts-track-tests&amp;#34;&amp;gt;5,000-hp Devel Sixteen not dead, prototype starts track tests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1123274_production-ready-pininfarina-battista-heads-to-2021-monterey-car-week&amp;#34;&amp;gt;Production-ready Pininfarina Battista heads to 2021 Monterey Car Week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128705_2022-volkswagen-tiguan-review-price-photos-specs-info&amp;#34;&amp;gt;2022 Volkswagen Tiguan preview: Update for compact crossover with a light touch for $27,190&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132294_bruce-canepa-drives-a-porsche-917k-on-the-street&amp;#34;&amp;gt;Bruce Canepa drives a Porsche 917K on the street&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210805-042403/</link>
      <pubDate>Thu, 05 Aug 2021 04:24:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210805-042403/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/mdns-autocomplete-search/&amp;#34;&amp;gt;How MDN’s autocomplete search works →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/08/mdns-autocomplete-search/&amp;#34;&amp;gt;How MDN’s autocomplete search works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Last month, Gregor Weber and Peter Bengtsson added an autocomplete search to MDN Web Docs, that allows you to quickly jump straight to the document you&amp;amp;#39;re looking for by typing parts of the document title. This is the story about how that&amp;amp;#39;s implemented.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210805-042341/</link>
      <pubDate>Thu, 05 Aug 2021 04:23:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210805-042341/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/08/03/science/trinity-site-atomic-fat-man.html&amp;#34;&amp;gt;Out There Touring Trinity, the Birthplace of Nuclear Dread A recent visit to the site of the first atomic bomb explosion offered desert vistas, (mildly) radioactive pebbles and troubling reflections. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Aug. 3, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210805-042240/</link>
      <pubDate>Thu, 05 Aug 2021 04:22:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210805-042240/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/information-technology/2021/08/the-state-department-and-3-other-us-agencies-earn-a-d-for-cybersecurity/&amp;#34;&amp;gt;The State Department and 3 other US agencies earn a D for cybersecurity&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Two years after a damning cybersecurity report, auditors find little has improved.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/&amp;#34;&amp;gt;Trusted platform module security defeated in 30 minutes, no soldering required&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Sometimes, locking down a laptop with the latest defenses isn&amp;amp;#39;t enough.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>503 Backend fetch failed</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20210805-042220/</link>
      <pubDate>Thu, 05 Aug 2021 04:22:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20210805-042220/</guid>
      <description>Error 503 Backend fetch failed&amp;lt;br&amp;gt;
Backend fetch failed&amp;lt;br&amp;gt;
Guru Meditation:&amp;lt;br&amp;gt;
XID: 39511034&amp;lt;br&amp;gt;
Varnish cache server&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>503 Backend fetch failed</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20210805-042208/</link>
      <pubDate>Thu, 05 Aug 2021 04:22:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20210805-042208/</guid>
      <description>Error 503 Backend fetch failed&amp;lt;br&amp;gt;
Backend fetch failed&amp;lt;br&amp;gt;
Guru Meditation:&amp;lt;br&amp;gt;
XID: 369142756&amp;lt;br&amp;gt;
Varnish cache server&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210805-042118/</link>
      <pubDate>Thu, 05 Aug 2021 04:21:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210805-042118/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/10/22/a-riddle-wrapped-in-curve/&amp;#34;&amp;gt;A riddle wrapped in a curve&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210805-041958/</link>
      <pubDate>Thu, 05 Aug 2021 04:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210805-041958/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html&amp;#34;&amp;gt;Linux Kernel Security Done Right&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Kees Cook, Software Engineer, Google Open Source Security Team To borrow from an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf&amp;#34;&amp;gt;excellent analogy&amp;lt;/a&amp;gt; between the modern computer ecosystem and the US automotive industry of the 1960s, the Linux kernel runs well: when driving down the highway, you&amp;amp;#39;re not sprayed in the face with oil and gasoline, and you quickly get where you want to go. However, in the face of failure, the car may end up on fire, flying off a cliff. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/08/linux-kernel-security-done-right.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Kees Cook, Software Engineer, Google Open Source Security Team To borrow from an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf&amp;#34;&amp;gt;excellent analogy&amp;lt;/a&amp;gt; between the modern computer ecosystem and the US automotive industry of the 1960s, the Linux kernel runs well: when driving down the highway, you&amp;amp;#39;re not sprayed in the face with oil and gasoline, and you quickly get where you want to go. However, in the face of failure, the car may end up on fire, flying off a cliff.&amp;lt;br&amp;gt;
As we approach its 30th Anniversary, Linux still remains the largest collaborative development project in the history of computing. The huge community surrounding Linux allows it to do amazing things and run smoothly. What&amp;amp;#39;s still missing, though, is sufficient focus to make sure that Linux &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Fail-safe&amp;#34;&amp;gt;fails well&amp;lt;/a&amp;gt; too. There&amp;amp;#39;s a strong link between code robustness and security: making it harder for any bugs to manifest makes it harder for security flaws to manifest. But that&amp;amp;#39;s not the end of the story. When flaws do manifest, it&amp;amp;#39;s important to handle them effectively.&amp;lt;br&amp;gt;
Rather than only taking a one-bug-at-a-time perspective, preemptive actions can stop bugs from having bad effects. With Linux written in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://outflux.net/slides/2019/lca/danger.pdf&amp;#34;&amp;gt;C&amp;lt;/a&amp;gt; , it will continue to have a long tail of associated &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/01/data-driven-security-hardening-in.html&amp;#34;&amp;gt;problems&amp;lt;/a&amp;gt; . Linux must be designed to take proactive steps to defend itself from its own risks. Cars have seat belts not because we want to crash, but because it is guaranteed to happen sometimes. Even though everyone wants a safe kernel running on their computer, phone, car, or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/github/setting-up-and-managing-your-github-profile/customizing-your-profile/personalizing-your-profile#list-of-qualifying-repositories-for-mars-2020-helicopter-contributor-badge&amp;#34;&amp;gt;interplanetary helicopter&amp;lt;/a&amp;gt; , not everyone is in a position to do something about it. Upstream kernel developers can fix bugs, but have no control over what a downstream vendor chooses to incorporate into their products. End users get to choose their products, but don&amp;amp;#39;t usually have control over what bugs are fixed nor what kernel is used (a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Electronics_right_to_repair&amp;#34;&amp;gt;problem&amp;lt;/a&amp;gt; in itself). Ultimately, vendors are responsible for keeping their product&amp;amp;#39;s kernels safe.&amp;lt;br&amp;gt;
What to fix?&amp;lt;br&amp;gt;
The statistics of tracking and fixing distinct bugs are sobering. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://kroah.com/log/blog/2018/02/05/linux-kernel-release-model/&amp;#34;&amp;gt;stable kernel releases&amp;lt;/a&amp;gt; (&amp;amp;#34;bug fixes only&amp;amp;#34;) each contain close to 100 new fixes per week. Faced with this high rate of change, a vendor can choose to ignore all the fixes, pick out only &amp;amp;#34;important&amp;amp;#34; fixes, or face the daunting task of taking everything.&amp;lt;br&amp;gt;
Fix nothing?&amp;lt;br&amp;gt;
With the preponderance of malware, botnets, and state surveillance &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2017/04/an-investigation-of-chrysaor-malware-on.html&amp;#34;&amp;gt;targeting flawed software&amp;lt;/a&amp;gt; , it&amp;amp;#39;s clear that ignoring all fixes is the wrong &amp;amp;#34;solution.&amp;amp;#34; Unfortunately this is the very common stance of vendors who see their devices as just a physical product instead of a hybrid product/service that must be regularly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://datatracker.ietf.org/doc/rfc8996/&amp;#34;&amp;gt;updated&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Fix important flaws?&amp;lt;br&amp;gt;
Between the dereliction of doing nothing and the assumed burden of fixing everything, the traditional vendor choice has been to cherry-pick only the &amp;amp;#34;important&amp;amp;#34; fixes. But what constitutes &amp;amp;#34;important&amp;amp;#34; or even relevant? Just determining whether to implement a fix takes developer time. The prevailing wisdom has been to choose vulnerabilities to fix based on the Mitre &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=%22linux&#43;kernel%22&amp;#34;&amp;gt;CVE&amp;lt;/a&amp;gt; list,  presuming all important flaws (and therefore fixes) would have an associated CVE. However, given the volume of flaws and their applicability to a particular system, not all security flaws have CVEs assigned, nor are they assigned in a timely manner. Evidence shows that for Linux CVEs, more than 40% had been fixed before the CVE was even assigned, with the average delay being &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/gregkh/presentation-cve-is-dead&amp;#34;&amp;gt;over three months after the fix&amp;lt;/a&amp;gt; . Some fixes &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html&amp;#34;&amp;gt;went years&amp;lt;/a&amp;gt; without having their security impact recognized. On top of this, product-relevant bugs may not even &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cve/cna/rules.html#section_7_assignment_rules&amp;#34;&amp;gt;classify&amp;lt;/a&amp;gt; for a CVE. Finally, upstream developers aren&amp;amp;#39;t actually interested in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kernel.org/doc/html/latest/admin-guide/security-bugs.html#cve-assignment&amp;#34;&amp;gt;CVE assignment&amp;lt;/a&amp;gt; ; they spend their limited time actually fixing bugs. A vendor relying on cherry-picking is all but guaranteed to miss important vulnerabilities that others are actively fixing, which is almost worse than doing nothing since it creates the illusion that security updates are being appropriately handled.&amp;lt;br&amp;gt;
Fix everything!&amp;lt;br&amp;gt;
So what is a vendor to do? The answer is simple, if painful: continuously update to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kernel.org/&amp;#34;&amp;gt;latest kernel release&amp;lt;/a&amp;gt; , either major or stable. Tracking major releases means gaining &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://outflux.net/blog/?s=%22security&#43;things%22&amp;#34;&amp;gt;security improvements&amp;lt;/a&amp;gt; along with bug fixes, while stable releases are bug fixes only. For example, although modern Android phones ship with kernels that are based on major releases from almost &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/devices/architecture/kernel/android-common#compatibility-matrix&amp;#34;&amp;gt;two to four years earlier&amp;lt;/a&amp;gt; , Android vendors do now, thankfully, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/devices/architecture/kernel/releases&amp;#34;&amp;gt;track stable kernel releases&amp;lt;/a&amp;gt; . So even though the features being added to newer major kernels will be missing, all the latest stable kernel fixes are present. Performing continuous kernel updates (major or stable) understandably faces enormous resistance within an organization due to fear of regressions—will the update break the product? The answer is usually that a vendor doesn&amp;amp;#39;t know, or that the update frequency is shorter than their time needed for testing. But the problem with updating is not that the kernel might cause regressions; it&amp;amp;#39;s that vendors don&amp;amp;#39;t have sufficient test coverage and automation to know the answer. Testing must take priority over individual fixes.&amp;lt;br&amp;gt;
Make it happen&amp;lt;br&amp;gt;
One question remains: how to possibly support all the work continuous updates require? As it turns out, it’s a simple resource allocation problem, and is more easily accomplished than might be imagined: downstream redundancy can be moved into greater upstream collaboration.&amp;lt;br&amp;gt;
More engineers for fixing bugs earlier&amp;lt;br&amp;gt;
With vendors using old kernels and backporting existing fixes, their engineering resources are doing redundant work. For example, instead of 10 companies each assigning one engineer to backport the same fix independently, those developer hours could be shifted to upstream work where 10 separate bugs could be fixed for everyone in the Linux ecosystem. This would help address the growing backlog of bugs. Looking at just one source of potential kernel security flaws, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://syzkaller.appspot.com/upstream&amp;#34;&amp;gt;syzkaller dashboard&amp;lt;/a&amp;gt; shows the number of open bugs is currently approaching 900 and growing by about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://web.archive.org/web/20200812135009/https://syzkaller.appspot.com/upstream&amp;#34;&amp;gt;100 a year&amp;lt;/a&amp;gt; , even with about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/?qt=grep&amp;amp;q=Reported-by%3A&#43;syzbot%2B&amp;#34;&amp;gt;400 a year&amp;lt;/a&amp;gt; being fixed.&amp;lt;br&amp;gt;
More engineers for code review&amp;lt;br&amp;gt;
Beyond just squashing bugs after the fact, more focus on upstream code review will help stem the tide of their introduction in the first place, with benefits extending beyond just the immediate bugs caught. Capable code &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/718411/&amp;#34;&amp;gt;review bandwidth&amp;lt;/a&amp;gt; is a limited resource. Without enough &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://kernel-recipes.org/en/2016/talks/maintainers-dont-scale/&amp;#34;&amp;gt;people dedicated&amp;lt;/a&amp;gt; to upstream code review and subsystem maintenance tasks, the entire kernel development process bottlenecks. Long-term Linux robustness depends on developers, but especially on effective kernel &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linuxfoundation.org/blog/role-of-a-linux-kernel-maintainer/&amp;#34;&amp;gt;maintainers&amp;lt;/a&amp;gt; . Although there is effort in the industry to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://training.linuxfoundation.org/linux-kernel-development/&amp;#34;&amp;gt;train&amp;lt;/a&amp;gt; new developers, this has been traditionally justified only by the &amp;amp;#34;feature driven&amp;amp;#34; jobs they can get. But focusing only on product timelines ultimately leads Linux into the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Tragedy_of_the_commons&amp;#34;&amp;gt;Tragedy of the Commons&amp;lt;/a&amp;gt; . Expanding the number of maintainers can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://techdebtpolicy.com/tragedy-of-the-commons/&amp;#34;&amp;gt;avoid it&amp;lt;/a&amp;gt; . Luckily the &amp;amp;#34;pipeline&amp;amp;#34; for new maintainers is straightforward. Maintainers are built not only from their depth of knowledge of a subsystem&amp;amp;#39;s technology, but also from their experience with mentorship of other developers and code review. Training new reviewers must become the norm, motivated by making upstream review part of the job. Today&amp;amp;#39;s reviewers become tomorrow&amp;amp;#39;s maintainers. If each major kernel subsystem gained four more dedicated maintainers, we could &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://par.nsf.gov/servlets/purl/10106647&amp;#34;&amp;gt;double productivity&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
More engineers for testing and infrastructure&amp;lt;br&amp;gt;
Along with more reviewers, improving Linux&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kernel.org/doc/html/latest/process/development-process.html&amp;#34;&amp;gt;development workflow&amp;lt;/a&amp;gt; is critical to expanding everyone&amp;amp;#39;s ability to contribute. Linux&amp;amp;#39;s &amp;amp;#34;email only&amp;amp;#34; workflow is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/803619/&amp;#34;&amp;gt;showing its age&amp;lt;/a&amp;gt; , but the upstream development of more automated &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://patchwork.kernel.org/project/netdevbpf/list/&amp;#34;&amp;gt;patch tracking&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://linux.kernelci.org/job/&amp;#34;&amp;gt;continuous integration&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/syzkaller/issues?q=is%3Aissue&#43;is%3Aopen&#43;label%3A%22syzbot&#43;user&#43;request%22&amp;#34;&amp;gt;fuzzing&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/syzkaller/issues/533&amp;#34;&amp;gt;coverage&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kernel.org/doc/html/latest/dev-tools/&amp;#34;&amp;gt;testing&amp;lt;/a&amp;gt; will make the development process significantly more efficient. Additionally, instead of testing kernels after they&amp;amp;#39;re released, it&amp;amp;#39;s more effective to test during development. When tests are performed against unreleased kernel versions (e.g. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git&amp;#34;&amp;gt;linux-next&amp;lt;/a&amp;gt; ) and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://groups.io/g/kernelci/message/1142&amp;#34;&amp;gt;reported upstream&amp;lt;/a&amp;gt; , developers get immediate feedback about bugs. Fixes can be developed before a flaw is ever actually released; it&amp;amp;#39;s always easier to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ministryoftesting.com/dojo/lessons/ten-reasons-why-you-fix-bugs-as-soon-as-you-find-them&amp;#34;&amp;gt;fix a bug earlier than later&amp;lt;/a&amp;gt; . This &amp;amp;#34; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ibrahimatlinux.com/uploads/6/3/9/7/6397792/03.pdf&amp;#34;&amp;gt;upstream first&amp;lt;/a&amp;gt; &amp;amp;#34; approach to product kernel development and testing is extremely efficient. Google has been successfully doing this with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/798147/&amp;#34;&amp;gt;Chrome OS&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lwn.net/Articles/771974/&amp;#34;&amp;gt;Android&amp;lt;/a&amp;gt; for a while now, and is hardly alone in the industry. It means feature development happens against the latest kernel, and devices are similarly tested as close as possible to the latest upstream kernels, all avoiding duplicated &amp;amp;#34;in-house&amp;amp;#34; effort.&amp;lt;br&amp;gt;
More engineers for security and toolchain development&amp;lt;br&amp;gt;
Besides dealing reactively to individual bugs and existing maintenance needs, there is also the need to proactively eliminate entire classes of flaws, so developers cannot introduce these types of bugs ever again. Why fix the same kind of security vulnerability 10 times a year when we can stop it from ever appearing again? Over the last few years, various fragile language features and kernel APIs have been eliminated or replaced (e.g. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/linus/0bb95f80a38f82884693194ea720e9cca5e12ada&amp;#34;&amp;gt;VLAs&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/linus/a035d552a93bb9ef6048733bb9f2a0dc857ff869&amp;#34;&amp;gt;switch fallthrough&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/linus/3d2403fd10a1dbb359b154af41ffed9f2a7520e8&amp;#34;&amp;gt;addr_limit&amp;lt;/a&amp;gt; ). However, there is still plenty &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/KSPP/linux/issues&amp;#34;&amp;gt;more work to be done&amp;lt;/a&amp;gt; . One of the most time-consuming aspects has been the refactoring involved in making these usually invasive and context-sensitive changes across Linux&amp;amp;#39;s 25 million lines of code. Beyond kernel code itself, the compiler and toolchain also need to grow more …</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-201711/</link>
      <pubDate>Mon, 02 Aug 2021 20:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-201711/</guid>
      <description>This brings us to the central challenge of all content tracing proposals so far: to make tracing possible, a tracing system needs to turn every WhatsApp user (including the originator) into a cooperative green circle — regardless of whether users actually want to cooperate with police. Moreover, to prevent users from losing their phones and/or going offline, the system will need to force users to place the necessary tracing information into escrow as soon as they receive content, so it will remain available even if users leave the network or lose their phones.&amp;lt;br&amp;gt;
Not only that, but each of these newly “cooperative” users might even be forced to admit to police that they also forwarded the content. Don’t want to tell the Swedish government that you made fun of their beloved King? Then you’d better not use a system that follows this pattern of enforced traceability.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210802-162352/</link>
      <pubDate>Mon, 02 Aug 2021 16:23:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210802-162352/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130164_2022-audi-e-tron-gt-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Audi E-Tron GT and RS E-Tron GT make electric sexy, but not fun&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129961_2022-volkswagen-id-5-electric-coupe-like-crossover-teased-ahead-of-imminent-debut&amp;#34;&amp;gt;2022 Volkswagen ID.5 electric coupe-like crossover teased ahead of imminent debut&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125333_2022-mercedes-benz-c-class-all-terrain-spy-shots&amp;#34;&amp;gt;2022 Mercedes-Benz C-Class All-Terrain spy shots: Soft-roader wagon coming soon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133085_lincoln-teams-up-with-shinola-for-plush-aviator-concept&amp;#34;&amp;gt;Lincoln teams up with Shinola for plush Aviator concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133055_jay-leno-drives-a-tastefully-updated-1973-mgb&amp;#34;&amp;gt;Jay Leno drives a tastefully updated 1973 MGB&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133082_2022-mercedes-benz-amg-sl-roadster-2022-porsche-cayenne-turbo-gt-final-bugatti-divo-this-week-s-top-photos&amp;#34;&amp;gt;2022 Mercedes-Benz AMG SL Roadster, 2022 Porsche Cayenne Turbo GT, final Bugatti Divo: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-161839/</link>
      <pubDate>Mon, 02 Aug 2021 16:18:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-161839/</guid>
      <description>A few weeks back, the messaging service WhatsApp &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fastcompany.com/90640728/whatsapp-is-suing-the-indian-government-over-traceability-but-what-is-it&amp;#34;&amp;gt;sued the Indian government&amp;lt;/a&amp;gt; over new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://pib.gov.in/PressReleseDetailm.aspx?PRID=1700749&amp;#34;&amp;gt;legislation&amp;lt;/a&amp;gt; that could undermine its end-to-end encryption (E2EE) software. The legislation requires, among other things, that social media and messaging companies must include the ability to “trace” the source of harmful viral content.&amp;lt;br&amp;gt;
This tracing capability has been a major issue in India due to several cases of misinformation content that led to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/politics/2020/02/21/how-misinformation-whatsapp-led-deathly-mob-lynching-india/&amp;#34;&amp;gt;brutal mob attacks&amp;lt;/a&amp;gt; . The ostensible goal of the new legislation is to make it possible for police to track down those who originate or disseminate this content. Put simply, what the authorities say they want is a means to identify a piece of content (for example, a video or a meme) that has gone to a large group of people, and then trace the content back to the WhatsApp account that originally sent it.&amp;lt;br&amp;gt;
I don’t plain to weigh in on whether this policy is a good idea or viable on the merits, nor is it in my wheelhouse to say whether the Indian government is being forthright in their reasons for demanding this capability. (I will express a very grave degree of skepticism that this approach will catch any criminal who is remotely malicious and takes steps to cover their tracks.) In this post I mostly want to talk about the technology implications for encrypted messaging services, and what tracing features might mean for end-to-end encrypted systems like WhatsApp.&amp;lt;br&amp;gt;
This turns out to be a big problem for encrypted communication systems like WhatsApp, in which end-to-end encryption protects the confidentiality of content even from the gaze of the service provider. In WhatsApp, all messages (as well as file attachments) are encrypted directly from sender to recipient, using an encryption key that WhatsApp doesn’t possess. With a few engineering caveats,* tracing content in these systems is very difficult.&amp;lt;br&amp;gt;
But difficult is not the same thing as impossible. A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://faq.whatsapp.com/general/security-and-privacy/what-is-traceability-and-why-does-whatsapp-oppose-it/?lang=en&amp;#34;&amp;gt;recent post by WhatsApp&amp;lt;/a&amp;gt; makes the case that tracing is fundamentally impossible to implement securely in an end-to-end encrypted system. While this claim seems intuitively correct, it’s also kind of unsatisfying. After all, “impossible” is a strong word, and it’s highly dependent on which assumptions you’re making. The problem with imprecise claims is that they invite arguments — and indeed WhatsApp’s claim has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nadim.computer/posts/2021-06-02-traceability.html&amp;#34;&amp;gt;has already been disputed&amp;lt;/a&amp;gt; by some in the field.&amp;lt;br&amp;gt;
The confidentiality of “who sent what” : while the content itself may not be secret, the fact that a given user transmitted a piece of content is still quite sensitive. If I send you a political meme — perhaps the one at right, poking fun at the King of Sweden — then I might not care very much about the secrecy of the meme itself . But I sure might want to hide the fact that I sent it, to avoid retribution by a totalitarian Swedish government.** Proper end-to-end encryption is supposed to protect this sort of expression.&amp;lt;br&amp;gt;
In short: traceability can really screw with the “who sent what” side of content confidentiality. It is a fairly harmless thing for, say, the tyrannical Swedish government to learn that specific memes about the King of Sweden exist. It is very different for them to know that I’ve been sending a lot of them to a specific group of friends.&amp;lt;br&amp;gt;
There are at least two proposals that I’ve seen for adding traceability to E2EE communications schemes, and both start from similar assumptions. They both rely on making changes to the end-users’ client software to ensure that tracing information is stored in “escrow” at the provider every time content is sent from one user to another.&amp;lt;br&amp;gt;
One proposal is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eprint.iacr.org/2019/981&amp;#34;&amp;gt;academic&amp;lt;/a&amp;gt; , and it takes something like the following “strawman” approach:&amp;lt;br&amp;gt;
They will use this key to encrypt a record that contains (A) the content (or a hash of it) and (B) the sender and receiver identities. They will store the encrypted record on WhatsApp’s servers as a kind of “key escrow.” Critically, at this point they will not send WhatsApp the key K .&amp;lt;br&amp;gt;
The sender will transmit the record encryption key K to its recipient, using end-to-end encryption.&amp;lt;br&amp;gt;
When the next user forwards the same content on to another user, it will repeat steps (1-4) and it will also send all the keys generated by previous users.&amp;lt;br&amp;gt;
Now if the police receive a copy of some viral content on an account they control, they will have a list of encryption keys that correspond to everyone in the forwarding chain for that content. They can just go back to WhatsApp with a subpoena, obtain the encrypted records, and use the chain of keys to decrypt them. This will reveal the entire forwarding path back to the originator.&amp;lt;br&amp;gt;
Of course sending thousands of keys along with each forwarded message is kind of a drag, so there are some efficiency optimizations one can use to compress this information. For example, each time a user forwards a message they can store the previous user’s encryption key inside the encrypted record they escrow with WhatsApp. That means if police get one key — corresponding to the last record in a chain — they can decrypt the escrow record, and then they will obtain the key for the previous record in the chain. They can repeat this process until the entire forwarding chain is “unzipped”.&amp;lt;br&amp;gt;
A lazy diagram (at right) shows how this process might work with three participants. Essentially the whole thing is a form of key escrow, with WhatsApp acting as the escrow authority. If the police get included in any chain at all, they (Eve in this diagram) can subpoena WhatsApp to trace the chain back to originator.&amp;lt;br&amp;gt;
Of course, this is a very simple strawman explanation of the ideas: for a more fully-specified (academic) proposal, you can see this paper by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://eprint.iacr.org/2019/981.pdf&amp;#34;&amp;gt;Tyagi, Miers and Ristenpart&amp;lt;/a&amp;gt; . Not only does it support path traceback, but it also lets you figure out who else the message was forwarded to! The cryptography is a bit more optimized, but the security guarantees are roughly the same.&amp;lt;br&amp;gt;
A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20200730005921/https://www.medianama.com/2019/08/223-kamakoti-medianama-whatsapp-traceability-interview/&amp;#34;&amp;gt;second proposal&amp;lt;/a&amp;gt; by Dr V. Kamakoti of IIT Madras is far simpler: it essentially requires each person who originates new content into the network (as opposed to forwarding it) to attach a “watermark” to the content that identifies the account ID of the sender. This also assumes a trustworthy WhatsApp client, of course. Presumably that watermark could be encrypted using a key stored at WhatsApp, so this tracing will at least require the provider’s involvement.&amp;lt;br&amp;gt;
Well if you’re ok with the fact that police can determine the identity of every single person who forwarded a piece of viral content regardless of whether they’re not the originator of that content then, I guess, nothing.&amp;lt;br&amp;gt;
That’s the essence of what the Tyagi, Miers and Ristenpart proposal offers, and frankly I’m not particularly ok with it. Even if I accepted the logic that we should have the means to trace “content originators” — the actual justification governments have offered for building systems like this one — I surely would not want to reveal every random user account that happened to forward the content . That seems like a recipe for persecuting innocent people.&amp;lt;br&amp;gt;
The approaches I describe above rely on a critical assumption: that all participants in the system are going to behave honestly — that is, everyone will run the official WhatsApp client, which will contain logic designed to store an escrow record on WhatsApp’s servers. Nobody in this system will try to bypass this system by running an unofficial client, or by hacking their client to disable the escrow logic.&amp;lt;br&amp;gt;
If you’re willing to make such a strong assumption, why bother with the complicated Tyagi, Miers and Ristenpart proposal? Why not just use the Kamakoti proposal: modify your WhatsApp client to add a small “watermark” to each fresh non-forwarded media file. After all: once you’ve assumed that everyone is running an honest client, you can assume that the content originator will be too — can’t you? This approach would still reveal a lot of information to police, but it wouldn’t reveal the identity of every random person who forwarded the content.&amp;lt;br&amp;gt;
My guess is that Tyagi, Miers and Ristenpart have an answer to this that boils down to something like “maybe you can’t trust the originator to run the correct client, but loads of other people will be running it.” To me this invites a much more detailed discussion about what security assumptions you’re making, and how “bad” the bad guys really are.&amp;lt;br&amp;gt;
Notes : * Some messaging systems implement attachment forwarding by passing a pointer to an existing file that is stored on their servers. This is a nice storage optimization, since it avoids the need to make and store a full duplicate copy of each object whenever the user hits “forward”. The downside of this approach is that it makes tracing relatively easy for providers, since they can see exactly which users accessed a given file. Such optimizations are inimical to private systems and really should be avoided.&amp;lt;br&amp;gt;
** All claims about the Swedish government are fictionalized.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-041959/</link>
      <pubDate>Mon, 02 Aug 2021 04:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-041959/</guid>
      <description>A first thing to keep in mind is that content tracing is not really a natural feature for messaging system. That is, tracing content poses a challenge even for completely unencrypted messaging apps: the kind where service providers can see all data traveling through the system. Tracing back to a content originator requires that the provider must be able to identify a file received at some end-user’s account, and then “chase” the content backwards through time through each user account that forwarded it. Even this description doesn’t quite respect the difficulty of the problem: not every user literally hits a “forward” button to send content onward. Many will save and re-upload a file, which breaks the forwarding chain and can even produce a slightly different file — thanks to the magic of digital compression.&amp;lt;br&amp;gt;
From the user’s side, E2EE systems are supposed to maintain the confidentiality of user communications. Confidentiality is a broad term and can mean a lot of things. In this case it has two specific flavors that are relevant, with names that I just made up now:&amp;lt;br&amp;gt;
I wanted to illustrate this post with  memes about the Swedish monarchy. Unfortunately, it turns out that Swedish Monarchy memes basically suck.&amp;lt;br&amp;gt;
The confidentiality of “who sent what” : while the content itself may not be secret anymore, the fact that a given user transmitted a piece of content is still quite sensitive. If I send you a political meme — perhaps the one at right, poking fun at the King of Sweden — then I might not care very much about the secrecy of the meme itself . But I sure might want to hide the fact that I sent it to you, to avoid retribution by the pro-monarchy Swedish government. Proper end-to-end encryption is supposed to protect this sort of expression.&amp;lt;br&amp;gt;
In short: traceability systems don’t really harm the confidentiality of the “content” itself, since viral memes themselves aren’t usually a big secret. What it does impact is the “who sent what” side of confidentiality. It is a fairly harmless thing for, say, the tyrannical Swedish government to learn that specific memes about the King of Sweden exist. It is very different for them to know that I’ve been sending a lot of them to a specific group of friends.&amp;lt;br&amp;gt;
Finally I need to clarify one more thing, since discussions with colleagues have made me realize that it is not obvious. Information revealed about “who sent what” in an E2E system is not the same as metadata. I feel stupid having to point this out, but metadata (information about data that we can’t easily hide from providers, such as the list of contacts you’ve communicated with) is a very different thing. WhatsApp might inevitably learn that I texted 500 people last month because they delivered my (encrypted) messages. They still shouldn’t learn that any of my messages are making fun of the Swedish monarchy.&amp;lt;br&amp;gt;
While confidentiality and traceability may seem like they’re in conflict, it’s important to point out that some forms of tracing can be implemented in a non-coercive way that does not inherently violate confidentiality. For example, imagine Alice originates a meme, and this meme subsequently makes its way to police officer Eve via the following forwarding path:&amp;lt;br&amp;gt;
Provided that Bob, Charlie and Dave are willing to cooperate with the police, then Eve can use shoe-leather detective work to trace the content backwards towards Alice. After all: each participant (1) is an authorized recipient of the data and (2) knows who they received the content from. Nobody is “breaking” E2E if they perform this sort of cooperative tracing: it’s just people sharing information they’re already entitled to have.&amp;lt;br&amp;gt;
By passing these laws, police are tacitly admitting that voluntary content tracing is not sufficient to met their investigative needs. This implies that when police try to follow a chain like the one shown above, they’re running into people who are either (1) unwilling to share this information in a timely way, or (2) simply don’t have the information anymore — maybe because they deleted the messages or lost their phone.&amp;lt;br&amp;gt;
The prevalance of uncooperative nodes in the above graph makes it virtually impossible for cooperative tracing to find the originator. It seems obvious that real-world situations like this will make voluntary tracing very difficult to achieve.&amp;lt;br&amp;gt;
This brings us to the central challenge of all content tracing proposals so far: to make tracing possible, a tracing system needs to turn every WhatsApp user into a cooperative green circle — regardless of whether users actually want to cooperate with police. Moreover, to prevent users from losing their phones and/or going offline, the system will need to force users to place the necessary tracing information into escrow as soon as they receive content, so it will remain available even if users leave the network or lose their phones.&amp;lt;br&amp;gt;
Both proposals take something like the following “strawman” approach:&amp;lt;br&amp;gt;
Each time someone sends content to another user, they will generate some fresh encryption key K .&amp;lt;br&amp;gt;
Frankly I’m not particularly ok with that. Even if I was willing to bend to the logic that we should have the means to trace “content originators” — the actual justification governments have offered for building systems like this one — I surely would not want to reveal every random user account that happened to forward the content . That information just seems like a recipe for oppression.&amp;lt;br&amp;gt;
The approach I described above relies on a critical assumption: that all participants in the system are going to behave honestly — that is, everyone will run the official WhatsApp client, which will contain logic designed to store an escrow record on WhatsApp’s servers. Nobody in this system will try to bypass this system by running an unofficial client, or by hacking their client to disable the escrow logic.&amp;lt;br&amp;gt;
If you’re willing to make such a strong assumption, why bother building such a complicated system? Why not modify your WhatsApp client to add a small “watermark” to each fresh non-forwarded media file, a watermark that identifies the account ID of the original sender? (If you’re worried about confidentiality, you could encrypt this using a key held by WhatsApp.) After all: once you’ve assumed that everyone is running an honest client, you can assume that the content originator will be too — can’t you? This approach would still reveal a lot of information to police, but it wouldn’t reveal the identity of every random person who forwarded the content.&amp;lt;br&amp;gt;
I’m sure there is some convenient answer to this, but my suspicion is that it once you try to explore the question deeply, the answer is going to make a hash of your very simple security assumptions. That’s why life is complicated.&amp;lt;br&amp;gt;
If you read this far to answer the (rarified) question of how traceability could work and whether it breaks E2E encryption, then you can stop here. The rest of this post is not about that. It’s just me alienating a whole bunch of my academic peers.&amp;lt;br&amp;gt;
Here is what I want to say to them.&amp;lt;br&amp;gt;
The debate around key escrow and law enforcement surveillance is a very hard one. People have a lot of opinions about whether this work is “helping the good guys” or “helping the bad guys”, i.e., whether it’s about helping police find criminals, or whether it’s going to build the infrastructure for authoritarianism and spying. I don’t know the answer to this. I suppose the answer depends to some extent on the integrity of the government(s) that are implementing them. I have opinions, but I don’t expect all of my colleagues to share them.&amp;lt;br&amp;gt;
What I would ask my colleagues to think hard about is the following:&amp;lt;br&amp;gt;
When you propose (or review a paper that proposes) a new “lawful access” system, is it solving the hard problems, or is it punting on the hard problems and solving only the easy ones?&amp;lt;br&amp;gt;
Because at the end of the day, building systems that violate the confidentiality of E2E encryption is a relatively easy problem from a scientific perspective. We’ve known how to build &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dl.acm.org/doi/abs/10.1145/227234.227239&amp;#34;&amp;gt;key escrow systems&amp;lt;/a&amp;gt; from the earliest days of encryption. Building these systems is not interesting, scientifically. It is useful from an engineering perspective, of course — to parties who want to deploy such systems. When respected academics write such papers, it is also politically useful to those same parties.&amp;lt;br&amp;gt;
What is scientifically interesting is whether we can build systems that  actually prevent abuse, either by governments that misuse the technology or by criminals who steal keys. We don’t really know to do that very well right now. This is the actual scientific problem of designing law enforcement access systems — not the “access” part, which is relatively easy and mostly consists of engineering. In short, the scientific problem is figuring out how to prevent the wrong type of access.&amp;lt;br&amp;gt;
When I read a paper that builds a sophisticated surveillance system, I expect it to address those abuse problems in a meaningful way. If the paper punts the important problems to subsequent work — if what I get is a paragraph like the one at right — my thinking is that you aren’t solving the right problem. You’re just laying the engineering groundwork for a world I don’t want my kids to live in. I would politely ask you all to stop doing that.&amp;lt;br&amp;gt;
By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/author/matthewdgreen/&amp;#34;&amp;gt;Matthew Green&amp;lt;/a&amp;gt; in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/backdoors/&amp;#34;&amp;gt;backdoors&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/08/01/thinking-about-traceability/&amp;#34;&amp;gt;August 1, 2021 August 2, 2021&amp;lt;/a&amp;gt; 3,248 Words &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/08/01/thinking-about-traceability/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-002025/</link>
      <pubDate>Mon, 02 Aug 2021 00:20:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210802-002025/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/06/07/thinking-about-traceability/&amp;#34;&amp;gt;Thinking about “traceability”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A few weeks ago the messaging service WhatsApp &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.fastcompany.com/90640728/whatsapp-is-suing-the-indian-government-over-traceability-but-what-is-it&amp;#34;&amp;gt;sued the Indian government&amp;lt;/a&amp;gt; over new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://pib.gov.in/PressReleseDetailm.aspx?PRID=1700749&amp;#34;&amp;gt;legislation&amp;lt;/a&amp;gt; that could undermine its end-to-end encryption (E2EE) software. The legislation requires, among other things, that social media and messaging companies must include the ability to “trace” the source of harmful viral content.&amp;lt;br&amp;gt;
This tracing capability has been a major issue in India due to several cases of misinformation content that led to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/politics/2020/02/21/how-misinformation-whatsapp-led-deathly-mob-lynching-india/&amp;#34;&amp;gt;brutal mob attacks&amp;lt;/a&amp;gt; . The ostensible goal of the new legislation is to make it possible for police to track down those who originate or disseminate this content. Put simply, what the authorities want is a means to identify a piece of content (say, a video or a meme) that has gone to a large group of people, and then trace the content back to the WhatsApp account that originally sent it.&amp;lt;br&amp;gt;
I don’t plain to weigh in very heavily about whether this policy is a good idea or viable on the merits — except to express a very grave degree of skepticism that this approach will every catch a criminal who is remotely clever. Here I just want to talk about the technology implications for encrypted messaging services, and what tracing features might mean for end-to-end encrypted systems like WhatsApp.&amp;lt;br&amp;gt;
Why is content tracing hard in the first place?&amp;lt;br&amp;gt;
A first thing to keep in mind is that content tracing is not really a natural feature for messaging system. That is, tracing content poses a challenge even for completely unencrypted messaging apps: the kind where service providers can see all data traveling through the system. Tracing back to a content originatorsrequires that the provider must be able to identify a file received at some end-user’s account, and then “chase” the content backwards through time through each user account that forwarded it. Even this description doesn’t quite respect the difficulty of the problem: not every user literally hits a “forward” button to send content onward. Many will save and re-upload a file, which breaks the forwarding chain and can even produce a slightly different file — thanks to the magic of digital compression.&amp;lt;br&amp;gt;
These problems aren’t intractable. In a system with no end-to-end encryption, they could perhaps be solved using &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.phash.org/&amp;#34;&amp;gt;perceptual hash functions&amp;lt;/a&amp;gt; that identify similar media files by constructing a “fingerprint” of each file that can easily be compared against other files, and can survive re-encoding or minor edits. (This is the same technology that’s used in detecting child sexual abuse imagery, something I wrote about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2019/12/08/on-client-side-media-scanning/&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .) What’s important is that even with this technology, the obvious approach to content tracing requires the provider to have plaintext access to (at least the hashes of) user content.&amp;lt;br&amp;gt;
This turns out to be a big problem for encrypted communication systems like WhatsApp, which use end-to-end encryption to protect the confidentiality of content even from the gaze of the service provider. In WhatsApp, all messages (as well as file attachments) are encrypted from sender to recipient, using an encryption key that WhatsApp doesn’t learn. With a few engineering caveats,* tracing content in these systems is very difficult.&amp;lt;br&amp;gt;
But difficult is not the same thing as impossible. A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://faq.whatsapp.com/general/security-and-privacy/what-is-traceability-and-why-does-whatsapp-oppose-it/?lang=en&amp;#34;&amp;gt;recent post by WhatsApp&amp;lt;/a&amp;gt; makes the case that tracing is fundamentally impossible to implement securely in an end-to-end encrypted system. While this claim seems intuitively correct, it’s also kind of unsatisfying. After all, “impossible” is a strong word, and it’s highly dependent on assumptions. The problem with imprecise claims is that they invite arguments — and indeed WhatsApp’s claim has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nadim.computer/posts/2021-06-02-traceability.html&amp;#34;&amp;gt;has already been disputed&amp;lt;/a&amp;gt; by some in the field.&amp;lt;br&amp;gt;
In this post I’m going to consider the following simple question: is traceability in end-to-end encrypted systems actually possible? And if so, what are the costs to privacy and security? For the record: I’m writing this post as much to answer the question for myself as to answer it for anyone else, so don’t expect this to be short or simple. I’m working things out as I go along.&amp;lt;br&amp;gt;
Let’s start with the most basic question.&amp;lt;br&amp;gt;
What is “traceability” in an end-to-end encrypted system?&amp;lt;br&amp;gt;
The biggest problem with the debate over content tracing is that nobody seems to have a terribly rigorous definition of what, precisely an end-to-end encrypted tracing scheme is supposed to do — or more precisely, what its limits will be. To understand whether these systems can be built, we need to think hard about what they’re supposed to do in the first place.&amp;lt;br&amp;gt;
From the perspective of law enforcement, content tracing is a simple feature. A piece of “viral” content (say an image file) has been widely distributed through a messaging platform, and authorities have decided that this content is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theguardian.com/world/2018/jul/03/whatsapp-murders-india-struggles-to-combat-crimes-linked-to-messaging-service&amp;#34;&amp;gt;harmful&amp;lt;/a&amp;gt; . Since the content is widespread, we can assume that police have received a copy of the file at an account they control (e.g., their own accounts, or the account of a cooperating user.) The authorities wish to contact the service provider and ask them for the originator and/or major spreaders of the content. This gives us our first requirement:&amp;lt;br&amp;gt;
Traceability: given a piece of “viral” content received by a device/account (plus any cryptographic keys at the device), a tracing scheme should be able to reliably trace the content back to the originator (or at least, earlier) accounts.&amp;lt;br&amp;gt;
From the user’s side, E2EE systems are supposed to maintain the confidentiality of user communications. Confidentiality is a broad term. In this case it has two specific flavors that are relevant, with names that I just made up now:&amp;lt;br&amp;gt;
I decided to illustrate this post with  memes about the Swedish monarchy, on the theory that everyone has strong feelings about the King of Sweden they want to keep to themselves. Unfortunately, all the memes I was able to find turned out to be hokey, as if the Swedes don’t even have controversial things to say about their monarchy.&amp;lt;br&amp;gt;
The confidentiality of the content itself : this ensures that forwarded files are known only to the sender and authorized recipients(s) of a conversation. Notice that for viral content, this property isn’t terribly important. Remember: our assumption is that the content itself has ultimately been forwarded widely, until (nearly) everyone has received a copy.&amp;lt;br&amp;gt;
The confidentiality of “who sent what” : while the content itself may not be secret anymore, the fact that a given user transmitted a piece of content is still quite sensitive. If I send you a political meme — perhaps one poking fun at an authoritarian ruler such as the King of Sweden — then I might not care very much about the secrecy of the meme itself . But I sure might want to hide the fact that I sent it to you. Proper end-to-end encryption is supposed to ensure this.&amp;lt;br&amp;gt;
Traceability does not generally impact the confidentiality of the “content” itself when it comes to viral memes, since the memes themselves aren’t the secret. What it does impact is the “who sent what” side of confidentiality. It is a fairly harmless thing for, say, the tyrannical Swedish government to learn that memes about the King of Sweden exist. It is very different for them to know that I’ve been sending a lot of them to a specific group of friends.&amp;lt;br&amp;gt;
Finally I need to clarify one more thing, since discussions with colleagues have made me realize that it is not obvious. Revealing information about “who sent what” in an E2E system is not the same as leaking metadata. I feel stupid having to point this out, but metadata (information that we can’t easily hide from providers, such as the list of contacts you’ve communicated with) is a very different thing. WhatsApp might inevitably know that I texted 500 people last month because they delivered my (encrypted) messages. They shouldn’t learn which of my messages are making fun of the Swedish monarchy.&amp;lt;br&amp;gt;
So can traceability be accomplished without breaking E2E?&amp;lt;br&amp;gt;
It really depends what you mean by “traceability” and what you mean by “breaking.”&amp;lt;br&amp;gt;
While confidentiality and traceability may seem like they’re in conflict, it’s important to point out that some forms of tracing can be voluntary , and does not inherently need to violate anyone’s confidentiality. For example, imagine Alice sends a meme to Bob, and this meme makes its way to police officer Eve via the following forwarding path:&amp;lt;br&amp;gt;
Provided that Bob, Charlie and Dave are willing to cooperate with the police, then Eve can use shoe-leather detective work to trace the content backwards towards Alice. After all: each participant is (1) an authorized recipient and (2) knows who they received the content from. Nobody is “breaking” E2E if they perform this sort of cooperative tracing: it’s just people sharing information they’re already entitled to have.&amp;lt;br&amp;gt;
It’s now time to say a stupid and obvious thing: what’s being proposed in India is not cooperative tracing .&amp;lt;br&amp;gt;
Let’s be clear: if detective work and cooperation was sufficient to trace the originators of harmful content, the  police wouldn’t be asking for new encryption laws, and WhatsApp wouldn’t be suing the Indian government.&amp;lt;br&amp;gt;
By passing these laws, police are tacitly admitting that voluntary content tracing is not sufficient to met their investigative needs. This implies that when police try to follow a chain like the one shown above, they’re running into people who are either (1) unwilling to share this information , (2) simply don’t have the information anymore — maybe because they deleted the messages or lost their phone, or (3) won’t turn it over in a timely way.&amp;lt;br&amp;gt;
Let’s draw a picture of this situation. Below, each node represents a WhatsApp account, with the red node being the originator of some viral content, and the blue node representing police. Green nodes represent users who are willing to cooperate with the police, provided they are contacted. Here the gray nodes are users who won’t cooperate — either because they didn’t keep the information, or maybe because they just don’t like police.&amp;lt;br&amp;gt;
Police (blue) can try to cooperatively trace …</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210801-200933/</link>
      <pubDate>Sun, 01 Aug 2021 20:09:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210801-200933/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/best-postgresql-guis-in-2020/&amp;#34;&amp;gt;Best PostgreSQL GUIs in 2021 (Updated) This post walks through the best GUIs available for querying your Postgres data.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210801-162443/</link>
      <pubDate>Sun, 01 Aug 2021 16:24:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210801-162443/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133058_megarexx-megaraptor-is-the-ford-f-250-super-duty-in-raptor-form&amp;#34;&amp;gt;MegaRexx MegaRaptor is the Ford F-250 Super Duty in Raptor form&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133038_here-s-batman-s-new-batcycle-from-the-flash&amp;#34;&amp;gt;Here&amp;amp;#39;s Batman&amp;amp;#39;s new Batcycle from &amp;amp;#34;The Flash&amp;amp;#34;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210801-121918/</link>
      <pubDate>Sun, 01 Aug 2021 12:19:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210801-121918/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/04/02/truecrypt-report/&amp;#34;&amp;gt;Truecrypt report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210731-161912/</link>
      <pubDate>Sat, 31 Jul 2021 16:19:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210731-161912/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/with-help-from-google-impersonated-brave-com-website-pushes-malware/&amp;#34;&amp;gt;With help from Google, impersonated Brave.com website pushes malware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
With a valid TLS certificate, faux Bravė.com could fool even security-savvy people.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210731-081610/</link>
      <pubDate>Sat, 31 Jul 2021 08:16:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210731-081610/</guid>
      <description>=delete&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#template-metaprogramming&amp;#34;&amp;gt;template-metaprogramming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
(Hat tip to Louis Dionne and Tim Song for bringing this up
in a libc&#43;&#43; review, and then explaining it enough that I
think I got it.)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210731-042452/</link>
      <pubDate>Sat, 31 Jul 2021 04:24:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210731-042452/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133076_2022-chevrolet-copo-572-camaro-debuts-with-new-big-block-v-8&amp;#34;&amp;gt;2022 Chevrolet COPO 572 Camaro debuts with new big-block V-8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133067_1995-jaguar-xj220-headed-to-auction-1-of-4-painted-daytona-black&amp;#34;&amp;gt;1995 Jaguar XJ220 headed to auction, 1 of 4 painted Daytona Black&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210731-042342/</link>
      <pubDate>Sat, 31 Jul 2021 04:23:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210731-042342/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/11/25/teaching-abstraction/&amp;#34;&amp;gt;Teaching abstraction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210731-000924/</link>
      <pubDate>Sat, 31 Jul 2021 00:09:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210731-000924/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-and-firebase/&amp;#34;&amp;gt;Build tools and admin panels on top of Firebase When it comes to building apps, Firebase takes care of pretty much anything you can think of: real-time database storage, cloud object storage, authentication, web hosting, serverless functions, analytics, monitoring, machine learning, notifications,&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210730-200832/</link>
      <pubDate>Fri, 30 Jul 2021 20:08:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210730-200832/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/brush-up-on-your-mod-know-how-with-new-dma-articles-924531c5f5a8?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Brush Up On Your Mod Know-How With New DMA Articles&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/brush-up-on-your-mod-know-how-with-new-dma-articles-924531c5f5a8?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Brush Up On Your Mod Know-How With New DMA Articles The Mod Academy gains over fifteen new articles, going over even more topics to help you bring your moderating game to the next level.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210730-162706/</link>
      <pubDate>Fri, 30 Jul 2021 16:27:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210730-162706/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133066_rare-shelby-series-1-heads-to-auction&amp;#34;&amp;gt;Rare Shelby Series 1 heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210730-160906/</link>
      <pubDate>Fri, 30 Jul 2021 16:09:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210730-160906/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-is-low-code/&amp;#34;&amp;gt;What is low code? A comprehensive guide Low code and no code have equal amounts of hype and skepticism.  On the one hand, it’s clear low code has market traction: in April 2021, a provider of low code automation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210730-122622/</link>
      <pubDate>Fri, 30 Jul 2021 12:26:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210730-122622/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131174_glickenhaus-reveals-baja-ready-pickup-concept-fueled-by-hydrogen&amp;#34;&amp;gt;Glickenhaus reveals Baja-ready pickup concept fueled by hydrogen&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133063_2022-bentley-flying-spur-hybrid-odyssean-edition-marks-electrified-sedan-s-launch&amp;#34;&amp;gt;2022 Bentley Flying Spur Hybrid Odyssean Edition marks electrified sedan&amp;amp;#39;s launch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132750_2022-subaru-wrx-2022-mercedes-benz-sl-roadster-mclaren-765lt-spider-today-s-car-news&amp;#34;&amp;gt;2022 Subaru WRX, 2022 Mercedes-Benz SL Roadster, McLaren 765LT Spider: Today&amp;amp;#39;s Car News&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210730-122152/</link>
      <pubDate>Fri, 30 Jul 2021 12:21:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210730-122152/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/&amp;#34;&amp;gt;Software downloaded 30,000 times from PyPI ransacked developers’ machines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Expect to see more of these &amp;amp;#34;Frankenstein&amp;amp;#34; malware packages, researchers warn.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/new-bank-fraud-malware-called-vultur-infects-thousands-of-devices/&amp;#34;&amp;gt;New bank-fraud malware called Vultur infects thousands of devices&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Screen sharing courtesy of VNC mirrors device screens to attacker-controlled servers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210730-081417/</link>
      <pubDate>Fri, 30 Jul 2021 08:14:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210730-081417/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/17/Music-Notes&amp;#34;&amp;gt;Music Notes&amp;lt;/a&amp;gt; · Herewith notes on what I’m listening to in 2021, and why that’s a problem.  With recommendations both for music and for     things we can do to keep it alive &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/17/Music-Notes&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [11 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20210730-080622/</link>
      <pubDate>Fri, 30 Jul 2021 08:06:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20210730-080622/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/07/30/meet-buttons.html&amp;#34;&amp;gt;Google Meet buttons&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210730-001712/</link>
      <pubDate>Fri, 30 Jul 2021 00:17:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210730-001712/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/programming-note-what-ive-learned&amp;#34;&amp;gt;What I’ve Learned In A Year On Substack&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/programming-note-what-ive-learned&amp;#34;&amp;gt;This thing is for real. The incentives are right. The community is the key. And I&amp;#39;ll be back after Labor Day.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210730-000704/</link>
      <pubDate>Fri, 30 Jul 2021 00:07:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210730-000704/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/the-life-cycle-of-a-breached-database/&amp;#34;&amp;gt;The Life Cycle of a Breached Database&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here’s a closer look at what typically transpires in the weeks or months before an organization notifies its users about a breached database.&amp;lt;br&amp;gt;
Our continued reliance on passwords for authentication has contributed to one toxic data spill or hack after another. One might even say passwords are the fossil fuels powering most IT modernization: They’re ubiquitous because they are cheap and easy to use, but that means they also come with significant trade-offs — such as polluting the Internet with weaponized data when they’re leaked or stolen en masse.&amp;lt;br&amp;gt;
When a website’s user database gets compromised, that information invariably turns up on hacker forums. There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords.&amp;lt;br&amp;gt;
How successful this password cracking is depends a great deal on the length of one’s password and the type of password hashing algorithm the victim website uses to obfuscate user passwords. But a decent crypto-mining rig can quickly crack a majority of password hashes generated with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/MD5&amp;#34;&amp;gt;MD5&amp;lt;/a&amp;gt; (one of the weaker and more commonly-used password hashing algorithms).&amp;lt;br&amp;gt;
“You hand that over to a person who used to mine Ethereum or Bitcoin, and if they have a large enough dictionary [of pre-computed hashes] then you can essentially break 60-70 percent of the hashed passwords in a day or two,” said Fabian Wosar , chief technology officer at security firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.emsisoft.com&amp;#34;&amp;gt;Emsisoft&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
From there, the list of email addresses and corresponding cracked passwords will be run through various automated tools that can check how many email address and password pairs in a given leaked data set also work at other popular websites (and heaven help &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2013/06/the-value-of-a-hacked-email-account/&amp;#34;&amp;gt;those who’ve re-used their email password elsewhere&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
This sifting of databases for low-hanging fruit and password re-use most often yields less than a one percent success rate — and usually far less than one percent.&amp;lt;br&amp;gt;
But even a hit rate below one percent can be a profitable haul for fraudsters, particularly when they’re password testing databases with millions of users. From there, the credentials are eventually used for fraud and resold in bulk to legally murky online services that index and resell access to breached data.&amp;lt;br&amp;gt;
Much like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=weleakinfo&amp;#34;&amp;gt;WeLeakInfo&amp;lt;/a&amp;gt; and others operated before being shut down by law enforcement agencies, these services sell access to anyone who wants to search through billions of stolen credentials by email address, username, password, Internet address, and a variety of other typical database fields.&amp;lt;br&amp;gt;
TARGETED PHISHING&amp;lt;br&amp;gt;
So hopefully by this point it should be clear why re-using passwords is generally a bad idea. But the more insidious threat with hacked databases comes not from password re-use but from targeted phishing activity in the early days of a breach, when relatively few ne’er-do-wells have got their hands on a hot new hacked database.&amp;lt;br&amp;gt;
Earlier this month, customers of the soccer jersey retailer classicfootballshirts.co.uk started receiving emails with a “cash back” offer. The messages addressed customers by name and referenced past order numbers and payment amounts tied to each account. The emails encouraged recipients to click a link to accept the cash back offer, and the link went to a look-alike domain that requested bank information.&amp;lt;br&amp;gt;
The targeted phishing message that went out to classicfootballshirts.co.uk customers this month.&amp;lt;br&amp;gt;
“It soon became clear that customer data relating to historic orders had been compromised to conduct this attack,” Classicfootballshirts said in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.classicfootballshirts.co.uk/data-statement&amp;#34;&amp;gt;a statement&amp;lt;/a&amp;gt; about the incident. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/the-life-cycle-of-a-breached-database/#more-56301&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210729-201928/</link>
      <pubDate>Thu, 29 Jul 2021 20:19:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210729-201928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/29/technology/activision-walkout-metoo-call-of-duty.html&amp;#34;&amp;gt;Activision, Facing Internal Turmoil, Grapples With #MeToo Reckoning More than 1,500 employees for the video game giant, which is facing an explosive state lawsuit, have called for executives to take sexual harassment seriously. By Kellen Browning and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210729-162115/</link>
      <pubDate>Thu, 29 Jul 2021 16:21:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210729-162115/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133051_land-rover-celebrates-camel-trophy-past-with-2022-defender-trophy-edition&amp;#34;&amp;gt;Land Rover celebrates Camel Trophy past with 2022 Defender Trophy Edition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210729-122033/</link>
      <pubDate>Thu, 29 Jul 2021 12:20:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210729-122033/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1050005_fisker-to-show-production-intent-ocean-prototype-at-2021-los-angeles-auto-show&amp;#34;&amp;gt;Fisker to show production-intent Ocean prototype at 2021 Los Angeles Auto Show&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133048_trio-of-special-race-cars-mark-50th-anniversary-of-mercedes-benz-amg-s-historic-spa-victory&amp;#34;&amp;gt;Trio of special race cars mark 50th anniversary of Mercedes-Benz AMG&amp;amp;#39;s historic Spa victory&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133047_audi-to-preview-future-of-luxury-performance-with-sky-sphere-concept&amp;#34;&amp;gt;Audi to preview future of luxury performance with Sky Sphere concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132752_2022-subaru-wrx-to-debut-at-2021-new-york-auto-show&amp;#34;&amp;gt;2022 Subaru WRX to debut at 2021 New York auto show&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210729-121740/</link>
      <pubDate>Thu, 29 Jul 2021 12:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210729-121740/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/&amp;#34;&amp;gt;Feds list the top 30 most exploited vulnerabilities. Many are years old&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hackers continue to exploit publicly known—and often dated—software vulnerabilities.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210729-002153/</link>
      <pubDate>Thu, 29 Jul 2021 00:21:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210729-002153/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/28/business/facebook-q2-earnings.html&amp;#34;&amp;gt;Facebook’s profit surges 101 percent on strong ad sales. Advertising revenue, which continues to be the bulk of Facebook’s income, rose 56 percent to $28.6 billion, easily surpassing Wall Street expectations. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-202305/</link>
      <pubDate>Wed, 28 Jul 2021 20:23:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-202305/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133040_uk-firm-makes-an-electric-1971-citroen-ds&amp;#34;&amp;gt;UK firm makes an electric 1971 Citroen DS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-162205/</link>
      <pubDate>Wed, 28 Jul 2021 16:22:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-162205/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1112697_hennessey-celebrates-30-years-with-final-run-of-1-000-hp-exorcist-camaro-zl1&amp;#34;&amp;gt;Hennessey celebrates 30 years with final run of 1,000-hp Exorcist Camaro ZL1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1127739_2023-porsche-cayenne-coupe-spy-shots-and-video&amp;#34;&amp;gt;2023 Porsche Cayenne Coupe spy shots and video: Major changes pegged for mid-cycle refresh&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133036_new-defender-ready-for-bowler-defender-challenge-one-make-rally-series&amp;#34;&amp;gt;New Defender ready for Bowler Defender Challenge one-make rally series&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210728-161813/</link>
      <pubDate>Wed, 28 Jul 2021 16:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210728-161813/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/28/technology/state-facebook-antitrust-lawsuit.html&amp;#34;&amp;gt;States say they will appeal the dismissal of their Facebook antitrust suit. A federal judge eviscerated arguments by more than 40 state attorneys general that Facebook had a monopoly. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-122219/</link>
      <pubDate>Wed, 28 Jul 2021 12:22:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210728-122219/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133035_ford-honors-women-airforce-service-pilots-with-special-mustang-mach-e&amp;#34;&amp;gt;Ford honors Women Airforce Service Pilots with special Mustang Mach-E&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210728-121945/</link>
      <pubDate>Wed, 28 Jul 2021 12:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210728-121945/</guid>
      <description>July 28, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/28/The-next-YAML.html&amp;#34;&amp;gt;My wish-list for the next YAML&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210728-121848/</link>
      <pubDate>Wed, 28 Jul 2021 12:18:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210728-121848/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/july-has-already-brought-us-2-new-ransomware-groups-hunting-for-big-game/&amp;#34;&amp;gt;Haron and BlackMatter are the latest groups to crash the ransomware party&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The additions come as the number of high-severity ransomware attacks ratchet up.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-202203/</link>
      <pubDate>Tue, 27 Jul 2021 20:22:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-202203/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133019_richard-hammond-plans-classic-car-restoration-show&amp;#34;&amp;gt;Richard Hammond plans classic-car restoration show&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133018_tom-hanks-1980-toyota-fj40-land-cruiser-heads-to-auction&amp;#34;&amp;gt;Tom Hanks&amp;amp;#39; 1980 Toyota FJ40 Land Cruiser heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-162248/</link>
      <pubDate>Tue, 27 Jul 2021 16:22:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-162248/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128969_2023-mercedes-benz-eqs-suv-spy-shots-video&amp;#34;&amp;gt;2023 Mercedes-Benz EQS SUV spy shots: Electric crossover to join S-Class family&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133022_mclaren-765lt-spider-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: McLaren 765LT Spider drops the top on hardcore supercar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132650_toyota-reveals-more-of-its-redesigned-2022-tundra&amp;#34;&amp;gt;Toyota reveals more of its redesigned 2022 Tundra&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132982_jay-leno-drives-a-quirky-1967-panhard-24-bt&amp;#34;&amp;gt;Jay Leno drives a quirky 1967 Panhard 24 BT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210727-161627/</link>
      <pubDate>Tue, 27 Jul 2021 16:16:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210727-161627/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/a-new-chapter-for-googles-vulnerability.html&amp;#34;&amp;gt;A new chapter for Google’s Vulnerability Reward Program&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Jan Keller, Technical Program Manager, Google VRP&amp;lt;br&amp;gt;
A little over &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2010/11/rewarding-web-application-security.html&amp;#34;&amp;gt;10 years ago&amp;lt;/a&amp;gt; , we launched our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.google.com/about/appsecurity/reward-program/&amp;#34;&amp;gt;Vulnerability Rewards Program&amp;lt;/a&amp;gt; (VRP). Our goal was to establish a channel for security researchers to report bugs to Google and offer an efficient way for us to thank them for helping make Google, our users, and the Internet a safer place. To recap our progress on these goals, here is a snapshot of what VRP has accomplished with the community over the past 10 years:&amp;lt;br&amp;gt;
Total bugs rewarded: 11,055&amp;lt;br&amp;gt;
Number of rewarded researchers : 2,022&amp;lt;br&amp;gt;
Representing 84 different countries&amp;lt;br&amp;gt;
Total rewards: $29,357,516&amp;lt;br&amp;gt;
To celebrate our anniversary and ensure the next 10 years are just as (or even more) successful and collaborative, we are excited to announce the launch of our new platform, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bughunters.google.com/&amp;#34;&amp;gt;bughunters.google.com&amp;lt;/a&amp;gt; . This new site brings all of our VRPs (Google, Android, Abuse, Chrome and Play) closer together and provides a single intake form that makes it easier for bug hunters to submit issues. Other improvements you will notice include:&amp;lt;br&amp;gt;
More opportunities for interaction and a bit of healthy competition through gamification, per-country leaderboards, awards/badges for certain bugs and more!&amp;lt;br&amp;gt;
A more functional and aesthetically pleasing leaderboard. We know a lot of you are using your achievements in the VRP to find jobs ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://careers.google.com/?src=Online%2FHouse%20Ads%2FBKWS%27&amp;#34;&amp;gt;we’re hiring!&amp;lt;/a&amp;gt; ) and we hope this acts as a useful resource.&amp;lt;br&amp;gt;
A stronger emphasis on learning: Bug hunters can improve their skills through the content available in our new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/bhu&amp;#34;&amp;gt;Bug Hunter University&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Streamlined publication process: we know the value that knowledge sharing brings to our community. That’s why we want to make it easier for you to publish your bug reports.&amp;lt;br&amp;gt;
Swag will now be supported for special occasions (we heard you loud and clear!)&amp;lt;br&amp;gt;
We also want to take a moment to shine a light on some aspects of the VRP that are not yet well-known, such as:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/patchz&amp;#34;&amp;gt;Submitting patches&amp;lt;/a&amp;gt; to open-source software is eligible for a reward&amp;lt;br&amp;gt;
We have &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/paperz&amp;#34;&amp;gt;rewards for research papers&amp;lt;/a&amp;gt; on the security of open source&amp;lt;br&amp;gt;
Your open-source software &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/subsidiz&amp;#34;&amp;gt;might be eligible for a subsidy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
When we launched our very first VRP, we had no idea how many valid vulnerabilities - if any - would be submitted on the first day. Everyone on the team put in their estimate, with predictions ranging from zero to 20. In the end, we actually received more than 25 reports, taking all of us by surprise. Since its inception, the VRP program has not only grown significantly in terms of report volume, but the team of security engineers behind it has also expanded – including almost 20 bug hunters who reported vulnerabilities to us and ended up joining the Google VRP team. That is why we are thrilled to bring you this new platform, continue to grow our community of bug hunters and support the skill development of up-and-coming vulnerability researchers. Thanks again to the entire Google bug hunter community for making our vulnerability rewards program successful. As you continue to play around with the new site and reporting system, tell us about it - we would love to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://twitter.com/googlevrp&amp;#34;&amp;gt;hear your feedback&amp;lt;/a&amp;gt; . Until next time, keep on finding those bugs!&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/vulnerabilities&amp;#34;&amp;gt;vulnerabilities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210727-161604/</link>
      <pubDate>Tue, 27 Jul 2021 16:16:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210727-161604/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#math&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pretty-pictures&amp;#34;&amp;gt;pretty-pictures&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
You’ve heard of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Mandelbrot_set&amp;#34;&amp;gt;Mandelbrot set&amp;lt;/a&amp;gt; , right?
Basically, for each point&amp;lt;br&amp;gt;
c&amp;lt;br&amp;gt;
on the complex plane, we iterate the function&amp;lt;br&amp;gt;
z&amp;lt;br&amp;gt;
=&amp;lt;br&amp;gt;
2&amp;lt;br&amp;gt;
&#43;&amp;lt;br&amp;gt;
and color the point&amp;lt;br&amp;gt;
based on how many steps it takes until&amp;lt;br&amp;gt;
|&amp;lt;br&amp;gt;
≥&amp;lt;br&amp;gt;
(which is known as “diverging” or “escaping”).&amp;lt;br&amp;gt;
I recently learned of another visualization called the
“ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Buddhabrot&amp;#34;&amp;gt;Buddhabrot&amp;lt;/a&amp;gt; ,” originally discovered by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://superliminal.com/fractals/bbrot/&amp;#34;&amp;gt;Melinda Green&amp;lt;/a&amp;gt; . In the Buddhabrot, you
color each complex point&amp;lt;br&amp;gt;
t&amp;lt;br&amp;gt;
based on the number of times that&amp;lt;br&amp;gt;
is visited by
the escaping trajectories of all points&amp;lt;br&amp;gt;
. As Wikipedia says, this produces a
graph of “the probability distribution over the trajectories of points that escape.”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bartosz Ciechanowski</title>
      <link>https://www.whatsupup.com/blog/uprousing/bayed/20210727-161001/</link>
      <pubDate>Tue, 27 Jul 2021 16:10:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/uprousing/bayed/20210727-161001/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski/naval-architecture/&amp;#34;&amp;gt;Naval Architecture&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
When I first heard the term &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Naval_architecture&amp;#34;&amp;gt;naval architecture&amp;lt;/a&amp;gt; I thought it was the artistic practice of designing beautiful boats. It turns out it’s a proper scientific discipline dedicated to the engineering of ships.&amp;lt;br&amp;gt;
Over the course of this article we’ll go over different aspects of naval architecture. I’ll explain how ships are propelled, what makes them stay afloat, and how they’re carefully designed to not tip over even in dynamic conditions:&amp;lt;br&amp;gt;
To understand why a ship rocks side-to-side in the wavy ocean waters, we first have to understand that it’s water itself that’s responsible for all of the ship’s behaviors. We’ll start with a simple device – a water-filled syringe.&amp;lt;br&amp;gt;
Pressure&amp;lt;br&amp;gt;
You’ve probably seen a syringe before. When its plunger is pressed, the contents of the syringe comes out on the other end. In the demonstration below we have a syringe connected through a thin hose to another container that has a spring in it. The entire system is filled with water . As you increase the force on the plunger observe the little spring being compressed at the other end of the hose:&amp;lt;br&amp;gt;
By applying force on the plunger we increase the pressure in the fluid , which in turn pushes the little piston and compresses the spring. We can measure that pressure using a pressure gauge. In the demonstration below the sliders allow you to control the applied force and the area of the plunger:&amp;lt;br&amp;gt;
Observe that the pressure P on the gauge is proportional to the perpendicular input force F , but it’s inversely proportional to the area A . We can tie these three values using the following equation:&amp;lt;br&amp;gt;
P = F / A&amp;lt;br&amp;gt;
In metric system pressure is expressed in pascals (Pa) named after &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Blaise_Pascal&amp;#34;&amp;gt;Blaise Pascal&amp;lt;/a&amp;gt; , while in the imperial system pounds per square inch (psi) are commonly used.&amp;lt;br&amp;gt;
Notice that we no longer have any spring to compress. Even though we’re applying a force the plunger doesn’t move since water, unlike air, is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Properties_of_water#Compressibility&amp;#34;&amp;gt;minimally compressible&amp;lt;/a&amp;gt; . It’s easy to squeeze an empty, tightly screwed plastic bottle, but when filled to the brim with water the bottle won’t budge much. At the pressures we’re applying here, water practically doesn’t change its volume.&amp;lt;br&amp;gt;
With a syringe, we’ve directly applied a force by pushing on the plunger, however, we could recreate that experiment by putting a heavy, tightly fitting weight on top of water in a container. In the demonstration below you can control how heavy the weight is to see how it affects the pressure read by the gauge:&amp;lt;br&amp;gt;
Note that even when we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;remove the weight&amp;lt;/a&amp;gt; the pressure meter shows a non-zero read. The water itself also has weight so its mass above the point of measurement contributes to the readout as well.&amp;lt;br&amp;gt;
Let’s try to quantify the force exerted by the water. Firstly, notice that the shape of the water above the measurement forms a cylinder with height h and a base surface area A :&amp;lt;br&amp;gt;
The mass m of that cylinder of water is just its volume V times the density ρ of the contained water:&amp;lt;br&amp;gt;
m = ρ × V&amp;lt;br&amp;gt;
That highlighted volume V , however, can also be expressed as the area of the base A times the height h which we can plug into the equation for mass m :&amp;lt;br&amp;gt;
m = ρ × A × h&amp;lt;br&amp;gt;
The force of gravity F acting on that water is equal to its mass m times the gravitational acceleration g :&amp;lt;br&amp;gt;
F = m × g&amp;lt;br&amp;gt;
If we now plug all these values to the equation for pressure P = F / A we get:&amp;lt;br&amp;gt;
P = ρ × A × h × g / A&amp;lt;br&amp;gt;
Which we can simplify by reducing the area A to obtain the final equation for pressure P of liquid with density ρ at a depth h under surface:&amp;lt;br&amp;gt;
P = ρ × h × g&amp;lt;br&amp;gt;
Note that the resulting pressure P is independent of the base area, it’s only affected by the height h and density ρ of the water above:&amp;lt;br&amp;gt;
In general the density ρ of water is not constant and depends on temperature and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Salinity&amp;#34;&amp;gt;salinity&amp;lt;/a&amp;gt; , but at the scales we’re interested in we can assume its value doesn’t change.&amp;lt;br&amp;gt;
If you recall our first demonstration of a loaded syringe, you may remember that the pressure applied to the plunger “travelled” through the hose to act on a spring, which was quite distant from the syringe itself. The very same rules apply here. Observe the pressure shown by the gauge two different spots of this L-shaped container:&amp;lt;br&amp;gt;
The right gauge always shows the same pressure even though in some cases there is less water “directly” above it. This may seem a little surprising, but you’d probably agree that if we removed the green plug from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ciechanow.ski&amp;#34;&amp;gt;filled&amp;lt;/a&amp;gt; container, the water would come out of the opening because of non-zero pressure in that area.&amp;lt;br&amp;gt;
That behavior of pressure in incompressible fluids is known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Pascal%27s_law&amp;#34;&amp;gt;Pascal’s law&amp;lt;/a&amp;gt; . It states that pressure applied to any part of the liquid will be transmitted in all directions. As a result, the pressure in a connected body of water is the same at every level under the free surface.&amp;lt;br&amp;gt;
It’s worth stressing that in these static cases the pressure at a given level depends purely on the height of the body of water. This may have some unexpected consequences. For example, pressure at the bottom of these two containers is exactly the same:&amp;lt;br&amp;gt;
Note how much less water there is in a thin straw compared to the wide container. This scenario is known as Pascal’s barrel . By making the straw longer and filling it with water we can make the pressure inside the barrel arbitrarily large, causing it to explode. While Pascal himself possibly &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Pascal%27s_law#Pascal&amp;#39;s_barrel&amp;#34;&amp;gt;never performed&amp;lt;/a&amp;gt; that experiment, some modern recreations &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=EJHrr21UvY8&amp;#34;&amp;gt;have been successful&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Buoyancy&amp;lt;br&amp;gt;
On its own pressure doesn’t have any direction – it’s a scalar value, just like temperature is. However, the force exerted by pressure acts in the normal, that is locally perpendicular, direction to the surface of the object. We can visualize the local forces created by the pressure with small arrows:&amp;lt;br&amp;gt;
In fact, these forces act not only on the container itself, but also on any object placed in the water as well. In the demonstration below a red brick is hanging on a string . You can dunk it into water using the slider:&amp;lt;br&amp;gt;
From this point on I’ll remove the constraints of containers and we’ll instead move outdoors where we’ll submerge things into vast, peaceful ocean waters. In this new environment the rules of pressure remain the same – after all, we’re still dealing with water.&amp;lt;br&amp;gt;
The brick is now hanging on a string that is attached to a scale, which we’ll lower. Notice that as a larger part of the brick gets underwater, the weight shown by the scale decreases:&amp;lt;br&amp;gt;
While the horizontal arrows of water pressure forces balance each other, the vertical ones don’t, and the pressure exerts a net positive force that pushes up on the brick. All the small arrows add up to the cumulative force known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Buoyancy&amp;#34;&amp;gt;buoyancy&amp;lt;/a&amp;gt; . In this example buoyancy is not strong enough to completely overcome the force of gravity acting on the brick, but it manages to diminish it to some extent, which reduces the weight as measured by the scale:&amp;lt;br&amp;gt;
Note that for the sake of clarity, I shifted the arrows apart a little, but in this simple scenario buoyancy and gravity are actually positioned on the same vertical line.&amp;lt;br&amp;gt;
If we use a wooden block instead of a brick, the situation changes a bit. As the block gets gently lowered, it will reach a point where the water is capable of keeping it on the surface and the string gets some slack:&amp;lt;br&amp;gt;
If we remove the string and manually push a wooden block underwater, the force of buoyancy will become higher than the block’s weight . When we let go of the block, the water will push it up:&amp;lt;br&amp;gt;
Once the block gains some speed it may even overshoot its steady position, only to get pulled down by gravity again. After a while the water resistance slows the oscillating movement enough for the block to find its steady balance.&amp;lt;br&amp;gt;
Let’s try to quantify the force of buoyancy as created by the pressure. Naturally, the forces here are three dimensional, however, observe that all the horizontal components are matched on the opposite side and they cancel each other out. Only the pressure forces on top and bottom are unbalanced. You can drag the block around to see all the pressure forces acting on it:&amp;lt;br&amp;gt;
The pressure P T on top of the brick acting on the top surface area A exerts the force F T equal to:&amp;lt;br&amp;gt;
F T = P T × A = ρ × g × h T × A&amp;lt;br&amp;gt;
Similarly, the resulting force F B acting from the bottom is:&amp;lt;br&amp;gt;
F B = P B × A = ρ × g × h B × A&amp;lt;br&amp;gt;
And the net force of buoyancy F in the upwards direction is the difference of the two:&amp;lt;br&amp;gt;
F = F B − F T = ρ × g × ( h B − h T ) × A&amp;lt;br&amp;gt;
Notice however, that the highlighted difference is just the height of the submerged part:&amp;lt;br&amp;gt;
F = ρ × g × h × A&amp;lt;br&amp;gt;
And the product of height h and the base area A is volume V of the submerged object, which gives us the equation that ties the force of buoyancy to the displaced volume V of fluid with density ρ :&amp;lt;br&amp;gt;
F = ρ × g × V&amp;lt;br&amp;gt;
Displaced volume is the volume of fluid that would normally occupy a space that is now filled by the object. We can also observe that density ρ times volume V is just mass m :&amp;lt;br&amp;gt;
This is force is just the weight of the displaced fluid. This general rule, known as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Archimedes%27_principle&amp;#34;&amp;gt;Archimedes’ principle&amp;lt;/a&amp;gt; , states that the force of buoyancy is equal to the weight of the fluid that the object has displaced. Note that buoyancy does not depend on the weight of the object itself, it’s only affected by the submerged volume of that object.&amp;lt;br&amp;gt;
You may wonder if the same rule holds for an arbitrary shape. After all, I’ve conveniently used a plain wooden block to simplify the volume and force calculations. However, we can use the same method even for smooth shapes by subdividing them into arbitrarily small rectangular prisms.&amp;lt;br&amp;gt;
In the following demonstration you can use smaller and smaller prisms to approximate the shape of a sphere. For the sake of clarity, I’m only coloring the top and bottom surfaces. You can drag the simulation around to see it from different angles:&amp;lt;br&amp;gt;
Notice how quickly a group of blocks starts to resemble the smooth shape of the sphere.&amp;lt;br&amp;gt;
Now that we know that the force of buoyancy depends on the submerged volume we can also analyze what happens when the wooden block is forcefully tilted:&amp;lt;br&amp;gt;
The local forces exerted by pressure are no longer …</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210727-160849/</link>
      <pubDate>Tue, 27 Jul 2021 16:08:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210727-160849/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/connect-the-conversation-with-threads-on-discord-3f5fa8b0f6b?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Connect the Conversation with Threads on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/connect-the-conversation-with-threads-on-discord-3f5fa8b0f6b?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Connect the Conversation with Threads on Discord Today, we’re excited to introduce a new home for all those winding discussions happening in your communities: Threads!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210727-121657/</link>
      <pubDate>Tue, 27 Jul 2021 12:16:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210727-121657/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/vpn-servers-seized-by-ukrainian-authorities-werent-encrypted/&amp;#34;&amp;gt;VPN servers seized by Ukrainian authorities weren’t encrypted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Company says it&amp;amp;#39;s in the process of overhauling its VPN offerings to better secure them.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-082308/</link>
      <pubDate>Tue, 27 Jul 2021 08:23:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210727-082308/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132320_2022-porsche-cayenne-turbo-gt-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2022 Porsche Cayenne Turbo GT jams the soul of a sports car into an SUV body&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125026_2021-tesla-model-s-plaid-returns-to-ring-in-potential-record-attempt&amp;#34;&amp;gt;2021 Tesla Model S Plaid returns to &amp;amp;#39;Ring in potential record attempt&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133011_bentley-bentayga-will-soon-be-available-with-22-inch-carbon-fiber-wheels&amp;#34;&amp;gt;Bentley Bentayga will soon be available with 22-inch carbon-fiber wheels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132971_christian-von-koenigsegg-provides-walkthrough-of-koenigsegg-jesko-hypercar&amp;#34;&amp;gt;Christian von Koenigsegg provides walkthrough of Koenigsegg Jesko hypercar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210727-082134/</link>
      <pubDate>Tue, 27 Jul 2021 08:21:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210727-082134/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/mike-isaac&amp;#34;&amp;gt;Do Not Sell My Personal Information&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Something went wrong. Please try again later.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.nytimes.com/privacy/california-notice&amp;#34;&amp;gt;California Notices&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210727-081951/</link>
      <pubDate>Tue, 27 Jul 2021 08:19:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210727-081951/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/announcements&amp;#34;&amp;gt;Announcements&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210727-081906/</link>
      <pubDate>Tue, 27 Jul 2021 08:19:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210727-081906/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/by/cecilia-kang&amp;#34;&amp;gt;Do Not Sell My Personal Information&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Something went wrong. Please try again later.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.nytimes.com/privacy/california-notice&amp;#34;&amp;gt;California Notices&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210727-080651/</link>
      <pubDate>Tue, 27 Jul 2021 08:06:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210727-080651/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/plugwalkjoe-does-the-perp-walk/&amp;#34;&amp;gt;PlugwalkJoe Does the Perp Walk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Joseph “PlugwalkJoe” O’Connor, in a photo from a paid &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.globenewswire.com/en/news-release/2020/09/02/2087991/0/en/Cryptocurrency-Prodigy-Joseph-PlugWalkJoe-O-Connor-is-Helping-People-Everywhere-Master-Crypto.html&amp;#34;&amp;gt;press release&amp;lt;/a&amp;gt; on Sept. 02, 2020, pitching him as a trustworthy cryptocurrency expert and advisor.&amp;lt;br&amp;gt;
One day after last summer’s mass-hack of Twitter , KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/07/whos-behind-wednesdays-epic-twitter-hack/&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; that 22-year-old British citizen Joseph “PlugwalkJoe” O’Connor appeared to have been involved in the incident. When the U.S. Justice Department last week announced O’Connor’s arrest and indictment, his alleged role in the Twitter compromise was well covered in the media.&amp;lt;br&amp;gt;
But most of the coverage seems to have overlooked the far more sinister criminal charges in the indictment, which involve an underground scene wherein young men turn to extortion, sextortion, SIM swapping, death threats and physical attacks — all in a frenzied effort to seize control over social media accounts.&amp;lt;br&amp;gt;
Skim the government’s indictment and you might overlook a footnote on Page 4 that says O’Connor is part of a group that had exactly zero reservations about using their playbook of harassment tactics against law enforcement agents who were already investigating their alleged crimes.&amp;lt;br&amp;gt;
“ O’Connor has potentially been linked to additional prior swatting incidents and possibly (although not confirmed and currently still under investigation) the swatting of a U.S. law enforcement officer ,” the footnote reads.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/tag/swatting/&amp;#34;&amp;gt;Swatting&amp;lt;/a&amp;gt; involves making a false report to authorities in a target’s name with the intention of sending a heavily armed police force to that person’s address. It’s a potentially deadly hoax: Earlier this month, a Tennessee man was sentenced to 60 months in prison for setting in motion a swatting attack that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/serial-swatter-who-caused-death-gets-five-years-in-prison/&amp;#34;&amp;gt;led to the death of a 60-year-old grandfather&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
As for the actual criminal charges, O’Connor faces ten counts, including conspiracy, computer intrusion, extortive communications, stalking and threatening communications.&amp;lt;br&amp;gt;
FEMALE TARGETS&amp;lt;br&amp;gt;
All of those come into play in the case of the Snapchat account of actor Bella Thorne , who was allegedly targeted by PlugwalkJoe and associates in June 2019.&amp;lt;br&amp;gt;
Investigators say O’Connor was involved in a “SIM swap” against Thorne’s mobile phone number. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/tag/sim-swapping/&amp;#34;&amp;gt;Unauthorized SIM swapping&amp;lt;/a&amp;gt; is a scheme in which fraudsters trick or bribe employees at wireless phone companies into redirecting the target’s text messages and phone calls to a device they control. From there, the attackers can reset the password for any online account that allows password resets via SMS.&amp;lt;br&amp;gt;
In this case, the SIM swap was done to wrest control over Thorne’s Snapchat account. Once inside, the attackers found nude photos of Thorne, which they then threatened to release unless she agreed to post on social media thanking the hackers using their online handles.&amp;lt;br&amp;gt;
The intruders posted on Thorne’s Snapchat, “Will drop nudes if 5000 of you follow @PlugwalkJoe.” Thorne told the feds her phone lost service shortly before her account was hijacked. Investigators later found the same Internet address used to access Thorne’s Snapchat account also was used minutes later to access “@Joe” on Instagram, which O’Connor has claimed publicly.&amp;lt;br&amp;gt;
On June 15, 2019, Thorne &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/THR/status/1140327216061878272&amp;#34;&amp;gt;posted on Twitter&amp;lt;/a&amp;gt; that she’d been “threatened with my own nudes,” and posted screenshots of the text message with the individual who had extorted him/her. Thorne said she was releasing the photographs so that the individual would not be able to “take yet another thing from me.”&amp;lt;br&amp;gt;
The indictment alleges O’Connor also swatted and cyberstalked a 16-year-old girl, sending her nude photos and threatening to rape and/or murder her and her family.&amp;lt;br&amp;gt;
Social media personality &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Addison_Rae&amp;#34;&amp;gt;Addison Rae&amp;lt;/a&amp;gt; had 55 million followers when her TikTok account got hacked last August. I &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/briankrebs/status/1294464374841761792&amp;#34;&amp;gt;noted on Twitter&amp;lt;/a&amp;gt; at the time that PlugWalkJoe had left his calling card yet again. The indictment alleges O’Connor also was involved in a SIM-swap against Rae’s mobile number.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210726-162126/</link>
      <pubDate>Mon, 26 Jul 2021 16:21:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210726-162126/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133010_porsche-imagines-an-interior-for-self-driving-cars&amp;#34;&amp;gt;Porsche imagines an interior for self-driving cars&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1133007_ssangyong-reveals-pair-of-suvs-as-us-investors-eye-stake-in-struggling-brand&amp;#34;&amp;gt;SsangYong reveals pair of SUVs as US investors eye stake in struggling brand&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131172_israeli-startup-with-modular-ev-platform-goes-public-via-spac-deal-expands-to-us&amp;#34;&amp;gt;Israeli startup with modular EV platform goes public via SPAC deal, expands to US&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210726-161202/</link>
      <pubDate>Mon, 26 Jul 2021 16:12:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210726-161202/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://future.com/technology-saves-the-world/&amp;#34;&amp;gt;Technology Saves the World&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210726-160826/</link>
      <pubDate>Mon, 26 Jul 2021 16:08:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210726-160826/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/earnin-customer-story/&amp;#34;&amp;gt;How Earnin rebuilt their customer service process ahead of launching a new feature This is the story how Paula built a new service dashboard in Retool to help the customer service team prepare for the launch of their new product, WeWin.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210726-122146/</link>
      <pubDate>Mon, 26 Jul 2021 12:21:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210726-122146/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132990_with-ipo-in-view-volvo-buys-out-chinese-joint-ventures-from-geely&amp;#34;&amp;gt;With IPO in view, Volvo buys out Chinese joint ventures from Geely&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210726-081121/</link>
      <pubDate>Mon, 26 Jul 2021 08:11:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210726-081121/</guid>
      <description>19 Aug 2019 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2019-08-19/bpftrace.html&amp;#34;&amp;gt;A thorough introduction to bpftrace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Slides for my Facebook Systems@Scale talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/systemsscale-2021-bpf-performance-getting-started&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/systemsscale-2021-bpf-performance-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/Scale2021_BPF_performance_getting_started_2021.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/atscaleevents/videos/536868690830345&amp;#34;&amp;gt;video&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
An article for opensource.com: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https:///opensource.com/article/19/8/introduction-bpftrace&amp;#34;&amp;gt;An introduction to bpftrace for Linux&amp;lt;/a&amp;gt; , summarizing the syntax and including a one-liners tutorial (2019).&amp;lt;br&amp;gt;
Video for my Facebook Systems@Scale talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/atscaleevents/videos/536868690830345&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/atscaleevents/videos/536868690830345&amp;#34;&amp;gt;video&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/systemsscale-2021-bpf-performance-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (21 mins) (2021).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210725-122123/</link>
      <pubDate>Sun, 25 Jul 2021 12:21:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210725-122123/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132985_the-final-bugatti-divo-has-been-built-and-delivered&amp;#34;&amp;gt;The final Bugatti Divo has been built and delivered&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210725-041714/</link>
      <pubDate>Sun, 25 Jul 2021 04:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210725-041714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2013/02/04/attack-of-week-tls-timing-oracles/&amp;#34;&amp;gt;Attack of the week: TLS timing oracles&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210725-040639/</link>
      <pubDate>Sun, 25 Jul 2021 04:06:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210725-040639/</guid>
      <description>Thinking of a Cybersecurity Career?&amp;lt;br&amp;gt;
Read this.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210724-161755/</link>
      <pubDate>Sat, 24 Jul 2021 16:17:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210724-161755/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/24/business/biden-antitrust-amazon-google.html&amp;#34;&amp;gt;Biden’s Antitrust Team Signals a Big Swing at Corporate Titans The president has stacked his administration with crusaders who have spent their careers challenging corporate consolidation. By Jim Tankersley and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210724-122110/</link>
      <pubDate>Sat, 24 Jul 2021 12:21:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210724-122110/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132997_bmw-s-art-cars-go-digital&amp;#34;&amp;gt;BMW&amp;#39;s Art Cars go digital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210724-040836/</link>
      <pubDate>Sat, 24 Jul 2021 04:08:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210724-040836/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/google-sheets/&amp;#34;&amp;gt;Building apps on top of Google Sheets While spreadsheet software has evolved over the years—first VisiCalc, then Lotus, Excel and now Google Sheets—the core abstractions have remained the same.They’re flexible, intuitive, and accessible.  But these abstractions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210724-002216/</link>
      <pubDate>Sat, 24 Jul 2021 00:22:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210724-002216/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131719_2022-mercedes-benz-eqs-specs-price-review-info-photos&amp;#34;&amp;gt;First drive review: 2022 Mercedes-Benz EQS vaults the S-Class into tomorrow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210724-001815/</link>
      <pubDate>Sat, 24 Jul 2021 00:18:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210724-001815/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/23/technology/ftc-facebook-antitrust-lawsuit.html&amp;#34;&amp;gt;The F.T.C. asks for an extension to refile its Facebook antitrust suit. The F.T.C. said in its request that it had reached an agreement with Facebook over the proposed extension. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210724-001713/</link>
      <pubDate>Sat, 24 Jul 2021 00:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210724-001713/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/04/11/its-end-of-world-as-we-know-it-and-i/&amp;#34;&amp;gt;It&amp;#39;s the end of the world as we know it (and I feel fine)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210724-000735/</link>
      <pubDate>Sat, 24 Jul 2021 00:07:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210724-000735/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/serial-swatter-who-caused-death-gets-five-years-in-prison/&amp;#34;&amp;gt;Serial Swatter Who Caused Death Gets Five Years in Prison&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A 18-year-old Tennessee man who helped set in motion a fraudulent distress call to police that led to the death of a 60-year-old grandfather in 2020 was sentenced to 60 months in prison today.&amp;lt;br&amp;gt;
60-year-old Mark Herring died of a heart attack after police surrounded his home in response to a swatting attack.&amp;lt;br&amp;gt;
Shane Sonderman , of Lauderdale County, Tenn. admitted to conspiring with a group of criminals that’s been “swatting” and harassing people for months in a bid to coerce targets into giving up their valuable Twitter and Instagram usernames.&amp;lt;br&amp;gt;
At Sonderman’s sentencing hearing today, prosecutors told the court the defendant and his co-conspirators would text and call targets and their families, posting their personal information online and sending them pizzas and other deliveries of food as a harassment technique.&amp;lt;br&amp;gt;
Other victims of the group told prosecutors their tormentors further harassed them by making false reports of child abuse to social services local to the target’s area, and false reports in the target’s name to local suicide prevention hotlines.&amp;lt;br&amp;gt;
Eventually, when subjects of their harassment refused to sell or give up their Twitter and Instagram usernames, Sonderman and others would swat their targets — or make a false report to authorities in the target’s name with the intention of sending a heavily armed police response to that person’s address.&amp;lt;br&amp;gt;
For weeks throughout March and April 2020, 60-year-old &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/mark.herring.940641&amp;#34;&amp;gt;Mark Herring&amp;lt;/a&amp;gt; of Bethpage, Tenn. was inundated with text messages asking him to give up his @Tennessee Twitter handle. When he ignored the requests, Sonderman and his buddies began having food delivered to Herring’s home via cash on delivery.&amp;lt;br&amp;gt;
At one point, Sonderman posted Herring’s home address in a Discord chat room used by the group, and a minor in the United Kingdom quickly followed up by directing a swatting attack on Herring’s home.&amp;lt;br&amp;gt;
Ann Billings was dating Mr. Herring and was present when the police surrounded his home. She recalled for the Tennessee court today how her friend died shortly thereafter of a heart attack.&amp;lt;br&amp;gt;
Billings said she first learned of the swatting when a neighbor called and asked why the street was lined with police cars. When Mr. Herring stepped out on the back porch to investigate, police told him to put his hands up and to come to the street.&amp;lt;br&amp;gt;
Unable to disengage a lock on his back fence, Herring was instructed to somehow climb over the fence with his hands up.&amp;lt;br&amp;gt;
“He was starting to get more upset,” Billings recalled. “He said, ‘I’m a 60-year-old fat man and I can’t do that.&amp;amp;#39;”&amp;lt;br&amp;gt;
Billings said Mr. Herring then offered to crawl under a gap in the fence, but when he did so and stood up, he collapsed of a heart attack. Herring died at a nearby hospital soon after.&amp;lt;br&amp;gt;
Mary Frances Herring , who was married to Mr. Herring for 28 years, said her late husband was something of a computer whiz in his early years who secured the @Tennessee Twitter handle shortly after Twitter came online. Internet archivist &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/textfiles/status/1417743261125513217&amp;#34;&amp;gt;Jason Scott says&amp;lt;/a&amp;gt; Herring was the creator of the successful software products Sparkware and QWIKMail; Scott has 2 hours worth of interviews with Herring from 20 years ago &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/aJ3CQ9Fzay?amp=1&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Perhaps the most poignant testimony today came when Ms. Herring said her husband — who was killed by people who wanted to steal his account — had a habit of registering new Instagram usernames as presents for friends and family members who’d just had children.&amp;lt;br&amp;gt;
“If someone was having a baby, he would ask them, ‘What are your naming the baby?’,” Ms. Herring said. “And he would get them that Instagram name and give it to them as a gift.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/serial-swatter-who-caused-death-gets-five-years-in-prison/#more-56372&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-202218/</link>
      <pubDate>Fri, 23 Jul 2021 20:22:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-202218/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132995_alpha-motors-superwolf-compact-pickup-combines-retro-style-with-electric-powertrain&amp;#34;&amp;gt;Alpha Motors Superwolf compact pickup combines retro style with electric powertrain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210723-201719/</link>
      <pubDate>Fri, 23 Jul 2021 20:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210723-201719/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-02010-x&amp;#34;&amp;gt;NASA investigates renaming James Webb telescope after anti-LGBT&#43; claims&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Some astronomers argue the flagship observatory — successor to the Hubble Space Telescope — will memorialize discrimination. Others are waiting for more evidence.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210723-200854/</link>
      <pubDate>Fri, 23 Jul 2021 20:08:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210723-200854/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/meet-the-discord-users-who-imagined-a-place-657325b75fa6?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Meet the Discord Users Who Imagined a Place&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/meet-the-discord-users-who-imagined-a-place-657325b75fa6?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Meet the Discord Users Who Imagined a Place Let’s talk about you, the community who inspired the entire Imagine a Place project and Discord — The Movie (2021).&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-162159/</link>
      <pubDate>Fri, 23 Jul 2021 16:21:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-162159/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132993_audi-rs-q-e-tron-super-suv-gets-ready-to-rock-at-2022-dakar-rally&amp;#34;&amp;gt;Audi RS Q E-Tron super SUV gets ready to rock at 2022 Dakar Rally&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-122148/</link>
      <pubDate>Fri, 23 Jul 2021 12:21:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-122148/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132992_ac-cobra-series-1-electric-starts-testing&amp;#34;&amp;gt;AC Cobra Series 1 Electric starts testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132991_2022-mercedes-benz-t-class-citan-spy-shots&amp;#34;&amp;gt;2022 Mercedes-Benz T-Class (Citan) spy shots: Renault-based compact van spotted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210723-041658/</link>
      <pubDate>Fri, 23 Jul 2021 04:16:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210723-041658/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-facebook-cant-fix&amp;#34;&amp;gt;What Facebook Can’t Fix&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-facebook-cant-fix&amp;#34;&amp;gt;When people lose faith in institutions, they gravitate to misinformation. It&amp;#39;s time to address the trust vacuum.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;6&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-facebook-cant-fix/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jul 15 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-never-been-better-to-be-talent/comments&amp;#34;&amp;gt;Comment 1&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-002203/</link>
      <pubDate>Fri, 23 Jul 2021 00:22:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210723-002203/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132975_2021-jeep-wrangler-rubicon-392-drives-fast-over-any-surface-sometimes-too-fast&amp;#34;&amp;gt;2021 Jeep Wrangler Rubicon 392 drives fast over any surface, sometimes too fast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210723-001921/</link>
      <pubDate>Fri, 23 Jul 2021 00:19:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210723-001921/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/07/09/facebook-got-rid-of-racial-ad-categories-or-did-it&amp;#34;&amp;gt;Citizen Browser Facebook Got Rid of Racial Ad Categories. Or Did It? Our Citizen Browser project found an array of proxies through which advertisers can target Black Facebook users, among other demographics July 9, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210723-001846/</link>
      <pubDate>Fri, 23 Jul 2021 00:18:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210723-001846/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/kaseya-gets-master-decryptor-to-help-customers-still-suffering-from-revil-attack/&amp;#34;&amp;gt;Kaseya gets master decryptor to help customers still suffering from REvil attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
REvil ransomware struck as many as 1,500 networks, but a master key is now available.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210723-000905/</link>
      <pubDate>Fri, 23 Jul 2021 00:09:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210723-000905/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/resources-for-celebrating-pride-throughout-the-year-688b080fb040?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Resources for Celebrating Pride Throughout The Year&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/resources-for-celebrating-pride-throughout-the-year-688b080fb040?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Resources for Celebrating Pride Throughout The Year Discord’s Pride ERG would like to share knowledge, resources, and information to help support LGBTQIA&#43; communities any day of the year.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Jul 22&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-202159/</link>
      <pubDate>Thu, 22 Jul 2021 20:21:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-202159/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130340_2022-subaru-brz-price-specs-review-info-photos&amp;#34;&amp;gt;2022 Subaru BRZ preview: No turbo, but more power for $28,955&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132986_volkswagen-atlas-cross-sport-gt-concept-imagines-a-sporty-family-crossover&amp;#34;&amp;gt;Volkswagen Atlas Cross Sport GT Concept imagines a sporty family crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1103534_2023-maserati-granturismo-spy-shots&amp;#34;&amp;gt;2023 Maserati GranTurismo spy shots: Electric and ICE options coming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-161846/</link>
      <pubDate>Thu, 22 Jul 2021 16:18:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-161846/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/pingdemic-puts-britains-food-supply-under-strain-idUSKBN2ES0H6&amp;#34;&amp;gt;&amp;#39;Pingdemic&amp;#39; puts Britain&amp;#39;s food supply under strain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -British supermarkets said on Thursday that some products were in short supply and petrol stations had been forced to close after the official health app told hundreds of thousands of workers to isolate following contact with someone with COVID-19.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-usa-sanctions/u-s-to-impose-sanctions-on-cuban-officials-over-crackdown-on-protests-source-idUSKBN2ES1X5&amp;#34;&amp;gt;U.S. to impose sanctions on Cuban officials over crackdown on protests -source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-colombia-violence/colombia-arrests-10-over-bombing-shooting-of-presidents-helicopter-idUSKBN2ES1TX&amp;#34;&amp;gt;Colombia arrests 10 over bombing, shooting of president&amp;amp;#39;s helicopter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-122144/</link>
      <pubDate>Thu, 22 Jul 2021 12:21:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-122144/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132975_2021-jeep-wrangler-rubicon-392-is-fast-over-any-surface-sometimes-too-fast&amp;#34;&amp;gt;2021 Jeep Wrangler Rubicon 392 is fast over any surface, sometimes too fast&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1076105_porsche-928-from-risky-business-heads-to-auction&amp;#34;&amp;gt;Porsche 928 from &amp;amp;#34;Risky Business&amp;amp;#34; heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-121808/</link>
      <pubDate>Thu, 22 Jul 2021 12:18:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-121808/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/pingdemic-grips-britain-as-fears-of-food-shortages-grow-idUSKBN2ES0H6&amp;#34;&amp;gt;&amp;#39;Pingdemic&amp;#39; grips Britain as fears of food shortages grow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -Britain&amp;amp;#39;s supermarkets, wholesalers and hauliers were struggling on Thursday to ensure stable food and fuel supplies after an official health app told hundreds of thousands of workers to isolate after contact with someone with COVID-19.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-norway-attacks/bells-toll-across-norway-to-mark-10-years-since-neo-nazi-breivik-killed-77-people-idUSKBN2ER2HY&amp;#34;&amp;gt;Bells toll across Norway to mark 10 years since neo-Nazi Breivik killed 77 people&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-unions/childrens-tales-of-sheep-and-wolves-incite-sedition-hk-police-say-idUSKBN2ES0BF&amp;#34;&amp;gt;Children&amp;amp;#39;s tales of sheep and wolves incite sedition, HK police say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-082224/</link>
      <pubDate>Thu, 22 Jul 2021 08:22:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210722-082224/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129686_2023-bmw-x7-spy-shots&amp;#34;&amp;gt;2023 BMW X7 spy shots: Heavy styling update set for big crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-081902/</link>
      <pubDate>Thu, 22 Jul 2021 08:19:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-081902/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020-ceremony-director/opening-ceremony-director-dismissed-after-past-comments-on-holocaust-tokyo-2020-says-idUSKBN2ES06X&amp;#34;&amp;gt;Opening ceremony director dismissed after past comments on Holocaust, Tokyo 2020 says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The director of the opening ceremony of the Tokyo 2020 Olympics has been dismissed, organisers said on Thursday, following news reports about his past comments on the Holocaust.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-cyber-nso/israeli-lawmaker-eyes-spyware-export-curbs-as-macron-convenes-cabinet-idUSKBN2ES0HC&amp;#34;&amp;gt;Israeli lawmaker eyes spyware export curbs as Macron convenes cabinet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-court/hk-court-denies-bail-to-apple-daily-staff-facing-national-security-charges-idUSKBN2ES037&amp;#34;&amp;gt;HK court denies bail to Apple Daily staff facing national security charges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Technical blog | Intuitive Explanations</title>
      <link>https://www.whatsupup.com/blog/emphysema/mesalliance/20210722-042250/</link>
      <pubDate>Thu, 22 Jul 2021 04:22:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/emphysema/mesalliance/20210722-042250/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/&amp;#34;&amp;gt;Intuitive Explanations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/about/projects&amp;#34;&amp;gt;Projects&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/math&amp;#34;&amp;gt;Math&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/tech&amp;#34;&amp;gt;Tech&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/fiction&amp;#34;&amp;gt;Fiction&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/assets/Resume.pdf&amp;#34;&amp;gt;Resume&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/about&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Technical blog&amp;lt;br&amp;gt;
This page has an index of writing I’ve done about programming.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/kalyn&amp;#34;&amp;gt;Kalyn: a self-hosting compiler for x86-64&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://intuitiveexplanations.com/replit/&amp;#34;&amp;gt;How Replit used legal threats to kill my open-source
project&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Intuitive Explanations&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;mailto:radon.neon@gmail.com&amp;#34;&amp;gt;radon.neon@gmail.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/raxod502&amp;#34;&amp;gt;raxod502&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Understand, don&amp;amp;#39;t memorize.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210722-042018/</link>
      <pubDate>Thu, 22 Jul 2021 04:20:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210722-042018/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/04/17/collecting-unstructured-information-with-the-monoid-of-partial-knowledge/&amp;#34;&amp;gt;Collecting unstructured information with the monoid of partial knowledge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-041805/</link>
      <pubDate>Thu, 22 Jul 2021 04:18:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210722-041805/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-accident-tunnel/death-toll-in-china-flooded-highway-tunnel-rises-to-13-idUSKBN2ES013&amp;#34;&amp;gt;Death toll in China flooded highway tunnel rises to 13&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Rescuers have found the bodies of 10 more workers who were trapped in a flooded highway tunnel in the southern Chinese city of Zhuhai last week, bringing the death toll to 13, state media reported late on Wednesday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-court/four-apple-daily-staff-due-in-hong-kong-court-on-national-security-charges-idUSKBN2ES037&amp;#34;&amp;gt;Four Apple Daily staff due in Hong Kong court on national security charges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bad Request</title>
      <link>https://www.whatsupup.com/blog/emphysema/mesalliance/20210722-002417/</link>
      <pubDate>Thu, 22 Jul 2021 00:24:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/emphysema/mesalliance/20210722-002417/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210722-001854/</link>
      <pubDate>Thu, 22 Jul 2021 00:18:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210722-001854/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/home-and-office-routers-come-under-attack-by-china-state-hackers-france-warns/&amp;#34;&amp;gt;Home and office routers come under attack by China state hackers, France warns&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Compromised routers give the hackers anonymity in ongoing large-scale attacks.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210722-001810/</link>
      <pubDate>Thu, 22 Jul 2021 00:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210722-001810/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://dashboard.smartcar.com/login/&amp;#34;&amp;gt;Log in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-202243/</link>
      <pubDate>Wed, 21 Jul 2021 20:22:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-202243/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132938_2023-chevrolet-corvette-z06-teased-with-sound-of-screaming-flat-plane-crank-v-8&amp;#34;&amp;gt;2023 Chevrolet Corvette Z06 teased with sound of screaming flat-plane crank V-8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210721-202011/</link>
      <pubDate>Wed, 21 Jul 2021 20:20:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210721-202011/</guid>
      <description>July 21, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;gemini://drewdevault.com/2021/07/21/Demon-Slayer-review.gmi&amp;#34;&amp;gt;Demon Slayer: The Movie: Mugen Train review&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/gemini.html&amp;#34;&amp;gt;what is gemini://?&amp;lt;/a&amp;gt; ]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-201859/</link>
      <pubDate>Wed, 21 Jul 2021 20:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-201859/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/death-toll-in-south-africa-riots-rises-to-276-minister-says-idUSKBN2ER28F&amp;#34;&amp;gt;Death toll in South Africa riots rises to 276, minister says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban-pentagon/half-of-all-afghan-district-centers-under-taliban-control-u-s-general-idUSKBN2ER26Q&amp;#34;&amp;gt;Half of all Afghan district centers under Taliban control - U.S. general&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/21/covering-the-tokyo-olympics-in-japans-he?videoId=733207116&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Covering the Tokyo Olympics in Japan&amp;amp;#39;s heat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210721-201235/</link>
      <pubDate>Wed, 21 Jul 2021 20:12:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210721-201235/</guid>
      <description>&amp;lt;p&amp;gt;Congratulations to @Clubhouse for going out of beta/no more invites or waitlist starting today.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;@aarthir and I will be doing a special edition of @GoodTimeShowCH tonight at 10pm PT with @pdavison @rohanseth @pmarca @stevesi to talk about today&#43;their road to getting here.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-162242/</link>
      <pubDate>Wed, 21 Jul 2021 16:22:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-162242/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132969_street-legal-1998-mercedes-benz-clk-gtr-headed-to-auction&amp;#34;&amp;gt;Street-legal 1998 Mercedes-Benz CLK GTR headed to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131444_2022-volvo-c40-recharge-debuts-as-automaker-s-first-electric-only-model-for-59-845&amp;#34;&amp;gt;2022 Volvo C40 Recharge debuts as automaker&amp;amp;#39;s first electric-only model for $59,845&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132966_bugatti-bought-back-the-first-veyron-grand-sport-prototype-and-restored-it&amp;#34;&amp;gt;Bugatti bought back the first Veyron Grand Sport prototype and restored it&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132965_pininfarina-shows-off-first-client-spec-for-battista-electric-hypercar&amp;#34;&amp;gt;Pininfarina shows off first client spec for Battista electric hypercar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-161907/</link>
      <pubDate>Wed, 21 Jul 2021 16:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-161907/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-weather-henan/at-least-25-dead-as-rains-deluge-central-chinas-henan-province-idUSKBN2EQ2CF&amp;#34;&amp;gt;At least 25 dead as rains deluge central China&amp;#39;s Henan province&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
At least 25 people have died in China&amp;amp;#39;s flood-stricken central province of Henan, a dozen of them in a subway line in its capital Zhengzhou, and more rains are forecast for the region.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-usa-travel/u-s-extends-travel-curbs-at-canada-mexico-land-borders-through-aug-21-idUSKBN2ER1JV&amp;#34;&amp;gt;U.S. extends travel curbs at Canada, Mexico land borders through Aug. 21&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-navalny-spokesperson/russia-extends-house-arrest-of-kremlin-critic-navalnys-spokesperson-idUSKBN2ER1XJ&amp;#34;&amp;gt;Russia extends house arrest of Kremlin critic Navalny&amp;amp;#39;s spokesperson&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210721-161434/</link>
      <pubDate>Wed, 21 Jul 2021 16:14:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210721-161434/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/12/Slow-M1&amp;#34;&amp;gt;Where’s the Apple M2?&amp;lt;/a&amp;gt; · DPReview just published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.dpreview.com/opinion/5834413552/apple-still-hasnt-made-a-truly-pro-m1-mac&amp;#34;&amp;gt;Apple still hasn&amp;#39;t made a truly     “Pro” M1 Mac – so what’s the holdup?&amp;lt;/a&amp;gt; Following on the good performance and awesome power efficiency of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Apple_M1&amp;#34;&amp;gt;Apple M1&amp;lt;/a&amp;gt; , there’s a hungry background rumble in Mac-land along the lines of     “Since the M1 is an entry-level chip, the next CPU is gonna blow everyone’s mind!”     But it’s been eight months since the M1 shipped and we haven’t heard from Apple.  I have a good guess what’s     going on: It’s proving really hard to make a CPU (or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/System_on_a_chip&amp;#34;&amp;gt;SoC&amp;lt;/a&amp;gt; ) that’s perceptibly faster than the M1.     Here’s why &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/12/Slow-M1&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210721-160856/</link>
      <pubDate>Wed, 21 Jul 2021 16:08:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210721-160856/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/segment-customer-story/&amp;#34;&amp;gt;How the Segment support team uses real-time data to help customers create and use audiences As Segment prepared to launch their second product, Personas, a PM realized that their customer support team needed a new level of visibility into product data.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-122221/</link>
      <pubDate>Wed, 21 Jul 2021 12:22:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-122221/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132953_first-drive-review-2021-mercedes-benz-amg-e63-s-wagon-packs-supercar-power-and-crossover-space&amp;#34;&amp;gt;First drive review: 2021 Mercedes-Benz AMG E63 S wagon packs supercar power and crossover space&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-121816/</link>
      <pubDate>Wed, 21 Jul 2021 12:18:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-121816/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-weather-henan/at-least-25-dead-in-chinese-provinces-heaviest-rains-in-1000-years-idUSKBN2EQ2CF&amp;#34;&amp;gt;At least 25 dead in Chinese province&amp;#39;s heaviest rains in 1,000 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
At least 25 people have died in China&amp;amp;#39;s flood-stricken central province of Henan, a dozen of them in a subway line in its capital that was drenched by what weather officials called the heaviest rains for 1,000 years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-diplomacy/senior-u-s-diplomat-sherman-to-visit-china-state-department-idUSKBN2ER13L&amp;#34;&amp;gt;Senior U.S. diplomat Sherman to visit China - State Department&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-cyber-nso/israels-national-security-council-looking-into-nso-spyware-allegations-idUSKBN2ER14M&amp;#34;&amp;gt;Israel&amp;amp;#39;s National Security Council &amp;amp;#39;looking into&amp;amp;#39; NSO spyware allegations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210721-121626/</link>
      <pubDate>Wed, 21 Jul 2021 12:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210721-121626/</guid>
      <description>By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/author/matthewdgreen/&amp;#34;&amp;gt;Matthew Green&amp;lt;/a&amp;gt; in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/apple/&amp;#34;&amp;gt;Apple&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/attacks/&amp;#34;&amp;gt;attacks&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/backdoors/&amp;#34;&amp;gt;backdoors&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/malware/&amp;#34;&amp;gt;malware&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/&amp;#34;&amp;gt;July 20, 2021 July 20, 2021&amp;lt;/a&amp;gt; 1,417 Words &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2018/04/26/a-few-thoughts-on-ray-ozzies-clear-proposal/&amp;#34;&amp;gt;A few thoughts on Ray Ozzie&amp;#39;s &amp;amp;quot;Clear&amp;amp;quot; Proposal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-082128/</link>
      <pubDate>Wed, 21 Jul 2021 08:21:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-082128/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132961_aston-martin-announces-updates-for-2022-including-more-power-for-db11-v8&amp;#34;&amp;gt;Aston Martin announces updates for 2022, including more power for DB11 V8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-081752/</link>
      <pubDate>Wed, 21 Jul 2021 08:17:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-081752/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-weather-henan/central-chinas-henan-province-swamped-after-heaviest-rain-in-1000-years-idUSKBN2EQ2CF&amp;#34;&amp;gt;Central China&amp;#39;s Henan province swamped after heaviest rain in 1,000 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Large swathes of China&amp;amp;#39;s central Henan province were under water on Wednesday, with at least a dozen people dead in its capital Zhengzhou after the city was drenched by what weather watchers said was the heaviest rain in 1,000 years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-russia-vaccination/push-to-get-wary-russians-vaccinated-leaves-some-covid-clinics-short-idUSKBN2ER0F2&amp;#34;&amp;gt;Push to get wary Russians vaccinated leaves some COVID clinics short&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-042132/</link>
      <pubDate>Wed, 21 Jul 2021 04:21:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210721-042132/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132935_tesla-makes-full-self-driving-available-as-199-monthly-subscription&amp;#34;&amp;gt;Tesla makes Full Self-Driving available as $199 monthly subscription&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-041750/</link>
      <pubDate>Wed, 21 Jul 2021 04:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-041750/</guid>
      <description>&amp;lt;p&amp;gt;Milwaukee Bucks beat Phoenix Suns to win their first NBA championship in 50 years &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2ER09A&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020/olympics-japan-win-softball-opener-as-games-of-hope-begin-idUSKBN2ER058&amp;#34;&amp;gt;Olympics-Japan win softball opener as Games &amp;#39;of hope&amp;#39; begin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
FUKUSHIMA/TOKYO (Reuters) -Japan&amp;amp;#39;s women&amp;amp;#39;s softball team got the Tokyo 2020 Olympics off to a winning start for the hosts on Wednesday, a boost for the pandemic-postponed Games that the World Health Organization sees as &amp;amp;#34;a celebration of hope&amp;amp;#34; even as COVID-19 cases surge.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-weather-henan/central-chinese-province-swamped-after-heaviest-rain-in-1000-years-idUSKBN2EQ2CF&amp;#34;&amp;gt;Central Chinese province swamped after heaviest rain in 1,000 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210721-041736/</link>
      <pubDate>Wed, 21 Jul 2021 04:17:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210721-041736/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/20/business/kanter-doj-antitrust.html&amp;#34;&amp;gt;Biden to Name a Critic of Big Tech as the Top Antitrust Cop Jonathan Kanter, a longtime antitrust lawyer, has built his career largely around working for smaller rivals of Google, Facebook, Amazon and Apple. By Lauren Hirsch and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210721-040842/</link>
      <pubDate>Wed, 21 Jul 2021 04:08:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210721-040842/</guid>
      <description>Try Retool&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210721-001832/</link>
      <pubDate>Wed, 21 Jul 2021 00:18:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210721-001832/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/separate-eop-flaws-let-hackers-gain-full-control-of-windows-and-linux-systems/&amp;#34;&amp;gt;Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Both OSes have flaws that allow attackers with a toehold to elevate access.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-001831/</link>
      <pubDate>Wed, 21 Jul 2021 00:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210721-001831/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-funeral/haiti-appoints-new-prime-minister-in-wake-of-presidents-assassination-idUSKBN2EQ238&amp;#34;&amp;gt;Haiti appoints new prime minister in wake of president&amp;#39;s assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -Haiti&amp;amp;#39;s government on Tuesday formally appointed Ariel Henry as prime minister, nearly two weeks after President Jovenel Moise was gunned down in a murder plot that likely extends far beyond the Caribbean country&amp;amp;#39;s borders.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/change-is-coming-perus-castillo-faces-a-divided-nation-after-election-battle-idUSKBN2EQ21C&amp;#34;&amp;gt;&amp;amp;#39;Change is coming&amp;amp;#39;: Peru&amp;amp;#39;s Castillo faces a divided nation after election battle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210721-001714/</link>
      <pubDate>Wed, 21 Jul 2021 00:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210721-001714/</guid>
      <description>A perverse reaction I’ve seen from some &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/0xcharlie/status/1417482008373104654&amp;#34;&amp;gt;security experts&amp;lt;/a&amp;gt; is to shrug and say “there’s no such thing as perfect security.” More concretely, some folks argue, this kind of well-resourced targeted attack is fundamentally impossible to prevent — no matter how much effort companies like Apple put into stopping it.&amp;lt;br&amp;gt;
By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/author/matthewdgreen/&amp;#34;&amp;gt;Matthew Green&amp;lt;/a&amp;gt; in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/apple/&amp;#34;&amp;gt;Apple&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/attacks/&amp;#34;&amp;gt;attacks&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/backdoors/&amp;#34;&amp;gt;backdoors&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/malware/&amp;#34;&amp;gt;malware&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/&amp;#34;&amp;gt;July 20, 2021 July 20, 2021&amp;lt;/a&amp;gt; 1,417 Words &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210721-000717/</link>
      <pubDate>Wed, 21 Jul 2021 00:07:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210721-000717/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/spam-kingpin-peter-levashov-gets-time-served/&amp;#34;&amp;gt;Spam Kingpin Peter Levashov Gets Time Served&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Peter Levashov, appearing via Zoom at his sentencing hearing today.&amp;lt;br&amp;gt;
A federal judge in Connecticut today handed down a sentence of time served to spam kingpin &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=peter&#43;severa&amp;amp;x=0&amp;amp;y=0&amp;#34;&amp;gt;Peter “Severa” Levashov&amp;lt;/a&amp;gt; , a prolific purveyor of malicious and junk email, and the creator of malware strains that infected millions of Microsoft computers globally. Levashov has been in federal custody since his extradition to the United States and guilty plea in 2018, and was facing up to 12 more years in prison. Instead, he will go free under three years of supervised release and a possible fine.&amp;lt;br&amp;gt;
A native of St. Petersburg, Russia, the 40-year-old Levashov operated under the hacker handle “Severa.” Over the course of his 15-year cybercriminal career, Severa would emerge as a pivotal figure in the cybercrime underground, serving as the primary moderator of a spam community that spanned multiple top Russian cybercrime forums.&amp;lt;br&amp;gt;
Severa created and then leased out to others some of the nastiest cybercrime engines in history — including the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Storm_Worm&amp;#34;&amp;gt;Storm worm&amp;lt;/a&amp;gt; , and the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=waledac&amp;amp;x=0&amp;amp;y=0&amp;#34;&amp;gt;Waledac&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=kelihos&amp;amp;x=0&amp;amp;y=0&amp;#34;&amp;gt;Kelihos&amp;lt;/a&amp;gt; spam botnets. His central role in the spam forums gave Severa a prime spot to advertise the services tied to his various botnets, while allowing him to keep tabs on the activities of other spammers.&amp;lt;br&amp;gt;
Severa rented out segments of his Waledac botnet to anyone seeking a vehicle for sending spam. For $200, vetted users could hire his botnet to blast one million emails containing malware or ads for male enhancement drugs. Junk email campaigns touting employment or “money mule” scams cost $300 per million, and phishing emails could be blasted out through Severa’s botnet for the bargain price of $500 per million.&amp;lt;br&amp;gt;
Severa was a moderator on the Russian spam community Spamdot[.]biz. In this paid ad from 2004, Severa lists prices to rent his spam botnet.&amp;lt;br&amp;gt;
Early in his career, Severa worked very closely with two major purveyors of spam. One was Alan Ralsky , an American spammer who was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Alan_Ralsky&amp;#34;&amp;gt;convicted in 2009&amp;lt;/a&amp;gt; of paying Severa and other spammers to promote pump-and-dump stock scams.&amp;lt;br&amp;gt;
The other was a major spammer who went by the nickname “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/06/rustock-botnet-suspect-sought-job-at-google/&amp;#34;&amp;gt;Cosma&amp;lt;/a&amp;gt; ,” the cybercriminal thought to be responsible for managing the Rustock botnet (so named because it was a Russian botnet frequently used to send pump-and-dump stock spam). Microsoft, which has battled to scrub botnets like Rustock off of millions of PCs, later &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/07/microsoft-offers-250k-bounty-for-rustock-author/&amp;#34;&amp;gt;offered a still-unclaimed $250,000 reward&amp;lt;/a&amp;gt; for information leading to the arrest and conviction of the Rustock author.&amp;lt;br&amp;gt;
Severa ran several affiliate programs that paid cybercriminals to trick people into installing fake antivirus software. In 2011, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2011/07/spam-fake-av-like-ham-eggs/&amp;#34;&amp;gt;KrebsOnSecurity dissected “SevAntivir”&amp;lt;/a&amp;gt; — Severa’s eponymous fake antivirus affiliate program  — showing it was used to deploy new copies of the Kelihos spam botnet.&amp;lt;br&amp;gt;
A screenshot of the “SevAntivir” fake antivirus or “scareware” affiliate program run by Severa.&amp;lt;br&amp;gt;
In 2010, Microsoft — in tandem with a number of security researchers — launched a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2010/02/microsoft-ambushes-waledac-botnet-shutters-whistleblower-site/&amp;#34;&amp;gt;combined technical and legal sneak attack&amp;lt;/a&amp;gt; on the Waledac botnet, successfully dismantling it. The company would later do the same &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2012/03/researchers-clobber-khelios-spam-botnet/&amp;#34;&amp;gt;to the Kelihos botnet&amp;lt;/a&amp;gt; , a global spam machine which shared a great deal of code with Waledac and infected more than 110,000 Microsoft Windows PCs.&amp;lt;br&amp;gt;
Levashov was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2017/04/alleged-spam-king-pyotr-levashov-arrested/&amp;#34;&amp;gt;arrested in 2017&amp;lt;/a&amp;gt; while in Barcelona, Spain with his family. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wired.com/2017/04/fbi-took-russias-spam-king-massive-botnet/&amp;#34;&amp;gt;a lengthy April 2017 story in Wired.com&amp;lt;/a&amp;gt; , he got caught because he &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/the-wages-of-password-re-use-your-money-or-your-life/&amp;#34;&amp;gt;violated a basic security no-no&amp;lt;/a&amp;gt; : He used the same log-in credentials to both run his criminal enterprise and log into sites like iTunes .&amp;lt;br&amp;gt;
In fighting his extradition to the United States, Levashov famously told the media, “If I go to the U.S., I will die in a year.” But a few months after his extradition, Levashov would plead guilty to four felony counts, including intentional damage to protected computers, conspiracy, wire fraud and aggravated identity theft.&amp;lt;br&amp;gt;
At his sentencing hearing today, Levashov thanked his wife, attorney and the large number of people who wrote the court in support of his character, but otherwise declined to make a statement. His attorney read a lengthy statement explaining that Levashov got into spamming as a way to provide for his family, and that over a period of many years that business saw him supporting countless cybercrime operations. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/spam-kingpin-peter-levashov-gets-time-served/#more-56098&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-202302/</link>
      <pubDate>Tue, 20 Jul 2021 20:23:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-202302/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132951_the-warlord-is-a-wild-250-000-ram-1500-trx-6x6-ready-for-the-apocalypse&amp;#34;&amp;gt;The Warlord is a wild $250,000 Ram 1500 TRX 6x6 ready for the apocalypse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210720-202134/</link>
      <pubDate>Tue, 20 Jul 2021 20:21:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210720-202134/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/20/technology/apple-return-to-office-delay.html&amp;#34;&amp;gt;Apple delays its return to office as the Delta variant surges. Employees are now expected to come back to the workplace as early as October, a month later than planned. By Jack Nicas and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-201911/</link>
      <pubDate>Tue, 20 Jul 2021 20:19:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-201911/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-cyber-nso-france/frances-macron-targeted-in-project-pegasus-spyware-case-le-monde-idUSKBN2EQ0T9&amp;#34;&amp;gt;France&amp;#39;s Macron targeted in project Pegasus spyware case - Le Monde&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-politics-cummings/we-discussed-ousting-johnson-ex-adviser-to-uk-prime-minister-says-idUSKBN2EQ20Y&amp;#34;&amp;gt;We discussed ousting Johnson, ex-adviser to UK prime minister says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210720-201853/</link>
      <pubDate>Tue, 20 Jul 2021 20:18:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210720-201853/</guid>
      <description>Cecilia Kang covers technology and regulation and joined The Times in 2015. She is the co-author, along with Sheera Frankel of The Times, of “An Ugly Truth: Inside Facebook&amp;#39;s Battle for Domination.”&amp;lt;br&amp;gt;
More&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210720-201745/</link>
      <pubDate>Tue, 20 Jul 2021 20:17:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210720-201745/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/&amp;#34;&amp;gt;A case against security nihilism&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
This week a group of global newspapers is running a series of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/&amp;#34;&amp;gt;articles&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theguardian.com/world/2021/jul/20/pegasus-project-turns-spotlight-on-spyware-firm-nso-ties-to-israeli-state&amp;#34;&amp;gt;detailing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus&amp;#34;&amp;gt;abuses&amp;lt;/a&amp;gt; of NSO Group’s Pegasus spyware. If you haven’t seen any of these articles, they’re worth reading — and likely will continue to be so as more revelations leak out. The impetus for the stories is a leak comprising more than 50,000 phone numbers that are allegedly the targets of NSO’s advanced iPhone/Android malware.&amp;lt;br&amp;gt;
Notably, these targets include journalists and members of various nations’ political opposition parties — in other words, precisely the people who every thinking person worried would be the target of the mass-exploitation software that NSO sells. And indeed, that should be the biggest lesson of these stories: the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-facebook-cyber-whatsapp-nso-group/nso-owner-tells-amnesty-it-will-prevent-abuse-of-spyware-linked-to-whatsapp-breach-idUSKCN1SL26N&amp;#34;&amp;gt;bad thing&amp;lt;/a&amp;gt; everyone said would happen now has.&amp;lt;br&amp;gt;
This is a technical blog, so I won’t advocate for, say, sanctioning NSO Group or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.prnewswire.com/il/news-releases/nso-group-announces-new-human-rights-policy-and-governance-framework-300914924.html&amp;#34;&amp;gt;demanding answers from the&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.forbes.com/sites/thomasbrewster/2019/10/23/its-a-sad-day-for-human-rights--washington-post-slammed-for-its-latest-columnist-hire/&amp;#34;&amp;gt;luminaries&amp;lt;/a&amp;gt; on NSO’s “governance and compliance” committee. Instead I want to talk a bit about some of the technical lessons we’ve learned from these leaks — and even more at a high level, precisely what’s wrong with shrugging these attacks away.&amp;lt;br&amp;gt;
We should all want perfect security!&amp;lt;br&amp;gt;
Don’t feel bad, targeted attacks are super hard!&amp;lt;br&amp;gt;
A perverse reaction I’ve seen from some &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/0xcharlie/status/1417482008373104654&amp;#34;&amp;gt;security experts&amp;lt;/a&amp;gt; is to shrug and say “there’s no such thing as perfect security”. More concretely, some folks argue, this kind of well-resourced targeted attack is fundamentally impossible to prevent — no matter how much effort companies like Apple put into stopping it.&amp;lt;br&amp;gt;
And at the extremes, this argument is not wrong. NSO isn’t some script-kiddy toy. Deploying it costs hundreds of thousands of dollars, and fighting attackers with that level of resources is always difficult. Plus, the argument goes, even if we raise the bar for NSO then someone with even more resources will find their way into the gap — perhaps charging an even more absurd price. So let’s stop crapping on Apple, a company that works hard to improve the baseline security of their products, just because they’re failing to solve an impossible problem.&amp;lt;br&amp;gt;
Still that doesn’t mean today’s version of those products are doing everything they could be to stop attacks. There is certainly more that corporations like Apple and Google could be doing to protect their users. However, the only way we’re going to get those changes is if we demand them.&amp;lt;br&amp;gt;
Not all vectors are created equal&amp;lt;br&amp;gt;
Because spyware is hard to capture, we don’t know precisely how Pegasus works. The forensic details we do have come from an extensive investigation conducted by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/&amp;#34;&amp;gt;Amnesty International’s technology group&amp;lt;/a&amp;gt; . They describe a sophisticated infection process that proved capable of infecting a fully-patched iPhone 12 running the latest version of Apple’s iOS (14.6).&amp;lt;br&amp;gt;
Many attacks used “network injection” to redirect the victim to a malicious website. That technique requires some control of the local network, which makes it hard to deploy to remote users in other countries. A more worrying set of attacks appear to use Apple’s iMessage to perform “0-click” exploitation of iOS devices. Using this vector, NSO simply “throws” a targeted exploit payload at some Apple ID such as your phone number, and then sits back and waits for your zombie phone to contact its infrastructure.&amp;lt;br&amp;gt;
This is really bad. While cynics are probably correct (for now) that we probably can’t shut down every avenue for compromise, there’s good reason to believe we can close down a vector for 0-interaction compromise. And we should try to do that.&amp;lt;br&amp;gt;
What can we do to make NSO’s life harder?&amp;lt;br&amp;gt;
What we know that these attacks take advantage of fundamental &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.washingtonpost.com/technology/2021/07/19/apple-iphone-nso/&amp;#34;&amp;gt;weaknesses in Apple iMessage&amp;lt;/a&amp;gt; : most critically, the fact that iMessage will gleefully parse all sorts of complex data received from random strangers, and will do that parsing using crappy libraries written in memory unsafe languages. These issues are hard to fix, since iMessage can accept so many data formats and has been allowed to sprout so much complexity over the past few years.&amp;lt;br&amp;gt;
There is good evidence that Apple realizes the bind they’re in, since they tried to fix iMessage by barricading it behind a specialized “firewall” called &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html&amp;#34;&amp;gt;BlastDoor&amp;lt;/a&amp;gt; . But firewalls haven’t been particularly successful at preventing targeted network attacks, and there’s no reason to think that BlastDoor will do much better. (Indeed, we know it’s probably not doing its job now.)&amp;lt;br&amp;gt;
Adding a firewall is the cheap solution to the problem, and this is probably why Apple chose this as their first line of defense. But actually closing this security hole is going to require a lot more. Apple will have to re-write most of the iMessage codebase in some memory-safe language, along with many system libraries that handle data parsing. They’ll also need to widely deploy ARM mitigations like PAC and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://community.arm.com/developer/ip-products/processors/b/processors-ip-blog/posts/enhancing-memory-safety&amp;#34;&amp;gt;MTE&amp;lt;/a&amp;gt; in order to make exploitation harder. All of this work has costs and (more importantly) risks associated with it — since activating these features can break all sorts of things, and people with a billion devices can’t afford to have .001% of them crashing every day.&amp;lt;br&amp;gt;
An entirely separate area is surveillance and detection: Apple already performs some remote telemetry to detect processes doing weird things. This kind of telemetry could be expanded as much as possible while not destroying user privacy. While this wouldn’t necessarily stop NSO, it would make the cost of throwing these exploits quite a bit higher — and make them think twice before pushing them out to every random authoritarian government.&amp;lt;br&amp;gt;
It’s the scale, stupid&amp;lt;br&amp;gt;
Critics are correct that fixing these issues won’t stop exploits. The problem that companies like Apple need to solve is not preventing exploits forever, but a much simpler one: they need to screw up the economics of NSO-style mass exploitation.&amp;lt;br&amp;gt;
Targeted exploits have been around forever. What makes NSO special is not that they have some exploits. Rather: NSO’s genius is that they’ve done something that attackers were never incentivized to do in this past: democratize access to exploit technology. In other words, they’ve done precisely what every “smart” tech business is supposed to do: take something difficult and very expensive, and make it more accessible by applying the magic of scale. NSO is basically the SpaceX of surveillance.&amp;lt;br&amp;gt;
But this scalability is not inevitable.&amp;lt;br&amp;gt;
NSO can afford to maintain a 50,000 number target list because the exploits they use hit a particular “sweet spot” where the risk of losing an exploit chain — combined with the cost of developing new ones — is low enough that they can deploy them at scale. That’s why they’re willing to hand out exploitation to every idiot dictator — because right now they think they can keep the business going even if Amnesty International or CitizenLab occasionally catches them targeting some human rights lawyer.&amp;lt;br&amp;gt;
But companies like Apple and Google can raise both the cost and risk of exploitation — not just everywhere, but at least on specific channels like iMessage. This could make NSO’s scaling model much harder to maintain. A world where only a handful of very rich governments can launch exploits (under very careful vetting and controlled circumstances) isn’t a great world, but it’s better than a world where any tin-pot authoritarian can cut a check to NSO and surveil their political opposition or some random journalist.&amp;lt;br&amp;gt;
So how do we get to that world?&amp;lt;br&amp;gt;
In a perfect world, US and European governments would wake up and realize that arming authoritarianism is really is bad for democracy — and that whatever trivial benefit they get from NSO is vastly outweighed by the very real damage this technology is doing to journalism and democratic governance worldwide.&amp;lt;br&amp;gt;
But I’m not holding my breath for that to happen.&amp;lt;br&amp;gt;
In the world I inhabit, I’m hoping that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Ivan_Krsti%C4%87&amp;#34;&amp;gt;Ivan Krstić&amp;lt;/a&amp;gt; wakes up tomorrow and tells his bosses he wants to put NSO out of business. And I’m hoping that his bosses say “great: here’s a blank check.” Maybe they’ll succeed and maybe they’ll fail, but I’ll bet they can at least make NSO’s life interesting.&amp;lt;br&amp;gt;
But Apple isn’t going to do any of this if they don’t think they have to, and they won’t think they have to if people aren’t calling for their heads. The only people who can fix Apple devices are Apple (very much by their own design) and that means Apple has to feel responsible each time an innocent victim gets pwned while using an Apple device. If we simply pat Apple on the head and say “gosh, targeted attacks are hard, it’s not your fault” then this is exactly the level of security we should expect to get — and we’ll deserve it.&amp;lt;br&amp;gt;
By &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/author/matthewdgreen/&amp;#34;&amp;gt;Matthew Green&amp;lt;/a&amp;gt; in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/apple/&amp;#34;&amp;gt;Apple&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/attacks/&amp;#34;&amp;gt;attacks&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/backdoors/&amp;#34;&amp;gt;backdoors&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/category/malware/&amp;#34;&amp;gt;malware&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/&amp;#34;&amp;gt;July 20, 2021 July 20, 2021&amp;lt;/a&amp;gt; 1,417 Words &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2021/07/20/a-case-against-security-nihilism/&amp;#34;&amp;gt;A case against security nihilism&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210720-201633/</link>
      <pubDate>Tue, 20 Jul 2021 20:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210720-201633/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/protecting-more-with-site-isolation.html&amp;#34;&amp;gt;Protecting more with Site Isolation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Charlie Reis​ and Alex Moshchuk, Chrome Security Team&amp;lt;br&amp;gt;
Chrome&amp;amp;#39;s Site Isolation is an essential security defense that makes it harder for malicious web sites to steal data from other web sites. On Windows, Mac, Linux, and Chrome OS, Site Isolation &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2018/07/mitigating-spectre-with-site-isolation.html&amp;#34;&amp;gt;protects all web sites&amp;lt;/a&amp;gt; from each other, and also ensures they &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chromium.org/2017/05/improving-extension-security-with-out.html&amp;#34;&amp;gt;do not share processes with extensions&amp;lt;/a&amp;gt; , which are more highly privileged than web sites. As of Chrome 92, we will start extending this capability so that extensions can no longer share processes with each other. This provides an extra line of defense against malicious extensions, without removing any existing extension capabilities.&amp;lt;br&amp;gt;
Meanwhile, Site Isolation on Android currently focuses on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chromium.org/2019/10/recent-site-isolation-improvements.html&amp;#34;&amp;gt;protecting only high-value sites&amp;lt;/a&amp;gt; , to keep performance overheads low. Today, we are announcing two Site Isolation improvements that will protect more sites for our Android users. Starting in Chrome 92, Site Isolation will apply to sites where users log in via third-party providers, as well as sites that carry Cross-Origin-Opener-Policy headers.&amp;lt;br&amp;gt;
Our ongoing goal with Site Isolation for Android is to offer additional layers of security without adversely affecting the user experience for resource-constrained devices. Site Isolation for all sites continues to be too costly for most Android devices, so our strategy is to improve heuristics for prioritizing sites that benefit most from added protection. So far, Chrome has been isolating sites where users log in by entering a password. However, many sites allow users to authenticate on a third-party site (for example, sites that offer &amp;amp;#34;Sign in with Google&amp;amp;#34;), possibly without the user ever typing in a password. This is most commonly accomplished with the industry-standard &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://oauth.net/2/&amp;#34;&amp;gt;OAuth protocol&amp;lt;/a&amp;gt; . Starting in Chrome 92, Site Isolation will recognize common OAuth interactions and protect sites relying on OAuth-based login, so that user data is safe however a user chooses to authenticate.&amp;lt;br&amp;gt;
Additionally, Chrome will now trigger Site Isolation based on the new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy&amp;#34;&amp;gt;Cross-Origin-Opener-Policy&amp;lt;/a&amp;gt; (COOP) response header. Supported since Chrome 83, this header allows operators of security-conscious websites to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://html.spec.whatwg.org/dev/origin.html#cross-origin-opener-policies&amp;#34;&amp;gt;request a new browsing context group&amp;lt;/a&amp;gt; for certain HTML documents. This allows the document to better isolate itself from untrustworthy origins, by preventing attackers from referencing or manipulating the site&amp;amp;#39;s top-level window. It’s also one of the headers required to use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.dev/coop-coep/&amp;#34;&amp;gt;powerful APIs&amp;lt;/a&amp;gt; such as SharedArrayBuffers. Starting in Chrome 92, Site Isolation will treat non-default values of the COOP header on any document as a signal that the document&amp;amp;#39;s underlying site may have sensitive data and will start isolating such sites. Thus, site operators who wish to ensure their sites are protected by Site Isolation on Android can do so by serving COOP headers on their sites.&amp;lt;br&amp;gt;
As before, Chrome stores newly isolated sites locally on the device and clears the list whenever users clear their browsing history or other site data. Additionally, Chrome places certain restrictions on sites isolated by COOP to keep the list focused on recently-used sites, prevent it from growing overly large, and protect it from misuse (e.g., by requiring user interaction on COOP sites before adding them to the list). We continue to require a minimum RAM threshold (currently 2GB) for these new Site Isolation modes. With these considerations in place, our data suggests that the new Site Isolation improvements do not noticeably impact Chrome&amp;amp;#39;s overall memory usage or performance, while protecting many additional sites with sensitive user data.&amp;lt;br&amp;gt;
Given these improvements in Site Isolation on Android, we have also decided to disable &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://v8.dev/blog/spectre&amp;#34;&amp;gt;V8 runtime mitigations&amp;lt;/a&amp;gt; for Spectre on Android. These mitigations are less effective than Site Isolation and impose a performance cost. Disabling them brings Android on par with desktop platforms, where they have been turned off since Chrome 70. We advise that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chromium.org/2021/03/mitigating-side-channel-attacks.html&amp;#34;&amp;gt;sites wanting to protect data from Spectre should consider serving COOP headers&amp;lt;/a&amp;gt; , which will in turn trigger Site Isolation.&amp;lt;br&amp;gt;
Users who desire the most complete protection for their Android devices may manually opt in to full Site Isolation via chrome://flags/#enable-site-per-process, which will isolate all websites but carry higher memory cost.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/advancing-inclusive-diverse-security.html&amp;#34;&amp;gt;Advancing an inclusive, diverse security industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Sarah Morales, Community Outreach Manager, Security It’s no secret that lack of diversity in corporate America is a well-documented problem and improvements have been slow. To help improve female representation in the cybersecurity industry, Google teamed up with ... &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/advancing-inclusive-diverse-security.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Sarah Morales, Community Outreach Manager, Security It’s no secret that lack of diversity in corporate America is a well-documented problem and improvements have been slow. To help improve female representation in the cybersecurity industry, Google teamed up with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wicys.org/&amp;#34;&amp;gt;Women in Cybersecurity (WiCyS)&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.sans.org/&amp;#34;&amp;gt;SANS Institute&amp;lt;/a&amp;gt; a year ago to establish the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wicys.org/benefits/security-training-scholarship/&amp;#34;&amp;gt;Security Training Scholarship Program&amp;lt;/a&amp;gt; . The multi-stage security training program set participants on a path to launch and advance their careers in cybersecurity through skills development, introducing them to fundamental cybersecurity concepts with interactive challenges like Capture the Flag (CTF) and the SANS CyberStart Game, which introduces topics such as Linux, web attacks, programming, forensics, and more. Mentors and peers guide the participants through each stage of the program and top qualifiers then graduate and receive access to the SANS foundational security training courses, which readies and prepares these women for their first roles in the security industry. The goal is to get them employed in cybersecurity within the next 1.5 years and to create a powerful network of women in the field – in essence, drawing more women to the industry and helping to close the talent gap. As the inaugural program comes to an end, we are proud to report that its overall impact includes:&amp;lt;br&amp;gt;
112 people received training-based scholarship&amp;lt;br&amp;gt;
15 Full Scholarship Recipients received the full course training, which includes:&amp;lt;br&amp;gt;
CyberStart Game and SANS BootUp CTF&amp;lt;br&amp;gt;
SANS SEC275 Foundations &amp;amp;amp; Exam&amp;lt;br&amp;gt;
SANS 401 Security Essentials Bootcamp and GSEC&amp;lt;br&amp;gt;
Elective - SANS SEC504/GCIH, SEC488/GCLD, SEC560/GPEN, or SEC548/GWAPT&amp;lt;br&amp;gt;
24 certifications earned to date with 100% pass rate, with average score on GSEC 90%&amp;lt;br&amp;gt;
Since 2013, only 2 people have scored 99% on GIAC Certified Incident Handler (GCIH) one is a WiCyS Scholarship Recipient&amp;lt;br&amp;gt;
1/3  of students were employed in direct information security roles before the program ended&amp;lt;br&amp;gt;
100% of Full Scholarship Recipients intend to have long term careers in information security (15&#43; years)&amp;lt;br&amp;gt;
Participants praise the program’s strong networking component where they can support one another, share best practices, ask questions from SANS security experts and receive industry insight from members across Google’s security team. As Lynn Dohm, executive director of WiCyS, told us, “You cannot put a price tag on the power of community, and last year’s WiCyS Security Training Program proved just that.” Here at Google, we are inspired by the dedication and passion the scholarship recipients have shown throughout the program and are eager to see what they accomplish throughout their careers. Elizabeth Beattie, who was part of the inaugural program told us, “I learned that, as part of my scholarship program with WiCyS, SANS Institute and Google, I’ve been awarded a scholarship to attend the WiCyS 2021 conference in September. In fact, I’ve volunteered to co-author a panel there with some of my amazing fellow recipients. And the crowning achievement? Tonight, I passed my first GIAC certification (GSEC)!” Despite these great results, we know there is still a lot of work to be done to help educate and develop a more inclusive information security workforce. So this year we are expanding the Security Trainings Scholarship Program to help us reach even more women and generate a steady stream of talent in the field of information security. This expansion would not have been possible without the added support of Facebook and Bloomberg, who have come on board this year to boost this important program. “We are thrilled to scale the program this year, powered by scholarships from Google, Bloomberg, and Facebook,” said Dohm. “Now, more WiCyS members will be able to dive deep and change the trajectory of their career in less than a year, all within a cohort setting with extensive support and resources provided by mentors and colleagues. That’s what empowerment looks like, and we are thrilled that these three incredible strategic partners of WiCyS can make this happen for not only the WiCyS community, but also for the sake of the cybersecurity workforce at large.” The next round of scholarships is open through August 2, 2021. To learn more and apply, please visit the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.wicys.org/benefits/security-training-scholarship/&amp;#34;&amp;gt;WiCyS application page&amp;lt;/a&amp;gt; . We can’t wait to meet the next cohort of recipients.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210720-200719/</link>
      <pubDate>Tue, 20 Jul 2021 20:07:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210720-200719/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/&amp;#34;&amp;gt;Don’t Wanna Pay Ransom Gangs? Test Your Backups.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Browse the comments on virtually any story about a ransomware attack and you will almost surely encounter the view that the victim organization could have avoided paying their extortionists if only they’d had proper data backups. But the ugly truth is there are many non-obvious reasons why victims end up paying even when they have done nearly everything right from a data backup perspective.&amp;lt;br&amp;gt;
This story isn’t about what organizations do in response to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2020/11/why-paying-to-delete-stolen-data-is-bonkers/&amp;#34;&amp;gt;cybercriminals holding their data for hostage&amp;lt;/a&amp;gt; , which has become something of a best practice among most of the top ransomware crime groups today. Rather, it’s about why victims still pay for a key needed to decrypt their systems even when they have the means to restore everything from backups on their own.&amp;lt;br&amp;gt;
Experts say the biggest reason ransomware targets and/or their insurance providers still pay when they already have reliable backups is that nobody at the victim organization bothered to test in advance how long this data restoration process might take.&amp;lt;br&amp;gt;
“In a lot of cases, companies do have backups, but they never actually tried to restore their network from backups before, so they have no idea how long it’s going to take,” said Fabian Wosar , chief technology officer at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.emsisoft.com&amp;#34;&amp;gt;Emsisoft&amp;lt;/a&amp;gt; . “Suddenly the victim notices they have a couple of petabytes of data to restore over the Internet, and they realize that even with their fast connections it’s going to take three months to download all these backup files. A lot of IT teams never actually make even a back-of-the-napkin calculation of how long it would take them to restore from a data rate perspective.”&amp;lt;br&amp;gt;
Wosar said the next most-common scenario involves victims that have off-site, encrypted backups of their data but discover that the digital key needed to decrypt their backups was stored on the same local file-sharing network that got encrypted by the ransomware.&amp;lt;br&amp;gt;
The third most-common impediment to victim organizations being able to rely on their backups is that the ransomware purveyors manage to corrupt the backups as well.&amp;lt;br&amp;gt;
“That is still somewhat rare,” Wosar said. “It does happen but it’s more the exception than the rule. Unfortunately, it is still quite common to end up having backups in some form and one of these three reasons prevents them from being useful.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/#more-55992&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-162229/</link>
      <pubDate>Tue, 20 Jul 2021 16:22:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-162229/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132229_rml-short-wheelbase-is-styled-like-a-ferrari-250-gt-but-based-on-a-550-maranello&amp;#34;&amp;gt;RML Short Wheelbase is styled like a Ferrari 250 GT but based on a 550 Maranello&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1070214_stretched-2022-land-rover-range-rover-evoque-l-debuts-in-china&amp;#34;&amp;gt;Stretched 2022 Land Rover Range Rover Evoque L debuts in China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132311_first-lewis-hamilton-formula-one-car-up-for-grabs-sells-for-millions-at-auction&amp;#34;&amp;gt;First Lewis Hamilton Formula One car up for grabs sells for millions at auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132905_the-grand-tour-lochdown-trailer-released-arrives-on-amazon-prime-on-july-30&amp;#34;&amp;gt;&amp;amp;#34;The Grand Tour: Lochdown&amp;amp;#34; trailer released, arrives on Amazon Prime on July 30&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210720-161954/</link>
      <pubDate>Tue, 20 Jul 2021 16:19:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210720-161954/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/07/spring-cleaning-mdn-part-1/&amp;#34;&amp;gt;Spring Cleaning MDN: Part 1 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/07/spring-cleaning-mdn-part-1/&amp;#34;&amp;gt;Spring Cleaning MDN: Part 1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
As we’re all aware by now, we made some big platform changes at the end of 2020. Whilst the big move has happened, it’s given us a great opportunity to clear out the cupboards and closets.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-161840/</link>
      <pubDate>Tue, 20 Jul 2021 16:18:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-161840/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-space-exploration-blueorigin/best-day-ever-billionaire-bezos-has-successful-first-space-jaunt-idUSKBN2EQ0EP&amp;#34;&amp;gt;&amp;#39;Best day ever&amp;#39;: billionaire Bezos has successful first space jaunt&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; | Nature Search Results</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210720-161710/</link>
      <pubDate>Tue, 20 Jul 2021 16:17:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210720-161710/</guid>
      <description>&amp;lt;p&amp;gt;Journal&amp;lt;br&amp;gt;
All&amp;lt;br&amp;gt;
Apply filters&amp;lt;br&amp;gt;
Clear selection&amp;lt;br&amp;gt;
Article type&amp;lt;br&amp;gt;
Astronomy and planetary science&amp;lt;br&amp;gt;
Business and industry&amp;lt;br&amp;gt;
Chemistry&amp;lt;br&amp;gt;
Climate sciences&amp;lt;br&amp;gt;
Ecology&amp;lt;br&amp;gt;
Engineering&amp;lt;br&amp;gt;
Environmental sciences&amp;lt;br&amp;gt;
Evolution&amp;lt;br&amp;gt;
Genetics&amp;lt;br&amp;gt;
Health care&amp;lt;br&amp;gt;
Immunology&amp;lt;br&amp;gt;
Materials science&amp;lt;br&amp;gt;
Medical research&amp;lt;br&amp;gt;
Microbiology&amp;lt;br&amp;gt;
Physics&amp;lt;br&amp;gt;
Planetary science&amp;lt;br&amp;gt;
Psychology&amp;lt;br&amp;gt;
Scientific community&amp;lt;br&amp;gt;
Social sciences&amp;lt;br&amp;gt;
Solid Earth sciences&amp;lt;br&amp;gt;
Date&amp;lt;br&amp;gt;
&amp;amp;lt;a rel=&amp;amp;ldquo;noreferrer&amp;amp;rdquo; target=&amp;amp;quot;_blank&amp;amp;quot; href=&amp;amp;ldquo;&amp;lt;a href=&amp;#34;https://www.nature.com/search?q=&amp;#34;&amp;gt;https://www.nature.com/search?q=&amp;lt;/a&amp;gt;&amp;amp;quot;Alexandra Witze&amp;amp;quot;&amp;amp;quot;&amp;amp;gt;Clear all filters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:;&amp;#34;&amp;gt;Sort by Date — most recent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Working with the United Nations, scientists hope to establish standards for satellite ‘megaconstellations’ and reduce disruption of astronomical observations.&amp;lt;br&amp;gt;
Alexandra Witze&amp;lt;br&amp;gt;
News 16 Jul 2021&amp;lt;br&amp;gt;
Nature&amp;lt;br&amp;gt;
Scientists are mapping correlations between race, poverty and heat in cities, and suggesting solutions to reduce the dangers.&amp;lt;br&amp;gt;
Volume: 595, P: 349-351&amp;lt;br&amp;gt;
Scientists searching for extraterrestrial life should narrow their hunt to stars and planetary systems that have an occasional view of Earth as it passes in front of the Sun.&amp;lt;br&amp;gt;
News 23 Jun 2021&amp;lt;br&amp;gt;
Investigations at Lund University found the high-ranking pair guilty of bullying, but staff members say stronger action is needed to repair the damage.&amp;lt;br&amp;gt;
Videos of the surprising phenomenon could help researchers to better understand natural ‘dust devils’ blowing across the red planet.&amp;lt;br&amp;gt;
Volume: 594, P: 484&amp;lt;br&amp;gt;
Space agency aims to breathe new life into its Earth-science programme as US President Joe Biden pushes an ambitious climate agenda.&amp;lt;br&amp;gt;
News 07 May 2021&amp;lt;br&amp;gt;
NASA’s Ingenuity helicopter successfully hovered for 40 seconds in Mars’s thin atmosphere.&amp;lt;br&amp;gt;
News 19 Apr 2021&amp;lt;br&amp;gt;
US president’s first budget proposal emphasizes applied research and public health, and aims to tackle climate change and racial injustice.&amp;lt;br&amp;gt;
Jeff Tollefson&amp;lt;br&amp;gt;
Amy Maxmen&amp;lt;br&amp;gt;
As the US president announces his advisers and agency heads, Nature’ s guide tracks the appointees who matter most to science.&amp;lt;br&amp;gt;
Nidhi Subbaraman&amp;lt;br&amp;gt;
News 19 Mar 2021&amp;lt;br&amp;gt;
The search for COVID vaccines that can be self-administered, fight new variants and survive the heat. Plus, tear-gland organoids that cry and the winners of the Abel Prize.&amp;lt;br&amp;gt;
Flora Graham&amp;lt;br&amp;gt;
Mars becomes the first inner planet after Earth to have the size of its core estimated with seismology.&amp;lt;br&amp;gt;
No signs of past life have emerged yet, but rocks at the landing site show signs of having been shaped by wind and water.&amp;lt;br&amp;gt;
A whirlwind geological journey in which the past meets the present and the future.&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 16 Mar 2021&amp;lt;br&amp;gt;
Despite pandemic disruption, astronomers detected thousands of previously unknown near-Earth asteroids last year.&amp;lt;br&amp;gt;
The NASA spacecraft has also snapped more shots of its surroundings and listened to a Martian wind gust.&amp;lt;br&amp;gt;
News 22 Feb 2021&amp;lt;br&amp;gt;
Having stuck its nail-biting landing, the Perseverance rover will now collect rocks to return to Earth and record Mars sounds for the first time.&amp;lt;br&amp;gt;
Fierce competition between nineteenth century astronomers has inspired our fascination with the red planet over the years. Plus: why scientists think the virus that causes COVID-19 is here to stay.&amp;lt;br&amp;gt;
Emma Stoye&amp;lt;br&amp;gt;
The Perseverance spacecraft, due to land this week, aims to scour Jezero Crater and collect the first rocks from the red planet.&amp;lt;br&amp;gt;
The broken promise that undermines human genome research. Plus, China and UAE missions have both successfully reached Mars, and we are flushing away valuable phosphorus.&amp;lt;br&amp;gt;
Historian Patricia Fara curates caricatures that provide snapshots of social and political debates around the emergence of modern research.&amp;lt;br&amp;gt;
Comments &amp;amp;amp; Opinion 01 Feb 2021&amp;lt;br&amp;gt;
New studies knock down a controversial report observing phosphine in the planet’s atmosphere.&amp;lt;br&amp;gt;
News 28 Jan 2021&amp;lt;br&amp;gt;
US president-elect also elevates the position to the cabinet for the first time.&amp;lt;br&amp;gt;
Scientists seek guidance on exploring frozen caches at the lunar poles responsibly.&amp;lt;br&amp;gt;
Team detects a huge increase and says it could be due to climate change, but others can’t confirm the findings.&amp;lt;br&amp;gt;
News 17 Dec 2020&amp;lt;br&amp;gt;
NASA’s InSight mission yields the first data on the internal structure of a planet other than Earth.&amp;lt;br&amp;gt;
Mars missions, record-breaking wildfires and a room-temperature superconductor are among this year’s top non-COVID stories.&amp;lt;br&amp;gt;
Davide Castelvecchi&amp;lt;br&amp;gt;
The coronavirus pandemic shaped the year in research — from vaccines and treatments to campus shutdowns and virtual meetings.&amp;lt;br&amp;gt;
Ewen Callaway&amp;lt;br&amp;gt;
Heidi Ledford&amp;lt;br&amp;gt;
Instrument platform crashed into the telescope’s dish, irrevocably ending the facility’s role in astronomy.&amp;lt;br&amp;gt;
New satellite image reveals the damage that shut down the facility, ending an era in astronomical observation.&amp;lt;br&amp;gt;
News 19 Nov 2020&amp;lt;br&amp;gt;
Debate continues over controversial report of phosphine in the planet’s atmosphere, as researchers reanalyse data and find a fainter signal.&amp;lt;br&amp;gt;
A sociologist embedded in the agency shows that what gets discovered depends on how scientists collaborate.&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 16 Nov 2020&amp;lt;br&amp;gt;
The new president has the opportunity to reverse four years of anti-science policies — but he has a hard road ahead as he inherits a nation divided.&amp;lt;br&amp;gt;
A graphical guide to the research carried out on the International Space Station — and who did it.&amp;lt;br&amp;gt;
Howard Hughes Medical Institute’s six-figure donation is a step towards addressing racial injustice in the sciences.&amp;lt;br&amp;gt;
News 29 Oct 2020&amp;lt;br&amp;gt;
OSIRIS-REx spacecraft successfully executes a nail-biting manoeuvre to scoop up rock samples from the asteroid Bennu and send them back to Earth.&amp;lt;br&amp;gt;
The coronavirus pandemic, climate change and space exploration are among the issues that Biden will influence if he wins the upcoming US election.&amp;lt;br&amp;gt;
Heat waves, winds and thin ice contribute to a ‘new normal’ in the north’s climate.&amp;lt;br&amp;gt;
News 22 Sept 2020&amp;lt;br&amp;gt;
Fires are releasing record levels of carbon dioxide, partly because they are burning ancient peatlands that have been a carbon sink.&amp;lt;br&amp;gt;
Most detailed report yet about the impact of giant satellite clusters says damage to observations is unavoidable — and offers mitigation strategies.&amp;lt;br&amp;gt;
News 26 Aug 2020&amp;lt;br&amp;gt;
One-time head of the US National Science Foundation Rita Colwell speaks out on sexism — and how her experiences as a leader in science can inform pandemic response.&amp;lt;br&amp;gt;
Perseverance will stow away rocks for eventual delivery to Earth, and will listen for Martian sounds for the first time.&amp;lt;br&amp;gt;
As NASA prepares to launch the first spacecraft that will collect samples from Mars, Nature looks at back at missions that have grabbed extraterrestrial material.&amp;lt;br&amp;gt;
A three minute guide to why 2020 is the year of Mars launches.&amp;lt;br&amp;gt;
Spain launches the largest test yet of no-strings-attached income — but it’s not truly universal. Plus: how group testing could transform the hunt for coronavirus cases, and PhD students in Australia face financial meltdown.&amp;lt;br&amp;gt;
As three nations prepare to send spacecraft to Mars, a planetary scientist offers her personal tour of those who led the way. By Alexandra Witze&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 09 Jul 2020&amp;lt;br&amp;gt;
The United States, China and the United Arab Emirates will soon launch missions to a notoriously dangerous destination for spacecraft.&amp;lt;br&amp;gt;
Smriti Mallapaty&amp;lt;br&amp;gt;
Elizabeth Gibney&amp;lt;br&amp;gt;
Top epidemiologist Jayaprakash Muliyil says we don’t yet know the true scale of the epidemic in India. Plus, CRISPR wreaks chromosomal mayhem in human embryos and why boring is good for two nearby exoplanets.&amp;lt;br&amp;gt;
A nearby red dwarf doesn’t emit flares or harmful radiation — so its planets might have atmospheres.&amp;lt;br&amp;gt;
Systemic racism, sexual harassment and institutional bias permeate a film about three female scientists, who have survived and thrived.&amp;lt;br&amp;gt;
Books &amp;amp;amp; Arts 24 Jun 2020&amp;lt;br&amp;gt;
Latest action sows anxiety and confusion across the US scientific workforce.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210720-160845/</link>
      <pubDate>Tue, 20 Jul 2021 16:08:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210720-160845/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/saltpay-customer-story/&amp;#34;&amp;gt;How SaltPay consolidated 10 back office tasks into one app This is the story of how SaltPay was able to bring together critical user data and support workflows into one Retool app to replace a disjointed and slow customer support process.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-122054/</link>
      <pubDate>Tue, 20 Jul 2021 12:20:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-122054/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132892_2020-alfa-romeo-4c-spider-33-tributo-says-goodbye-to-america-in-jay-leno-s-garage&amp;#34;&amp;gt;2020 Alfa Romeo 4C Spider 33 Tributo says goodbye to America in Jay Leno&amp;#39;s Garage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-121737/</link>
      <pubDate>Tue, 20 Jul 2021 12:17:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-121737/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-veterans/we-lost-some-u-s-veterans-say-blood-spilled-in-afghanistan-was-wasted-idUSKBN2EQ0YH&amp;#34;&amp;gt;&amp;#39;We lost&amp;#39;: Some U.S. veterans say blood spilled in Afghanistan was wasted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Jason Lilley was a special operations forces Marine Raider who fought in multiple battles in Iraq and Afghanistan during America&amp;amp;#39;s longest war.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-vaccines-trials/global-quest-underway-to-speed-covid-19-vaccine-trials-idUSKBN2EQ0YP&amp;#34;&amp;gt;Global quest underway to speed COVID-19 vaccine trials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/20/wipeout-of-an-olympic-dream-for-japanese?videoId=733155239&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Wipeout of an Olympic dream for Japanese surf pioneer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-082041/</link>
      <pubDate>Tue, 20 Jul 2021 08:20:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-082041/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1127047_2024-land-rover-range-rover-sport-spy-shots&amp;#34;&amp;gt;2024 Land Rover Range Rover Sport spy shots: Redesign spotted for first time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210720-081714/</link>
      <pubDate>Tue, 20 Jul 2021 08:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210720-081714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/clickless-exploits-from-israeli-firm-hacked-activists-fully-updated-iphones/&amp;#34;&amp;gt;“Clickless” exploits from Israeli firm hacked activists’ fully updated iPhones&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
NSO Group says its spyware targets only criminals and terrorists. Critics disagree.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210720-081631/</link>
      <pubDate>Tue, 20 Jul 2021 08:16:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210720-081631/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;11&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-never-been-better-to-be-talent/comments&amp;#34;&amp;gt;Comment 1&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-043707/</link>
      <pubDate>Tue, 20 Jul 2021 04:37:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210720-043707/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132944_preview-2022-porsche-macan-adds-power-tweaks-looks&amp;#34;&amp;gt;Preview: 2022 Porsche Macan adds power, tweaks looks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210720-043534/</link>
      <pubDate>Tue, 20 Jul 2021 04:35:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210720-043534/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2014/08/04/maniac-week/&amp;#34;&amp;gt;Maniac week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-043146/</link>
      <pubDate>Tue, 20 Jul 2021 04:31:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210720-043146/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-regulation-data/analysis-beyond-security-crackdown-beijing-charts-state-controlled-data-market-idUSKBN2EQ0AR&amp;#34;&amp;gt;Analysis: Beyond security crackdown, Beijing charts state-controlled data market&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
China&amp;amp;#39;s sweeping regulatory action against internet giants such as ride-hailing firm Didi Global Inc, which has sent chills through the industry, is part of a broader national project to create a domestic marketplace for the country&amp;amp;#39;s vast troves of big data.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election-fujimori/peru-socialist-castillo-confirmed-president-after-lengthy-battle-over-results-idUSKBN2EP28L&amp;#34;&amp;gt;Peru socialist Castillo confirmed president after lengthy battle over results&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cuba-exclusive/exclusive-u-s-expected-to-take-initial-steps-soon-in-aftermath-of-cuba-protests-officials-idUSKBN2EP29V&amp;#34;&amp;gt;Exclusive-U.S. expected to take initial steps soon in aftermath of Cuba protests -officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210720-000915/</link>
      <pubDate>Tue, 20 Jul 2021 00:09:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210720-000915/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-document-workflow-automation-with-revv-retool/&amp;#34;&amp;gt;Build simple and effective document workflow automation with Revv &amp;amp;amp; Retool Drafting, reviewing, tracking, signing, and storing business documents is essential—and can be painful, especially if you are still in the pen and paper era. Revv, a complete document management system, specializes in&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-202024/</link>
      <pubDate>Mon, 19 Jul 2021 20:20:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-202024/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132936_vw-passat-reaches-end-of-the-road-in-us-after-2022&amp;#34;&amp;gt;VW Passat reaches end of the road in US after 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132895_your-ecu-tune-may-soon-hold-you-up-in-california-s-smog-test&amp;#34;&amp;gt;Your ECU tune may soon hold you up in California&amp;amp;#39;s smog test&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-201655/</link>
      <pubDate>Mon, 19 Jul 2021 20:16:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-201655/</guid>
      <description>U.S. stocks end sharply lower as investors fear a spike in COVID-19 cases could derail the economic recovery&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-joseph/haiti-interim-prime-minister-joseph-set-to-step-down-this-week-idUSKBN2EP1FF&amp;#34;&amp;gt;Haiti interim prime minister Joseph set to step down this week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210719-201629/</link>
      <pubDate>Mon, 19 Jul 2021 20:16:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210719-201629/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/19/world/biden-facebook-misinformation.html&amp;#34;&amp;gt;‘Facebook isn’t killing people’: Biden softens his attack over vaccine misinformation. The president said that he wished that Facebook would “do something” about false information about Covid vaccines. By Daniel E. Slotnik and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-162044/</link>
      <pubDate>Mon, 19 Jul 2021 16:20:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-162044/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1115876_2023-bmw-x8-spy-shots-and-video&amp;#34;&amp;gt;2023 BMW X8 spy shots and video: Flagship crossover in the works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128999_rivian-r1t-pickup-deliveries-delayed-to-sept-2021-r1s-suv-to-follow&amp;#34;&amp;gt;Rivian R1T pickup deliveries delayed to Sept. 2021, R1S SUV to follow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-161728/</link>
      <pubDate>Mon, 19 Jul 2021 16:17:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-161728/</guid>
      <description>&amp;lt;p&amp;gt;US, allies to accuse China of global cyber hacking campaign &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EP0YR&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
LONDON (Reuters) -Prime Minister Boris Johnson&amp;#39;s &amp;#39;freedom day&amp;#39; ending over a year of COVID-19 lockdown restrictions in England was marred on Monday by surging infections, warnings of supermarket shortages and his own forced self-isolation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-eu-exclusive/exclusive-uk-to-warn-eu-it-may-deviate-from-brexit-deal-on-n-ireland-sources-idUSKBN2EP110&amp;#34;&amp;gt;Exclusive-UK to warn EU it may deviate from Brexit deal on N.Ireland -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-joseph/haitis-interim-prime-minister-joseph-says-he-will-step-down-idUSKBN2EP1FF&amp;#34;&amp;gt;Haiti&amp;amp;#39;s interim prime minister Joseph says he will step down&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-082014/</link>
      <pubDate>Mon, 19 Jul 2021 08:20:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210719-082014/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132640_2022-audi-rs-3-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Audi RS 3 ramps up the turbo-5 power and track capability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-081710/</link>
      <pubDate>Mon, 19 Jul 2021 08:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-081710/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-southkorea-summit/japan-s-korea-leaders-summit-in-limbo-amid-uproar-over-sexual-innuendo-idUSKBN2EO0NM&amp;#34;&amp;gt;Japan, S.Korea leaders summit in limbo amid uproar over sexual innuendo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
TOKYO/SEOUL (Reuters) -Plans to hold the first in-person summit between the leaders of Japan and South Korea have hit a snag over a disparaging comment by a Japanese diplomat about the South Korean president, the latest flare-up between the fractious neighbours.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/englands-freedom-day-marred-by-soaring-cases-and-isolation-chaos-idUSKBN2EO0LE&amp;#34;&amp;gt;England&amp;amp;#39;s &amp;amp;#39;freedom day&amp;amp;#39; marred by soaring cases and isolation chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-041853/</link>
      <pubDate>Mon, 19 Jul 2021 04:18:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-041853/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-cyber-nso/israeli-firms-spyware-used-to-target-journalists-cell-phones-reports-idUSKBN2EP042&amp;#34;&amp;gt;Israeli firm&amp;#39;s spyware used to target journalists&amp;#39; cell phones - reports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210719-041714/</link>
      <pubDate>Mon, 19 Jul 2021 04:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210719-041714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2011/12/15/whats-deal-with-rc4/&amp;#34;&amp;gt;What&amp;#39;s the deal with RC4?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-001925/</link>
      <pubDate>Mon, 19 Jul 2021 00:19:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210719-001925/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/pm-johnson-pleads-for-caution-as-freedom-day-arrives-in-england-idUSKBN2EO0LE&amp;#34;&amp;gt;PM Johnson pleads for caution as &amp;#39;Freedom Day&amp;#39; arrives in England&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-161900/</link>
      <pubDate>Sun, 18 Jul 2021 16:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-161900/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather-germany/its-terrifying-merkel-shaken-as-flood-deaths-rise-to-188-in-europe-idUSKBN2EO04T&amp;#34;&amp;gt;&amp;#39;It&amp;#39;s terrifying&amp;#39;: Merkel shaken as flood deaths rise to 188 in Europe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BERCHTESGADEN/BISCHOFSWIESEN, Germany (Reuters) -German Chancellor Angela Merkel described the flooding that has devastated parts of Europe as &amp;amp;#34;terrifying&amp;amp;#34; on Sunday after the death toll across the region rose to 188 and a district of Bavaria was battered by the extreme weather.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-saudi-haj/immunised-pilgrims-gather-for-haj-as-covid-restrictions-limit-numbers-idUSKBN2EO0CA&amp;#34;&amp;gt;Immunised pilgrims gather for haj as COVID restrictions limit numbers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210718-161819/</link>
      <pubDate>Sun, 18 Jul 2021 16:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210718-161819/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/07/18/world/covid-variant-vaccine-updates/facebook-and-the-biden-administration-trade-punches-over-vaccine-misinformation&amp;#34;&amp;gt;Facebook and the Biden administration trade punches over vaccine misinformation. This was featured in live coverage. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/17/technology/facebook-vaccine-misinformation.html&amp;#34;&amp;gt;Facebook Tells Biden: ‘Facebook Is Not the Reason’ Vaccination Goal Was Missed The social network and the Biden administration have engaged in an increasingly rancorous war of words over the issue of vaccine misinformation. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-121825/</link>
      <pubDate>Sun, 18 Jul 2021 12:18:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-121825/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather-germany/flash-floods-batter-bavaria-as-european-death-toll-rises-to-184-idUSKBN2EO04T&amp;#34;&amp;gt;Flash floods batter Bavaria as European death toll rises to 184&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BERCHTESGADEN/BISCHOFSWIESEN, Germany (Reuters) -Flash floods hit southern Germany on Sunday, killing at least one person, turning roads into rivers and adding to the flooding devastation that has claimed the lives of more than 180 people across Europe in recent days.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uk-pm-johnson-reverses-plan-to-skip-quarantine-after-covid-exposure-idUSKBN2EO059&amp;#34;&amp;gt;UK PM Johnson reverses plan to skip quarantine after COVID exposure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-religion-eid/after-war-with-israel-a-grieving-gaza-marks-eid-al-adha-holiday-idUSKBN2EO07M&amp;#34;&amp;gt;After war with Israel, a grieving Gaza marks Eid Al-Adha holiday&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210718-121110/</link>
      <pubDate>Sun, 18 Jul 2021 12:11:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210718-121110/</guid>
      <description>Brendan&amp;#39;s site:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/overview.html&amp;#34;&amp;gt;Start Here&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/index.html&amp;#34;&amp;gt;Homepage&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/index.html&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/systems-performance-2nd-edition-book.html&amp;#34;&amp;gt;Sys Perf book&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/bpf-performance-tools-book.html&amp;#34;&amp;gt;BPF Perf book&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/linuxperf.html&amp;#34;&amp;gt;Linux Perf&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/ebpf.html&amp;#34;&amp;gt;eBPF Tools&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/perf.html&amp;#34;&amp;gt;perf Examples&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/methodology.html&amp;#34;&amp;gt;Perf Methods&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/usemethod.html&amp;#34;&amp;gt;USE Method&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/tsamethod.html&amp;#34;&amp;gt;TSA Method&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/offcpuanalysis.html&amp;#34;&amp;gt;Off-CPU Analysis&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/activebenchmarking.html&amp;#34;&amp;gt;Active Bench.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/wss.html&amp;#34;&amp;gt;WSS Estimation&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/flamegraphs.html&amp;#34;&amp;gt;Flame Graphs&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/heatmaps.html&amp;#34;&amp;gt;Heat Maps&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/frequencytrails.html&amp;#34;&amp;gt;Frequency Trails&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/colonygraphs.html&amp;#34;&amp;gt;Colony Graphs&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/dtrace.html&amp;#34;&amp;gt;DTrace Tools&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/dtracetoolkit.html&amp;#34;&amp;gt;DTraceToolkit&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/dtkshdemos.html&amp;#34;&amp;gt;DtkshDemos&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/guessinggame.html&amp;#34;&amp;gt;Guessing Game&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/specials.html&amp;#34;&amp;gt;Specials&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/books.html&amp;#34;&amp;gt;Books&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/sites.html&amp;#34;&amp;gt;Other Sites&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Slides for my eBPF summit keynote &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-bpf-getting-started&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; , where I showed how to get started the easy way, as I kept seeing people start the hard way waste their own time ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-bpf-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/eBPF2020_performance_getting_started.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=wyfhjr_ufag&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2020).&amp;lt;br&amp;gt;
Slides for my YOW2020 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2020-linux-systems-performance&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , delivered online ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2020-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/YOW2020_Linux_Systems_Performance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_Lf-h5TDTN0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2020).&amp;lt;br&amp;gt;
Slides for my USENIX LISA 2019 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa2019-linux-systems-performance&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , covering observability, methodologies, benchmarking, profiling, tracing, and tuning. It&amp;#39;s intended for everyone as a tour of fundamentals, and some companies have indicated they will use it for new hire training. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa2019-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2019_Linux_Systems_Performance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=fhBHvsi0Ql0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
I wrote the original &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.oracle.com/cd/E22471_01/pdf/820-4167.pdf&amp;#34;&amp;gt;Sun ZFS Storage 7000 admin guide&amp;lt;/a&amp;gt; and online help, and while doing so created the most advanced content system within Sun Microsystems: A content wiki that could auto-generate Sun-styled PDFs and other formats, allowing versions to be built in seconds instead of the usual 2-week process. This 2010 version has many updates from other staff (I&amp;#39;ve yet to find my original 2008 PDF) (2008).&amp;lt;br&amp;gt;
The companion book to Solaris Internals 2nd Edition: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.amazon.com/gp/product/0131568191/ref=as_li_ss_tl?ie=UTF8&amp;amp;tag=deirdrestraug-20&amp;amp;linkCode=as2&amp;amp;camp=217145&amp;amp;creative=399369&amp;amp;creativeASIN=0131568191&amp;#34;&amp;gt;Solaris Performance and Tools&amp;lt;/a&amp;gt; , with Richard McDougall and Jim Mauro (Prentice Hall, 2006; ISBN 0131568191). These chapters began during development of Solaris Internals 2nd Edition, and were later split into a separate companion volume. It worked well: a reference book on internals, and a companion book for practitioners on performance. 444 pages.&amp;lt;br&amp;gt;
A 233-slide deck for a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/dtrace_workshop01_slides.pdf&amp;#34;&amp;gt;DTrace workshop&amp;lt;/a&amp;gt; that I developed and delivered in London, that summarized Solaris performance and DTrace analysis. As part of this workshop I created performance labs for the students to solve (not included in the slides). (2006)&amp;lt;br&amp;gt;
My &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/zones.html&amp;#34;&amp;gt;Solaris 10 Zones&amp;lt;/a&amp;gt; page from 2005, where I developed models for configuring Zones (containers) with Resource Controls. This was pioneering work for the performance isolation of containers (nowadays the realm of Linux cgroups). Sun later based their official docs on my work, without attribution! (Their excuse was that company policy forbid them from listing a non-Sun source as a reference.)&amp;lt;br&amp;gt;
My USENIX LISA2021 online plenary video on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;Computing Performance: On the Horizon&amp;lt;/a&amp;gt; , covering the present and future of  performance. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) (41 mins) (2021).&amp;lt;br&amp;gt;
My USENIX LISA2021 online talk video on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_5Z2AU7QTH4&amp;#34;&amp;gt;BPF Internals (eBPF)&amp;lt;/a&amp;gt; showing high-level to machine code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_5Z2AU7QTH4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) (39 mins) (2021).&amp;lt;br&amp;gt;
My eBPF summit online keynote video on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=wyfhjr_ufag&amp;#34;&amp;gt;Performance Wins with BPF: Getting Started&amp;lt;/a&amp;gt; . This was seven months into a California lockdown and, like many, I needed a haircut ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=wyfhjr_ufag&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/performance-wins-with-bpf-getting-started&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (19 mins).&amp;lt;br&amp;gt;
My YOW2020 online talk video for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_Lf-h5TDTN0&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , my first online conference talk ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_Lf-h5TDTN0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/yow2020-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (46 mins) (2020).&amp;lt;br&amp;gt;
My AWS re:Invent 2019 talk video &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;BPF Performance Analysis at Netflix&amp;lt;/a&amp;gt; includes my BPF theremin demo ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/reinvent-2019-bpf-performance-analysis-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (57 mins).&amp;lt;br&amp;gt;
My USENIX LISA 2019 talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=fhBHvsi0Ql0&amp;#34;&amp;gt;Linux Systems Performance&amp;lt;/a&amp;gt; , covering observability, methodologies, benchmarking, profiling, tracing, and tuning. Some companies have indicated they will use this video it for new hire training. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=fhBHvsi0Ql0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/lisa2019-linux-systems-performance&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (40 mins).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bcc#tools&amp;#34;&amp;gt;bcc tools&amp;lt;/a&amp;gt; (github), BPF compiler collection, for which I&amp;#39;m a major contributor, especially for performance tools.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace#tools&amp;#34;&amp;gt;bpftrace tools&amp;lt;/a&amp;gt; (github) a high-level BPF tracing language, for which I&amp;#39;m a major contributor.&amp;lt;br&amp;gt;
Last updated: 18-Jul-2021 Created: 2001 About this site, and email address: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/email.html&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; Copyright 2021 Brendan Gregg, all rights reserved&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-081913/</link>
      <pubDate>Sun, 18 Jul 2021 08:19:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-081913/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather-germany/bavaria-hit-by-floods-as-german-death-toll-climbs-to-156-idUSKBN2EO04T&amp;#34;&amp;gt;Bavaria hit by floods as German death toll climbs to 156&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Flash floods hit southern Germany on Sunday, killing at least one person and adding to the devastation after flooding in the country this week that killed more than 150 people.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-usa/iran-insists-prisoner-swap-deal-was-agreed-with-u-s-says-ready-to-proceed-today-idUSKBN2EO067&amp;#34;&amp;gt;Iran insists prisoner swap deal was agreed with U.S., says ready to proceed &amp;amp;#39;today&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210718-081844/</link>
      <pubDate>Sun, 18 Jul 2021 08:18:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210718-081844/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/07/17/world/covid-variant-vaccine-updates/after-criticism-from-biden-facebook-says-it-is-not-the-reason-the-us-missed-its-vaccination-goal&amp;#34;&amp;gt;After criticism from Biden, Facebook says it is ‘not the reason’ the U.S. missed its vaccination goal. This was featured in live coverage. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210718-081139/</link>
      <pubDate>Sun, 18 Jul 2021 08:11:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210718-081139/</guid>
      <description>Video for my AWS re:Invent 2019 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;BPF Performance Analysis at Netflix&amp;lt;/a&amp;gt; , including my BPF theremin demo ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/reinvent-2019-bpf-performance-analysis-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (57 mins).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.youtube.com/watch?v=tDacjrSCeq4&amp;#34;&amp;gt;Shouting in the Datacenter&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.youtube.com/watch?v=tDacjrSCeq4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2008-12-31/unusual-disk-latency.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) was a video that Bryan Cantrill and I made on the spur of the moment on New Year&amp;#39;s Eve 2008, which went viral (1M&#43; views). I&amp;#39;ve had many emails about it: It has spawned an industry of sound proofing data centers (2 mins). There is also a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.youtube.com/watch?v=lMPozJFC8g0&amp;#34;&amp;gt;making of&amp;lt;/a&amp;gt; ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.youtube.com/watch?v=lMPozJFC8g0&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) video (5 mins).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-041851/</link>
      <pubDate>Sun, 18 Jul 2021 04:18:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210718-041851/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather-germany-victims/germanys-floods-cover-livelihoods-in-sludge-idUSKBN2EN0EJ&amp;#34;&amp;gt;Germany&amp;#39;s floods cover livelihoods in sludge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Business owners in a town badly hit by the record flooding in Germany struggled on Saturday to pick up the pieces after their livelihoods - from old books to wine - were swept away or caked in sludge.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210718-041811/</link>
      <pubDate>Sun, 18 Jul 2021 04:18:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210718-041811/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/17/technology/facebook-biden-vaccine-misinformation-tensions.html&amp;#34;&amp;gt;Facebook Tells Biden: ‘Facebook Is Not the Reason’ Vaccination Goal Was Missed The social network hit back at the president’s criticism of social media for spreading vaccine misinformation. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-201803/</link>
      <pubDate>Sat, 17 Jul 2021 20:18:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-201803/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather/death-toll-rises-to-170-in-germany-and-belgium-floods-idUSKBN2EN099&amp;#34;&amp;gt;Death toll rises to 170 in Germany and Belgium floods&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ERFTSTADT, Germany/WASSENBERG, Germany (Reuters) -The death toll in devastating flooding in western Germany and Belgium rose to at least 170 on Saturday after burst rivers and flash floods this week collapsed houses and ripped up roads and power lines.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-unrest-government/cuban-government-holds-mass-rally-in-havana-after-protests-idUSKBN2EN0GR&amp;#34;&amp;gt;Cuban government holds mass rally in Havana after protests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-161840/</link>
      <pubDate>Sat, 17 Jul 2021 16:18:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-161840/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather/death-toll-in-rises-to-157-in-germany-and-belgium-floods-idUSKBN2EN099&amp;#34;&amp;gt;Death toll in rises to 157 in Germany and Belgium floods&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ERFTSTADT, Germany/WASSENBERG, Germany (Reuters) -Rescue workers searched flood-ravaged parts of Germany and Belgium for survivors on Saturday after burst rivers and flash floods this week collapsed houses and claimed at least 157 lives.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-paris-protest/french-protests-call-for-freedom-amid-government-vaccine-push-idUSKBN2EN0DU&amp;#34;&amp;gt;French protests call for &amp;amp;#39;freedom&amp;amp;#39; amid government vaccine push&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict/afghan-politicians-taliban-meet-in-doha-as-fighting-continues-idUSKBN2EN0CV&amp;#34;&amp;gt;Afghan politicians, Taliban meet in Doha as fighting continues&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210717-161131/</link>
      <pubDate>Sat, 17 Jul 2021 16:11:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210717-161131/</guid>
      <description>Brendan Gregg&amp;#39;s Homepage&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210717-122229/</link>
      <pubDate>Sat, 17 Jul 2021 12:22:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210717-122229/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132922_walter-r-hrl-and-the-porsche-924-carrera-gts-rally-reunited-after-40-years&amp;#34;&amp;gt;Walter Röhrl and the Porsche 924 Carrera GTS Rally reunited after 40 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132876_2022-ford-everest-2022-hyundai-santa-cruz-vw-new-auto-strategy-today-s-car-news&amp;#34;&amp;gt;2022 Ford Everest, 2022 Hyundai Santa Cruz, VW New Auto Strategy: Today&amp;amp;#39;s Car News&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-121852/</link>
      <pubDate>Sat, 17 Jul 2021 12:18:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-121852/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather/german-belgian-flood-deaths-rise-to-157-as-search-continues-idUSKBN2EN099&amp;#34;&amp;gt;German, Belgian flood deaths rise to 157 as search continues&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Rescue workers searched flood-ravaged parts of Germany and Belgium for survivors on Saturday after burst rivers and flash floods this week collapsed houses and claimed at least 157 lives.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-sanctions/china-official-in-hong-kong-says-u-s-sanctions-business-advisory-have-despicable-intention-idUSKBN2EN03B&amp;#34;&amp;gt;China official in Hong Kong says U.S. sanctions, business advisory have &amp;amp;#39;despicable intention&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-081807/</link>
      <pubDate>Sat, 17 Jul 2021 08:18:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-081807/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather-germany/german-floods-kill-at-least-133-search-for-survivors-continues-idUSKBN2EN05D&amp;#34;&amp;gt;German floods kill at least 133, search for survivors continues&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Rescue workers searched flood-ravaged parts of western Germany for survivors on Saturday as water levels remained high in many towns and houses continued to collapse in the country&amp;amp;#39;s worst natural disaster in half a century.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-041813/</link>
      <pubDate>Sat, 17 Jul 2021 04:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210717-041813/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-usa-immigration/mexico-regrets-u-s-judges-decision-on-daca-ministry-idUSKBN2EM2FB&amp;#34;&amp;gt;Mexico regrets U.S. judge&amp;#39;s decision on DACA - ministry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210717-041746/</link>
      <pubDate>Sat, 17 Jul 2021 04:17:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210717-041746/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/07/16/world/covid-variant-vaccine-updates/theyre-killing-people-biden-denounces-social-media-for-virus-disinformation&amp;#34;&amp;gt;‘They’re killing people’: Biden denounces social media for virus disinformation. This was featured in live coverage. By Zolan Kanno-Youngs and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210717-001945/</link>
      <pubDate>Sat, 17 Jul 2021 00:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210717-001945/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/disable-the-windows-print-spooler-to-prevent-hacks-microsoft-tells-customers/&amp;#34;&amp;gt;Disable the Windows print spooler to prevent hacks, Microsoft tells customers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The third serious Windows print flaw in 5 weeks prompts new Microsoft warning.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210717-001928/</link>
      <pubDate>Sat, 17 Jul 2021 00:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210717-001928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/16/us/politics/biden-facebook-social-media-covid.html&amp;#34;&amp;gt;‘They’re Killing People’: Biden Denounces Social Media for Virus Disinformation The president’s blunt statement capped weeks of frustration in the White House over the spread of vaccine disinformation on Facebook and other platforms. By Zolan Kanno-Youngs and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; : nature.com search</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210717-001844/</link>
      <pubDate>Sat, 17 Jul 2021 00:18:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210717-001844/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-01954-4&amp;#34;&amp;gt;Astronomers push for global debate on giant satellite swarms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/search?q=%22Alexandra&#43;Witze%22&amp;amp;order=date_desc&amp;#34;&amp;gt;Rights &amp;amp;amp; permissions for article Astronomers push for global debate on giant satellite swarms
                        . Opens in a new window.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210717-001225/</link>
      <pubDate>Sat, 17 Jul 2021 00:12:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210717-001225/</guid>
      <description>This page lists everything: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/index.html#Documentation&amp;#34;&amp;gt;Documentation&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/index.html#Videos&amp;#34;&amp;gt;Videos&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/index.html#Software&amp;#34;&amp;gt;Software&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/index.html#Misc&amp;#34;&amp;gt;Misc&amp;lt;/a&amp;gt; .
For a short selection of highlights, see my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/overview.html&amp;#34;&amp;gt;Overview&amp;lt;/a&amp;gt; page.&amp;lt;br&amp;gt;
Video for my AWS re:Invent 2019 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;BPF Performance Analysis at Netflix&amp;lt;/a&amp;gt; , which includes my BPF theremin demo ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=16slh29iN1g&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/reinvent-2019-bpf-performance-analysis-at-netflix&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; ) (57 mins).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210716-202326/</link>
      <pubDate>Fri, 16 Jul 2021 20:23:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210716-202326/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132920_ford-patents-charging-electric-cars-by-towing-them&amp;#34;&amp;gt;Ford patents charging electric cars by towing them&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1122165_3m-koenigsegg-jesko-ready-for-production-but-already-sold-out&amp;#34;&amp;gt;$3M Koenigsegg Jesko ready for production but already sold out&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132915_everrati-partners-with-superformance-plans-electric-ford-gt40&amp;#34;&amp;gt;Everrati partners with Superformance, plans electric Ford GT40&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125802_2022-formula-one-car-revealed-new-design-cost-cap-better-racing&amp;#34;&amp;gt;2022 Formula One car revealed: New design, cost cap, better racing?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128922_lotus-emira-2022-bmw-2-series-2022-jeep-grand-cherokee-this-week-s-top-photos&amp;#34;&amp;gt;Lotus Emira, 2022 BMW 2-Series, 2022 Jeep Grand Cherokee: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-201942/</link>
      <pubDate>Fri, 16 Jul 2021 20:19:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-201942/</guid>
      <description>&amp;lt;p&amp;gt;German officials feared more deaths on Friday after &amp;amp;quot;catastrophic&amp;amp;quot; floods swept through western regions, demolishing streets and houses, killing more than 100 people and leaving hundreds more missing and homeless.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-colombia/colombia-police-say-former-haiti-official-suspected-of-ordering-moise-hit-idUSKBN2EM20I&amp;#34;&amp;gt;Colombia police say former Haiti official suspected of ordering Moise hit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/16/this-alpaca-ranch-offers-a-transgender-h?videoId=733010373&amp;amp;videoChannel=118169&amp;#34;&amp;gt;This alpaca ranch offers a transgender haven&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-161855/</link>
      <pubDate>Fri, 16 Jul 2021 16:18:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-161855/</guid>
      <description>&amp;lt;p&amp;gt;SCHULD/ERFTSTADT, Germany (Reuters) -More than 1,000 people were missing in flood-stricken regions of western Germany and Belgium on Friday, where waters were still rising with the death toll already well over 100 and communications in some areas cut.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-reuters-siddiqui/reuters-photographer-danish-siddiqui-captured-the-people-behind-the-story-idUSKBN2EM19A&amp;#34;&amp;gt;Reuters photographer Danish Siddiqui captured the people behind the story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/16/the-week-in-numbers-bumper-profits-carbo?videoId=732999864&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: bumper profits, carbon costs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-121812/</link>
      <pubDate>Fri, 16 Jul 2021 12:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-121812/</guid>
      <description>&amp;lt;p&amp;gt;Reuters journalist Danish Siddiqui killed while covering a clash between Afghan security forces and Taliban fighters &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EM0SW&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather/floodwaters-still-rising-in-western-europe-with-death-toll-over-110-idUSKBN2EM117&amp;#34;&amp;gt;Floodwaters still rising in western Europe with death toll over 110&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More than 1,000 people were missing and more homes were destroyed in flood-stricken regions of western Germany and Belgium on Friday where waters were still rising and the death toll was already at about 117.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-reuters/reuters-journalist-killed-covering-clash-between-afghan-forces-taliban-idUSKBN2EM0SW&amp;#34;&amp;gt;Reuters journalist killed covering clash between Afghan forces, Taliban&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/south-africas-president-says-he-wont-allow-anarchy-and-mayhem-idUSKBN2EM0RR&amp;#34;&amp;gt;South Africa&amp;amp;#39;s president says he won&amp;amp;#39;t allow &amp;amp;#39;anarchy and mayhem&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210716-082115/</link>
      <pubDate>Fri, 16 Jul 2021 08:21:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210716-082115/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132914_2024-bmw-i5-spy-shots&amp;#34;&amp;gt;2024 BMW i5 spy shots: Electric 5-Series starts testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-081741/</link>
      <pubDate>Fri, 16 Jul 2021 08:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-081741/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-europe-weather/floods-in-germany-claim-81-victims-more-than-1000-missing-idUSKBN2EM0FN&amp;#34;&amp;gt;Floods in Germany claim 81 victims, more than 1,000 missing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SCHULD, Germany (Reuters) -The number of people who lost their lives in the heavy floods in the western part of Germany increased to at least 81 on Friday, according to German broadcaster ARD, in what is Germany&amp;amp;#39;s worst mass loss of life in years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/ramaphosa-to-visit-worst-hit-province-as-south-africa-violence-eases-idUSKBN2EM0RR&amp;#34;&amp;gt;Ramaphosa to visit worst-hit province as South Africa violence eases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210716-080704/</link>
      <pubDate>Fri, 16 Jul 2021 08:07:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210716-080704/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/course&amp;#34;&amp;gt;course New&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-041747/</link>
      <pubDate>Fri, 16 Jul 2021 04:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-041747/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-germany/biden-merkel-stress-friendship-while-agreeing-to-disagree-on-pipeline-idUSKBN2EL0FH&amp;#34;&amp;gt;Biden, Merkel stress friendship while agreeing to disagree on pipeline&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -U.S. President Joe Biden and German Chancellor Angela Merkel agreed to disagree on Thursday about a Russian pipeline project that Washington opposes, while vowing to stand together against aggression from Moscow and anti-democratic action from Beijing.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-trudeau/as-canada-heads-toward-vote-trudeau-vulnerable-over-indigenous-policies-idUSKBN2EL29K&amp;#34;&amp;gt;As Canada heads toward vote, Trudeau vulnerable over indigenous policies&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210716-041615/</link>
      <pubDate>Fri, 16 Jul 2021 04:16:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210716-041615/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/02/21/random-number-generation-illustrated/&amp;#34;&amp;gt;Random number generation: An illustrated primer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210716-041446/</link>
      <pubDate>Fri, 16 Jul 2021 04:14:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210716-041446/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cppnow&amp;#34;&amp;gt;cppnow&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#etymology&amp;#34;&amp;gt;etymology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#old-shit&amp;#34;&amp;gt;old-shit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I was just reading &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://archive.org/details/dialoguesofplat01plat/page/323/mode/1up&amp;#34;&amp;gt;Plato’s Cratylus&amp;lt;/a&amp;gt; (see also &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://plato.stanford.edu/entries/plato-cratylus/&amp;#34;&amp;gt;its Stanford Encyclopedia article&amp;lt;/a&amp;gt; ).
In it, (Plato’s version of) Socrates talks about choosing good names:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-001752/</link>
      <pubDate>Fri, 16 Jul 2021 00:17:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210716-001752/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-lebanon-crisis/lebanon-spins-further-into-crisis-as-hariri-abandons-bid-to-form-government-idUSKBN2EL1NF&amp;#34;&amp;gt;Lebanon spins further into crisis as Hariri abandons bid to form government&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cuba-internet/u-s-reviewing-whether-it-can-help-restore-internet-access-in-cuba-biden-idUSKBN2EL2D8&amp;#34;&amp;gt;U.S. reviewing whether it can help restore internet access in Cuba -Biden&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210716-001644/</link>
      <pubDate>Fri, 16 Jul 2021 00:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210716-001644/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-never-been-better-to-be-talent&amp;#34;&amp;gt;There’s Never Been a Better Time to Be Talent&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/its-never-been-better-to-be-talent&amp;#34;&amp;gt;If you make stuff for the internet, and are good at it, you are very happy right now.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-201822/</link>
      <pubDate>Thu, 15 Jul 2021 20:18:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-201822/</guid>
      <description>&amp;lt;p&amp;gt;SCHULD, Germany (Reuters) -At least 42 people have died in Germany and dozens were missing on Thursday as swollen rivers caused by record rainfall across western Europe swept through towns and villages, leaving cars upended, houses destroyed and people stranded on rooftops.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cuba-internet/u-s-reviewing-whether-it-can-help-restore-internet-access-in-cuba-idUSKBN2EL2D8&amp;#34;&amp;gt;U.S. reviewing whether it can help restore internet access in Cuba&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-haiti/charges-could-be-brought-in-u-s-over-haitian-assassination-u-s-official-idUSKBN2EL2FA&amp;#34;&amp;gt;Charges could be brought in U.S. over Haitian assassination -U.S. official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/15/paralyzed-indycar-driver-races-again?videoId=732962853&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Paralyzed IndyCar driver races again&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210715-201746/</link>
      <pubDate>Thu, 15 Jul 2021 20:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210715-201746/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/for-years-a-backdoor-in-popular-kiwisdr-product-gave-root-to-project-developer/&amp;#34;&amp;gt;For years, a backdoor in popular KiwiSDR product gave root to project developer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Users are rattled after learning their devices and networks were exposed.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210715-201558/</link>
      <pubDate>Thu, 15 Jul 2021 20:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210715-201558/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/verifiable-design-in-modern-systems.html&amp;#34;&amp;gt;Verifiable design in modern systems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Ryan Hurst, Production Security Team The way we design and build software is continually evolving. Just as we now think of security as something we build into software from the start, we are also increasingly looking for new ways to minimize trust in that software. One of the ways we can do that is by designing software so that you can get cryptographic certainty of what the software has done. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/verifiable-design-in-modern-systems.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Ryan Hurst, Production Security Team&amp;lt;br&amp;gt;
The way we design and build software is continually evolving. Just as we now think of security as something we build into software from the start, we are also increasingly looking for new ways to minimize trust in that software. One of the ways we can do that is by designing software so that you can get cryptographic certainty of what the software has done. In this post, we&amp;amp;#39;ll introduce the concept of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://transparency.dev/verifiable-data-structures/&amp;#34;&amp;gt;verifiable data structures&amp;lt;/a&amp;gt; that help us get this cryptographic certainty. We&amp;amp;#39;ll describe some existing and new applications of verifiable data structures, and provide some additional resources we have created to help you use them in your own applications. A verifiable data structure is a class of data structure that lets people efficiently agree, with cryptographic certainty, that the data contained within it is correct. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://artsandculture.google.com/entity/merkle-tree/m07h_v_&amp;#34;&amp;gt;Merkle Trees&amp;lt;/a&amp;gt; are the most famous of these and have been used for decades because they can enable efficient verification that a particular piece of data is included among many records - as a result they also form the basis of most blockchains. Although these verifiable data structures are not new, we now have a new generation of developers who have discovered them and the designs they enable -- further accelerating their adoption. These verifiable data structures enable building a new class of software that have elements of verifiability and transparency built into the way they operate. This gives us new ways to defend against coercion, introduce accountability to existing and new ecosystems, and make it easier to demonstrate compliance to regulators, customers and partners. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://certificate.transparency.dev/&amp;#34;&amp;gt;Certificate Transparency&amp;lt;/a&amp;gt; is a great example of a non-blockchain use of these verifiable data structures at scale to secure core internet infrastructure. By using these patterns, we have been able to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://certificate.transparency.dev/community/&amp;#34;&amp;gt;introduce transparency and accountability&amp;lt;/a&amp;gt; to an existing system used by everyone without &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://research.google/pubs/pub47551/&amp;#34;&amp;gt;breaking the web&amp;lt;/a&amp;gt; . Unfortunately, despite the capabilities of verifiable data structures and the associated patterns, there are not many resources developers can use to design, build, and deploy scalable and production-quality systems based on them. To address this gap we have generalized the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/trillian&amp;#34;&amp;gt;platform&amp;lt;/a&amp;gt; we used to build Certificate Transparency so it can be applied to other classes of problems as well. Since this infrastructure has been used for years as part of this ecosystem it is well understood and can be deployed confidently in production systems. This is why we have seen solutions in areas of healthcare, financial services, and supply chain leverage this platform. Beyond that, we have also applied these patterns to bring these transparency and accountability properties to other problems within our own products and services. To this end, in 2019, we used this platform to bring supply chain integrity to the Go language ecosystem via the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=KqTySYYhPUE&amp;#34;&amp;gt;Go Checksum Database&amp;lt;/a&amp;gt; . This system allows developers to have confidence that the package management systems supporting the Go ecosystem can’t intentionally, arbitrarily, or accidentally start giving out the wrong code without getting caught. The reproducibility of Go builds makes this particularly powerful as it enables the developer to ensure what is in the source repository matches what is in the package management system. This solution delivers a verifiable chaiin all the way from the source repositories to the final compiled artifacts. Another example of using these patterns is our recently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; partnership with the Linux Foundation on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sigstore.dev/&amp;#34;&amp;gt;Sigstore&amp;lt;/a&amp;gt; . This project is a response to the ever-increasing influx of supply chain attacks on the Open Source ecosystem. Supply chain attacks have been possible because there are weaknesses at every link in the chain. Components like build systems, source code management tools, and artifact repositories all need to be treated as critical production environments, because they are. To address this, we first need to make it possible to verify provenance along the entire chain and the goal of the Sigstore effort is to enable just that. We are now working on using these patterns and tools to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/trillian-examples/tree/master/binary_transparency/firmware&amp;#34;&amp;gt;enable hardware-enforced supply chain integrity for device firmware&amp;lt;/a&amp;gt; , which we hope will discourage supply chain attacks on the devices, like smartphones, that we rely on every day by bringing transparency and accountability to their firmware supply chain. In all of the above examples, we are using these verifiable data structures to ensure the integrity of artifacts in the supply chain. This enables customers, auditors, and internal security teams to be confident that each actor in the supply chain has lived up to their responsibilities. This helps earn the trust of those that rely on the supply chain, discourages insiders from using their position as it increases the chance they will get caught, introduces accountability, and enables proving the associated systems continually meet their compliance obligations. When using these patterns the most important task is defining what data should be logged. This is why we put together a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://transparency.dev/how-to-design-a-verifiable-system/&amp;#34;&amp;gt;taxonomy and modeling framework&amp;lt;/a&amp;gt; which we have found to be helpful in designing verifiability into the systems we discussed above, and which we hope you will find valuable too. Please take a look at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://transparency.dev/&amp;#34;&amp;gt;transparency.dev&amp;lt;/a&amp;gt; website to learn about these verifiable data structures, and the tools and guidance we have put together to help use them in your own applications.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-162028/</link>
      <pubDate>Thu, 15 Jul 2021 16:20:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-162028/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132904_2022-chevrolet-colorado-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Chevrolet Colorado levels up with Trail Boss model&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132836_1994-audi-rs-2-avant-sells-for-77-500-on-bring-a-trailer&amp;#34;&amp;gt;1994 Audi RS 2 Avant sells for $77,500 on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132902_2024-bmw-5-series-spy-shots&amp;#34;&amp;gt;2024 BMW 5-Series spy shots: Popular sedan slims down for next generation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-161714/</link>
      <pubDate>Thu, 15 Jul 2021 16:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-161714/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-germany-weather/at-least-44-dead-dozens-missing-as-floods-sweep-through-western-europe-idUSKBN2EL0FJ&amp;#34;&amp;gt;At least 44 dead, dozens missing as floods sweep through western Europe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
At least 42 people have died in Germany and dozens were missing on Thursday as swollen rivers caused by record rainfall across western Europe swept through towns and villages, leaving cars upended, houses destroyed and people stranded on rooftops.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/15/culinary-diplomacy-as-chefs-of-world-lea?videoId=732953661&amp;amp;videoChannel=118169&amp;#34;&amp;gt;&amp;amp;#39;Culinary diplomacy&amp;amp;#39; as chefs of world leaders gather&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-122004/</link>
      <pubDate>Thu, 15 Jul 2021 12:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-122004/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132903_rebooted-aston-martin-valhalla-hypercar-given-new-look-v-8-power&amp;#34;&amp;gt;Rebooted Aston Martin Valhalla hypercar given new look, V-8 power&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-121704/</link>
      <pubDate>Thu, 15 Jul 2021 12:17:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-121704/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-germany-weather/more-than-20-die-in-floods-in-western-europe-dozens-missing-idUSKBN2EL0FJ&amp;#34;&amp;gt;More than 20 die in floods in western Europe, dozens missing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
At least 19 people have died in Germany and dozens were missing on Thursday as record rainfall in western Europe caused rivers to burst their banks, swept away homes and flooded cellars.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/residents-count-cost-as-south-africa-looting-starts-to-die-down-idUSKBN2EL10F&amp;#34;&amp;gt;Residents count cost as South Africa looting starts to die down&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-arrests/hundreds-of-tigrayans-detained-in-ethiopian-capital-in-recent-weeks-witnesses-say-idUSKBN2EL0FR&amp;#34;&amp;gt;Hundreds of Tigrayans detained in Ethiopian capital in recent weeks, witnesses say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-082110/</link>
      <pubDate>Thu, 15 Jul 2021 08:21:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210715-082110/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132900_teorema-concept-is-first-pininfarina-designed-with-vr&amp;#34;&amp;gt;Teorema concept is first Pininfarina designed with VR&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-081747/</link>
      <pubDate>Thu, 15 Jul 2021 08:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-081747/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-germany/biden-merkel-may-have-little-time-to-rebuild-indispensable-relationship-idUSKBN2EL0FH&amp;#34;&amp;gt;Biden, Merkel may have little time to rebuild &amp;#39;indispensable&amp;#39; relationship&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The clock is ticking as President Joe Biden welcomes German Chancellor Angela Merkel to the White House on Thursday with both hoping to rebuild ties badly frayed under former President Donald Trump.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-refugees/afghan-neighbours-wary-of-new-refugee-crisis-as-violence-surges-idUSKBN2EL0JX&amp;#34;&amp;gt;Afghan neighbours wary of new refugee crisis as violence surges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-turkey-economy-erdogan-analysis/analysis-when-erdogans-turkish-economic-miracle-began-failing-idUSKBN2EL0HM&amp;#34;&amp;gt;Analysis-When Erdogan&amp;amp;#39;s Turkish economic miracle began failing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-041810/</link>
      <pubDate>Thu, 15 Jul 2021 04:18:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-041810/</guid>
      <description>Exclusive: Iran will not be ready for nuclear talks with the U.S. until President-elect Ebrahim Raisi&amp;#39;s administration begins &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EL001&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haitians-protest-pay-tribute-as-country-grapples-with-presidents-killing-idUSKBN2EK27F&amp;#34;&amp;gt;Haitians protest, pay tribute as country grapples with president&amp;#39;s killing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-001837/</link>
      <pubDate>Thu, 15 Jul 2021 00:18:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210715-001837/</guid>
      <description>&amp;lt;p&amp;gt;DOJ watchdog slams FBI for botching sexual abuse probe of ex-gymnastics doctor Nassar, says officials lied to investigators &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EK272&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban/afghan-taliban-seize-border-crossing-with-pakistan-in-major-advance-idUSKBN2EK0HG&amp;#34;&amp;gt;Afghan Taliban seize border crossing with Pakistan in major advance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -Taliban fighters in Afghanistan seized control of a major border crossing with Pakistan on Wednesday, one of the most important objectives they have achieved so far during a rapid advance across the country as U.S. forces pull out.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/s-african-govt-plans-troop-surge-to-quell-unrest-reports-idUSKBN2EK0OD&amp;#34;&amp;gt;S.African govt plans troop surge to quell unrest -reports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haitians-protest-pay-tribute-in-a-country-still-reeling-from-presidents-killing-idUSKBN2EK27F&amp;#34;&amp;gt;Haitians protest, pay tribute in a country still reeling from president&amp;amp;#39;s killing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210715-001836/</link>
      <pubDate>Thu, 15 Jul 2021 00:18:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210715-001836/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/solarwinds-hackers-used-an-ios-0-day-to-steal-google-and-microsoft-credentials/&amp;#34;&amp;gt;iOS zero-day let SolarWinds hackers compromise fully updated iPhones&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Flaw was exploited when government officials clicked on links in LinkedIn messages.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-202111/</link>
      <pubDate>Wed, 14 Jul 2021 20:21:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-202111/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128149_2022-volkswagen-golf-gti-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Volkswagen Golf GTI to be quicker, more digital, start at $30,540&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130127_2022-volkswagen-golf-r-price-specs-review-info-photos&amp;#34;&amp;gt;Preview: 315-hp 2022 Volkswagen Golf R brings more tech, more performance, $44,640 starting price&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210714-201737/</link>
      <pubDate>Wed, 14 Jul 2021 20:17:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210714-201737/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/solarwinds-hackers-used-an-ios-0-day-to-steal-google-and-microsoft-credentials/&amp;#34;&amp;gt;SolarWinds hackers used an iOS 0-day to steal Google and Microsoft credentials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WebKit flaw was exploited when government officials clicked on LinkedIn messages.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210714-201451/</link>
      <pubDate>Wed, 14 Jul 2021 20:14:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210714-201451/</guid>
      <description>&amp;lt;p&amp;gt;iterator&amp;lt;br&amp;gt;
IS-NOT-A&amp;lt;br&amp;gt;
const_iterator&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#antipatterns&amp;#34;&amp;gt;antipatterns&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#library-design&amp;#34;&amp;gt;library-design&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#stl-classic&amp;#34;&amp;gt;stl-classic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Consider the following code snippet ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://godbolt.org/z/GEzWPrcKM&amp;#34;&amp;gt;Godbolt&amp;lt;/a&amp;gt; ).
Would you believe that it compiles on MSVC (with Microsoft’s STL) but not on
libc&#43;&#43; or libstdc&#43;&#43;?&amp;lt;br&amp;gt;
template&amp;amp;lt;class C&amp;amp;gt;
struct Wrap {
Wrap(C&amp;amp;amp;);
operator C::iterator() const;
};&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;template&amp;amp;lt;class C&amp;amp;gt;
void f(C&amp;amp;amp;, typename C::const_iterator);&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;int main() {
std::list&amp;amp;lt;int&amp;amp;gt; v;
f(v, Wrap(v));
} &amp;amp;hellip;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-162205/</link>
      <pubDate>Wed, 14 Jul 2021 16:22:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-162205/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132890_1-of-3-1972-lamborghini-miura-svj-is-up-for-sale&amp;#34;&amp;gt;1-of-3 1972 Lamborghini Miura SVJ is up for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132766_2005-saleen-s7-twin-turbo-competition-package-with-1-300-miles-sells-for-655-000-on-bring-a-trailer&amp;#34;&amp;gt;2005 Saleen S7 twin-turbo competition package with 1,300 miles sells for $655,000 on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-161824/</link>
      <pubDate>Wed, 14 Jul 2021 16:18:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-161824/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/citizens-arm-themselves-as-looting-unrest-roil-south-africa-idUSKBN2EK0OD&amp;#34;&amp;gt;Citizens arm themselves as looting, unrest roil South Africa&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DURBAN, South Africa (Reuters) -South African President Cyril Ramaphosa said on Wednesday he might order more troops onto the streets as the army and police struggled to quell days of looting and violence, while some citizens armed themselves to protect their property and businesses from the rampage.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-twitter-enforcement-exclusive/exclusive-twitter-sees-jump-in-govt-demands-to-remove-content-of-journalists-news-outlets-idUSKBN2EK1IE&amp;#34;&amp;gt;Exclusive-Twitter sees jump in govt demands to remove content of journalists, news outlets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-bolsonaro/brazils-bolsonaro-stabbed-in-2018-hospitalized-with-chronic-hiccups-idUSKBN2EK177&amp;#34;&amp;gt;Brazil&amp;amp;#39;s Bolsonaro, stabbed in 2018, hospitalized with chronic hiccups&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210714-161800/</link>
      <pubDate>Wed, 14 Jul 2021 16:18:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210714-161800/</guid>
      <description>Hackers IDed as DEV-0322 have a fondness for defense contractors and software-makers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; : nature.com search</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210714-161708/</link>
      <pubDate>Wed, 14 Jul 2021 16:17:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210714-161708/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-01881-4&amp;#34;&amp;gt;Racism is magnifying the deadly impact of rising city heat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/search?q=%22Alexandra&#43;Witze%22&amp;amp;order=date_desc&amp;#34;&amp;gt;Rights &amp;amp;amp; permissions for article Racism is magnifying the deadly impact of rising city heat
                        . Opens in a new window.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-122136/</link>
      <pubDate>Wed, 14 Jul 2021 12:21:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-122136/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1115126_2023-bmw-m2-coupe-spy-shots&amp;#34;&amp;gt;2023 BMW M2 spy shots: Next generation of driver&amp;#39;s coupe hits the &amp;#39;Ring&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132887_gm-to-spend-71m-on-new-california-design-center&amp;#34;&amp;gt;GM to spend $71M on new California design center&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132861_lamborghini-s-next-supercar-will-feature-an-entirely-new-v-12&amp;#34;&amp;gt;Lamborghini&amp;amp;#39;s next supercar will feature an entirely new V-12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132865_time-capsule-1995-mclaren-f1-with-242-miles-headed-to-auction&amp;#34;&amp;gt;Time capsule 1995 McLaren F1 with 242 miles headed to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-121747/</link>
      <pubDate>Wed, 14 Jul 2021 12:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-121747/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/south-african-crowds-rampage-hospital-operations-disrupted-idUSKBN2EK0OD&amp;#34;&amp;gt;South African crowds rampage, hospital operations disrupted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Crowds looted shops and offices in South Africa on Wednesday, defying government calls to end a week of violence that has killed more than 70 people and wrecked hundreds of businesses.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-asean/u-s-rejects-china-maritime-claims-calls-for-asean-action-on-myanmar-idUSKBN2EK0B1&amp;#34;&amp;gt;U.S. rejects China maritime claims, calls for ASEAN action on Myanmar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-bolsonaro/brazils-bolsonaro-hospitalized-to-find-cause-of-hiccups-presidency-says-idUSKBN2EK177&amp;#34;&amp;gt;Brazil&amp;amp;#39;s Bolsonaro hospitalized to find cause of hiccups, presidency says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-082310/</link>
      <pubDate>Wed, 14 Jul 2021 08:23:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-082310/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129768_2022-hyundai-elantra-n-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Hyundai Elantra N revealed with 276 hp, 8-speed DCT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-081926/</link>
      <pubDate>Wed, 14 Jul 2021 08:19:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-081926/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/south-african-crowds-rampage-overnight-defying-calls-for-end-to-violence-looting-idUSKBN2EK0OD&amp;#34;&amp;gt;South African crowds rampage overnight, defying calls for end to violence, looting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Crowds looted shops and businesses in South Africa on Wednesday, defying government calls for an end to a week of violence that has killed more than 70 people, wrecked hundreds of businesses and shut down a refinery.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-taliban/taliban-claims-to-control-key-afghan-border-crossing-with-pakistan-idUSKBN2EK0HG&amp;#34;&amp;gt;Taliban claims to control key Afghan border crossing with Pakistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/myanmar-anti-coup-activists-protest-as-u-s-seeks-regional-action-idUSKBN2EK0LT&amp;#34;&amp;gt;Myanmar anti-coup activists protest as U.S. seeks regional action&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-042254/</link>
      <pubDate>Wed, 14 Jul 2021 04:22:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-042254/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131838_2022-jeep-compass-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Jeep Compass arrives with more tech and refinement&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210714-042133/</link>
      <pubDate>Wed, 14 Jul 2021 04:21:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210714-042133/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/05/16/competitive-programming-in-haskell-summer-series/&amp;#34;&amp;gt;Competitive programming in Haskell: summer series&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-041919/</link>
      <pubDate>Wed, 14 Jul 2021 04:19:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210714-041919/</guid>
      <description>JOHANNESBURG (Reuters) -Crowds clashed with police and ransacked or set ablaze shopping malls in cities across South Africa on Tuesday, with dozens of people reported killed, as grievances unleashed by the jailing of ex-president Jacob Zuma boiled over into the worst violence in years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-unrest/faced-with-rare-protests-cuba-curbs-social-media-access-watchdog-says-idUSKBN2EJ218&amp;#34;&amp;gt;Faced with rare protests, Cuba curbs social media access, watchdog says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210714-041855/</link>
      <pubDate>Wed, 14 Jul 2021 04:18:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210714-041855/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/microsoft-says-hackers-in-china-exploited-critical-solarwinds-0-day/&amp;#34;&amp;gt;SolarWinds 0-day gave Chinese hackers privileged access to customer servers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hackers IDed as DEV-0322 have a fondness for defense contractors and software makers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brian Gilham</title>
      <link>https://www.whatsupup.com/blog/deformative/unaccompanied/20210714-041638/</link>
      <pubDate>Wed, 14 Jul 2021 04:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/deformative/unaccompanied/20210714-041638/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.briangilham.com&amp;#34;&amp;gt;← 🏠&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
404&amp;lt;br&amp;gt;
The page you&amp;amp;#39;re looking for doesn&amp;amp;#39;t exist. Sorry about that.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-002422/</link>
      <pubDate>Wed, 14 Jul 2021 00:24:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210714-002422/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132881_2022-mercedes-benz-amg-sl-roadster-s-high-tech-cabin-revealed&amp;#34;&amp;gt;2022 Mercedes-Benz AMG SL Roadster&amp;#39;s high-tech cabin revealed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210714-000728/</link>
      <pubDate>Wed, 14 Jul 2021 00:07:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210714-000728/</guid>
      <description>Microsoft today released updates to patch at least 116 security holes in its Windows operating systems and related software. At least four of the vulnerabilities addressed today are under active attack, according to Microsoft.&amp;lt;br&amp;gt;
Thirteen of the security bugs quashed in this month’s release earned Microsoft’s most-dire “critical” rating, meaning they can be exploited by malware or miscreants to seize remote control over a vulnerable system without any help from users.&amp;lt;br&amp;gt;
Another 103 of the security holes patched this month were flagged as “important,” which Microsoft assigns to vulnerabilities “whose exploitation could result in compromise of the confidentiality, integrity, or availability of user data, or of the integrity or availability of processing resources.”&amp;lt;br&amp;gt;
Among the critical bugs is of course the official fix for the PrintNightmare print spooler flaw in most versions of Windows ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527&amp;#34;&amp;gt;CVE-2021-34527&amp;lt;/a&amp;gt; ) that prompted Microsoft &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/microsoft-issues-emergency-patch-for-windows-flaw/&amp;#34;&amp;gt;to rush out a patch for a week ago&amp;lt;/a&amp;gt; in response to exploit code for the flaw that got accidentally published online. That patch seems to have caused a number of problems for Windows users. Here’s hoping the updated fix resolves some of those issues for readers who’ve been holding out.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34448&amp;#34;&amp;gt;CVE-2021-34448&amp;lt;/a&amp;gt; is a critical remote code execution vulnerability in the scripting engine built into every supported version of Windows — including server versions. Microsoft says this flaw is being exploited in the wild.&amp;lt;br&amp;gt;
Both &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33771&amp;#34;&amp;gt;CVE-2021-33771&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31979&amp;#34;&amp;gt;CVE-2021-31979&amp;lt;/a&amp;gt; are elevation of privilege flaws in the Windows kernel. Both are seeing active exploitation, according to Microsoft. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/microsoft-patch-tuesday-july-2021-edition/#more-56103&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-202328/</link>
      <pubDate>Tue, 13 Jul 2021 20:23:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-202328/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132877_rivian-files-patent-application-for-k-turn-mode&amp;#34;&amp;gt;Rivian files patent application for &amp;amp;quot;K-turn mode&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-201936/</link>
      <pubDate>Tue, 13 Jul 2021 20:19:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-201936/</guid>
      <description>Vaccination burnout? Here&amp;#39;s which countries have the highest vaccination rates – and the lowest &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://graphics.reuters.com/HEALTH-CORONAVIRUS/VACCINATION/xklvyxrdgpg/index.html&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cuba-state/u-s-calls-for-calm-in-cuba-concerned-by-images-of-violence-idUSKBN2EJ27L&amp;#34;&amp;gt;U.S. calls for calm in Cuba, concerned by images of violence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-162329/</link>
      <pubDate>Tue, 13 Jul 2021 16:23:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-162329/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131252_2022-infiniti-qx60-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Infiniti QX60 coming with 295-hp V-6, 9-speed automatic, sharper looks for $47,875&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1112267_2022-hyundai-santa-cruz-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Hyundai Santa Cruz compact pickup priced from $25,175&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210713-162044/</link>
      <pubDate>Tue, 13 Jul 2021 16:20:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210713-162044/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/07/getting-lively-with-firefox-90/&amp;#34;&amp;gt;Getting lively with Firefox 90 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/07/getting-lively-with-firefox-90/&amp;#34;&amp;gt;Getting lively with Firefox 90&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
As the summer rolls around for those of us in the northern hemisphere, temperatures are high and unwinding with a cool ice tea is high on the agenda. Isn&amp;amp;#39;t it lucky then that Background Update is here for Windows, which means Firefox can update even if it&amp;amp;#39;s not running. We can just sit back and relax!
&amp;lt;p&amp;gt;Also this release we see a few nice JavaScript additions, including private fields and methods for classes, and the at() method for Array, String and TypedArray global objects.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;This blog post just provides a set of highlights.&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-161928/</link>
      <pubDate>Tue, 13 Jul 2021 16:19:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-161928/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-kandahar/responding-to-sos-afghan-commandos-caught-in-fierce-taliban-attack-idUSKBN2EJ1P8&amp;#34;&amp;gt;Responding to SOS, Afghan commandos caught in fierce Taliban attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Minutes after returning from a mission on Tuesday before dawn, a convoy of exhausted Afghan commandos were speeding back out of their base to try to extract a wounded policeman trapped by Taliban insurgents on the outskirts of Kandahar.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/worst-violence-in-years-spreads-in-south-africa-as-grievances-boil-over-idUSKBN2EJ0N2&amp;#34;&amp;gt;Worst violence in years spreads in South Africa as grievances boil over&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iraq-fire-hospital/anger-mounts-after-92-die-in-fire-on-iraq-covid-ward-idUSKBN2EJ0OH&amp;#34;&amp;gt;Anger mounts after 92 die in fire on Iraq COVID ward&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-122136/</link>
      <pubDate>Tue, 13 Jul 2021 12:21:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-122136/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132510_2022-opel-astra-price-specs-review-photos-info&amp;#34;&amp;gt;2022 Opel Astra reveal marks next step in brand&amp;#39;s transformation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-121808/</link>
      <pubDate>Tue, 13 Jul 2021 12:18:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-121808/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/violence-spreads-in-south-africa-as-grievances-boil-over-idUSKBN2EJ0N2&amp;#34;&amp;gt;Violence spreads in South Africa as grievances boil over&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JOHANNESBURG (Reuters) -Protesters clashed with police in several areas of South Africa and looters ransacked shopping malls on Tuesday as frustrations over poverty and inequality boiled over into the country&amp;amp;#39;s worst unrest in years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma-stampede/10-bodies-found-at-looted-s-african-mall-following-stampede-idUSKBN2EJ180&amp;#34;&amp;gt;10 bodies found at looted S.African mall following stampede&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-082209/</link>
      <pubDate>Tue, 13 Jul 2021 08:22:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210713-082209/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132872_2022-ford-everest-spy-shots&amp;#34;&amp;gt;2022 Ford Everest spy shots: Redesign for Ranger-based SUV&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-081820/</link>
      <pubDate>Tue, 13 Jul 2021 08:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-081820/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-defence/japan-warns-of-crisis-over-taiwan-growing-risks-from-u-s-china-rivalry-idUSKBN2EJ055&amp;#34;&amp;gt;Japan warns of crisis over Taiwan, growing risks from U.S.-China rivalry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Growing military tensions around Taiwan as well as economic and technological rivalry between China and the United States threaten peace and stability in East Asia as the regional power balance shifts in Beijing&amp;amp;#39;s favour, Japan said in its annual defence white paper.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-sputnik-regulator/european-efforts-to-assess-russias-sputnik-v-vaccine-stymied-by-data-gaps-idUSKBN2EJ0ET&amp;#34;&amp;gt;European efforts to assess Russia’s Sputnik V vaccine stymied by data gaps&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-france-google-antitrust/france-fines-google-500-million-euros-over-copyright-row-idUSKBN2EJ0KP&amp;#34;&amp;gt;France fines Google 500 million euros over copyright row&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/12/explainer-what-does-eus-climate-masterpl?videoId=732833386&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Explainer: What does EU&amp;amp;#39;s climate masterplan entail?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-001802/</link>
      <pubDate>Tue, 13 Jul 2021 00:18:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210713-001802/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-usa-suspects/former-u-s-drug-agency-informant-arrested-in-haiti-assassination-source-says-idUSKBN2EI2AY&amp;#34;&amp;gt;Former U.S. drug agency informant arrested in Haiti assassination, source says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210713-001420/</link>
      <pubDate>Tue, 13 Jul 2021 00:14:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210713-001420/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/10/Murderbot-Diaries&amp;#34;&amp;gt;Murderbot Diaries&amp;lt;/a&amp;gt; · I suffered a massive loss of productivity for a few days last week because I started reading the first of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://amzn.to/3AOm3Aq&amp;#34;&amp;gt;this series&amp;lt;/a&amp;gt; and     found that I had to read them all pretty much without stopping &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/07/10/Murderbot-Diaries&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-201748/</link>
      <pubDate>Mon, 12 Jul 2021 20:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-201748/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/white-house-does-not-rule-out-haiti-request-for-u-s-troops-idUSKBN2EI1HM&amp;#34;&amp;gt;White House does not rule out Haiti request for U.S. troops&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BOGOTA/PORT-AU-PRINCE (Reuters) -The United States is still reviewing a request for troops made by Haiti&amp;amp;#39;s interim Prime Minister Claude Joseph to help secure key infrastructure after the assassination of President Jovenel Moise, White House spokesperson Jen Psaki said on Monday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-usa/u-s-delegation-to-haiti-met-all-three-claimants-to-power-white-house-idUSKBN2EI1YU&amp;#34;&amp;gt;U.S. delegation to Haiti met all three claimants to power -White House&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-protests/cuba-blames-unrest-on-u-s-interference-as-biden-backs-protests-idUSKBN2EI1H4&amp;#34;&amp;gt;Cuba blames unrest on U.S. interference as Biden backs protests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210712-201724/</link>
      <pubDate>Mon, 12 Jul 2021 20:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210712-201724/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/microsoft-discovers-critical-solarwinds-zero-day-under-active-attack/&amp;#34;&amp;gt;Microsoft discovers critical SolarWinds zero-day under active attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Flaws allow attackers to run malicious code on machines hosting Serv-U products.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Page Not Found</title>
      <link>https://www.whatsupup.com/blog/deformative/unaccompanied/20210712-201509/</link>
      <pubDate>Mon, 12 Jul 2021 20:15:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/deformative/unaccompanied/20210712-201509/</guid>
      <description>&amp;lt;p&amp;gt;Page Not Found&amp;lt;br&amp;gt;
Looks like you&amp;#39;ve followed a broken link or entered a URL that doesn&amp;#39;t exist on this site.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.briangilham.com/&amp;#34;&amp;gt;Back to our site&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
If this is your site, and you weren&amp;amp;#39;t expecting a 404 for this path, please visit Netlify&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125?utm_source=404page&amp;amp;utm_campaign=community_tracking&amp;#34;&amp;gt;&amp;amp;#34;page not found&amp;amp;#34; support guide&amp;lt;/a&amp;gt; for troubleshooting tips.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-162135/</link>
      <pubDate>Mon, 12 Jul 2021 16:21:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-162135/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132863_2022-ram-1500-big-horn-and-lone-star-available-in-new-backcountry-edition&amp;#34;&amp;gt;2022 Ram 1500 Big Horn and Lone Star available in new BackCountry Edition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132862_audi-teases-an-electric-a8-successor-with-grand-sphere-concept&amp;#34;&amp;gt;Audi teases an electric A8 successor with Grand Sphere concept&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-161808/</link>
      <pubDate>Mon, 12 Jul 2021 16:18:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-161808/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-kandahar/afghan-special-forces-moved-in-on-taliban-only-to-find-they-had-melted-away-idUSKBN2EI10A&amp;#34;&amp;gt;Afghan special forces moved in on Taliban, only to find they had melted away&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Soldiers from Afghanistan&amp;amp;#39;s special forces paused for a short prayer late on Sunday night on a deserted stretch of highway in the southern province of Kandahar. They do so each time they prepare to face Taliban militants in battle.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/colombian-police-say-no-hypothesis-in-haiti-assassination-probe-idUSKBN2EI1HM&amp;#34;&amp;gt;Colombian police say no &amp;amp;#39;hypothesis&amp;amp;#39; in Haiti assassination probe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-122035/</link>
      <pubDate>Mon, 12 Jul 2021 12:20:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-122035/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1065042_2023-audi-q6-e-tron-spy-shots&amp;#34;&amp;gt;2023 Audi Q6 E-Tron spy shots: Electric Porsche Macan&amp;#39;s Audi twin spotted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-121729/</link>
      <pubDate>Mon, 12 Jul 2021 12:17:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-121729/</guid>
      <description>Afghan special forces moved in on Taliban, only to find they had melted away &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EI10A&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-usa-commander/in-symbolic-end-to-war-u-s-general-to-step-down-from-command-in-afghanistan-idUSKBN2EI0NE&amp;#34;&amp;gt;In symbolic end to war, U.S. general to step down from command in Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-082116/</link>
      <pubDate>Mon, 12 Jul 2021 08:21:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210712-082116/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132860_2022-bmw-x5-black-vermilion-is-perfect-for-the-fashion-conscious&amp;#34;&amp;gt;2022 BMW X5 Black Vermilion is perfect for the fashion conscious&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210712-081941/</link>
      <pubDate>Mon, 12 Jul 2021 08:19:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210712-081941/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/12/technology/facebook-creators-tiktok-youtube.html&amp;#34;&amp;gt;Facebook Wants to Court Creators. It Could Be a Tough Sell. The social network is aiming to be a destination for creators and their viral memes. But TikTok and YouTube got there first. By Mike Isaac and Taylor Lorenz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-081748/</link>
      <pubDate>Mon, 12 Jul 2021 08:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-081748/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-unrest/cuba-sees-biggest-protests-for-decades-as-pandemic-adds-to-woes-idUSKBN2EH0ID&amp;#34;&amp;gt;Cuba sees biggest protests for decades as pandemic adds to woes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/s-african-ex-leader-zumas-court-hearing-starts-after-looting-arson-idUSKBN2EI0IE&amp;#34;&amp;gt;S.African ex-leader Zuma&amp;amp;#39;s court hearing starts after looting, arson&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-041904/</link>
      <pubDate>Mon, 12 Jul 2021 04:19:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210712-041904/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cuba-unrest/thousands-of-cubans-join-biggest-anti-government-protests-in-decades-idUSKBN2EH0ID&amp;#34;&amp;gt;Thousands of Cubans join biggest anti-government protests in decades&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HAVANA (Reuters) -Chanting &amp;amp;#34;freedom&amp;amp;#34; and calling for President Miguel Diaz-Canel to step down, thousands of Cubans joined street protests from Havana to Santiago on Sunday in the biggest anti-government demonstrations on the Communist-run island in decades.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-northkorea-aid/n-korea-dismisses-u-s-humanitarian-aid-as-sinister-scheme-idUSKBN2EI07Q&amp;#34;&amp;gt;N.Korea dismisses U.S. humanitarian aid as &amp;amp;#39;sinister scheme&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haiti-police-arrest-suspect-in-presidents-assassination-idUSKBN2EH0DA&amp;#34;&amp;gt;Haiti police arrest suspect in president&amp;amp;#39;s assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210712-002124/</link>
      <pubDate>Mon, 12 Jul 2021 00:21:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210712-002124/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/03/23/data-structure-challenge-finding-the-rightmost-empty-slot/&amp;#34;&amp;gt;Data structure challenge: finding the rightmost empty slot&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-201831/</link>
      <pubDate>Sun, 11 Jul 2021 20:18:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-201831/</guid>
      <description>&amp;lt;p&amp;gt;Djokovic triumphs at Wimbledon to secure record-equalling 20th major &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKBN2EH0DJ&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/leaked-testimony-from-haiti-suspects-says-plan-was-to-arrest-not-kill-president-idUSKBN2EH0DA&amp;#34;&amp;gt;Leaked testimony from Haiti suspects says plan was to arrest, not kill president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -A group of Colombians and Haitian Americans suspected of assassinating Haitian President Jovenel Moise told investigators they were there to arrest him, not kill him, the Miami Herald and a person familiar with the matter said on Sunday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-usa/pentagon-says-u-s-team-going-to-haiti-to-assess-needs-idUSKBN2EH0DP&amp;#34;&amp;gt;Pentagon says U.S. team going to Haiti to assess needs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/south-africa-violence-spreads-to-johannesburg-in-wake-of-zuma-jailing-idUSKBN2EH062&amp;#34;&amp;gt;South Africa violence spreads to Johannesburg in wake of Zuma jailing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-161720/</link>
      <pubDate>Sun, 11 Jul 2021 16:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-161720/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-safrica-zuma/violence-spreads-to-south-africas-economic-hub-in-wake-of-zuma-jailing-idUSKBN2EH062&amp;#34;&amp;gt;Violence spreads to South Africa&amp;#39;s economic hub in wake of Zuma jailing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JOHANNESBURG (Reuters) -Shops were looted overnight, a section of the M2 highway was closed and stick-wielding protesters marched through the streets of Johannesburg on Sunday, as sporadic acts of violence following the jailing of former South African President Jacob Zuma spread to the country&amp;amp;#39;s main economic hub.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-121759/</link>
      <pubDate>Sun, 11 Jul 2021 12:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-121759/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-pope-surgery/pope-reappears-after-surgery-backs-free-universal-health-care-idUSKBN2EH074&amp;#34;&amp;gt;Pope reappears after surgery, backs free universal health care&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ROME (Reuters) -Pope Francis, seeming in good overall condition, appeared in public on Sunday for the first time since undergoing intestinal surgery a week ago and made a plea for free universal healthcare.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-taiwan-vaccine/tsmc-foxconn-say-they-are-in-process-of-signing-deal-for-biontech-covid-19-vaccines-idUSKBN2EH027&amp;#34;&amp;gt;TSMC, Foxconn say they are in process of signing deal for BioNTech COVID-19 vaccines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-041811/</link>
      <pubDate>Sun, 11 Jul 2021 04:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-041811/</guid>
      <description>Argentina beat Brazil 1-0 to win Copa America for the 15th time &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports/argentina-beat-brazil-1-0-win-copa-america-2021-07-11/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
PORT-AU-PRINCE (Reuters) -One of Haiti&amp;#39;s most powerful gang leaders said on Saturday his men would take to the streets to protest the assassination of President Jovenel Moise, threatening to pitch the impoverished Caribbean country deeper into chaos.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-syria-attack/no-injuries-damage-in-attack-against-u-s-forces-in-syria-defense-official-idUSKBN2EG0JA&amp;#34;&amp;gt;No injuries, damage in attack against U.S. forces in Syria- defense official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-001856/</link>
      <pubDate>Sun, 11 Jul 2021 00:18:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210711-001856/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/gang-boss-wades-into-haiti-turmoil-sees-conspiracy-behind-presidents-killing-idUSKBN2EG0B8&amp;#34;&amp;gt;Gang boss wades into Haiti turmoil, sees conspiracy behind president&amp;#39;s killing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -One of Haiti&amp;amp;#39;s most powerful gang leaders said on Saturday his men would take to the streets in protest at the assassination of President Jovenel Moise, threatening to pitch the impoverished Caribbean nation deeper into chaos.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-northkorea/leaders-of-n-korea-china-vow-greater-cooperation-in-face-of-foreign-hostility-kcna-idUSKBN2EG0HU&amp;#34;&amp;gt;Leaders of N.Korea, China vow greater cooperation in face of foreign hostility: KCNA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-201706/</link>
      <pubDate>Sat, 10 Jul 2021 20:17:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-201706/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/slain-haitian-leaders-widow-blames-political-enemies-as-power-struggle-intensifies-idUSKBN2EG0B8&amp;#34;&amp;gt;Slain Haitian leader&amp;#39;s widow blames political enemies as power struggle intensifies&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -The widow of slain Haitian President Jovenel Moise on Saturday accused shadowy enemies of organizing his assassination to stop democratic change, as a struggle for power intensified in the Caribbean nation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-election/ethiopia-pm-abiys-party-wins-landslide-victory-in-election-idUSKBN2EG0DW&amp;#34;&amp;gt;Ethiopia PM Abiy&amp;amp;#39;s party wins landslide victory in election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-161602/</link>
      <pubDate>Sat, 10 Jul 2021 16:16:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-161602/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/rival-haitian-leaders-battle-for-power-after-presidents-assassination-idUSKBN2EG0B8&amp;#34;&amp;gt;Rival Haitian leaders battle for power after president&amp;#39;s assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A power struggle is brewing in Haiti as the man appointed prime minister shortly before the assassination of Haiti&amp;amp;#39;s president this week said he - not the acting premier - should lead the Caribbean nation and was forming a government to that effect.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-somalia-security/at-least-8-killed-in-mogadishu-by-suicide-bomb-targeting-government-convoy-idUSKBN2EG077&amp;#34;&amp;gt;At least 8 killed in Mogadishu by suicide bomb targeting government convoy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-opposition/iranian-exiles-protest-demand-prosecution-of-president-elect-idUSKBN2EG0B5&amp;#34;&amp;gt;Iranian exiles protest, demand prosecution of president-elect&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210710-121943/</link>
      <pubDate>Sat, 10 Jul 2021 12:19:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210710-121943/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131974_the-lamborghini-miura-sv-is-now-50-years-old&amp;#34;&amp;gt;The Lamborghini Miura SV is now 50 years old&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-121622/</link>
      <pubDate>Sat, 10 Jul 2021 12:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-121622/</guid>
      <description>WASHINGTON/PORT-AU-PRINCE (Reuters) -The United States on Friday rebuffed Haiti&amp;#39;s request for troops to help secure key infrastructure after the assassination of President Jovenel Moise by suspected foreign mercenaries, even as it pledged to help with the investigation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-pope-surgery/pope-gradually-resuming-work-walking-eating-with-aides-vatican-says-idUSKBN2EG07O&amp;#34;&amp;gt;Pope gradually resuming work, walking, eating with aides, Vatican says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210710-120536/</link>
      <pubDate>Sat, 10 Jul 2021 12:05:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210710-120536/</guid>
      <description>“One of the things they found out during the arrest was the people wanting to be in the gang were told they had to bring them $250,000 within a week,” Santor said.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-081556/</link>
      <pubDate>Sat, 10 Jul 2021 08:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-081556/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-chile-police/son-of-chile-indigenous-leader-killed-by-police-in-restive-province-media-idUSKCN2EG03Q&amp;#34;&amp;gt;Son of Chile indigenous leader killed by police in restive province -media&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-041715/</link>
      <pubDate>Sat, 10 Jul 2021 04:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-041715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/u-s-rebuffs-haiti-troops-request-after-presidents-assassination-idUSKCN2EF1JI&amp;#34;&amp;gt;U.S rebuffs Haiti troops request after president&amp;#39;s assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The United States on Friday rebuffed Haiti&amp;amp;#39;s request for troops to help secure key infrastructure after the assassination of President Jovenel Moise by suspected foreign mercenaries, even as it pledged to help with the investigation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-biden-germany/biden-to-host-germanys-merkel-at-white-house-next-thursday-white-house-idUSKCN2EF20A&amp;#34;&amp;gt;Biden to host Germany&amp;amp;#39;s Merkel at White House next Thursday - White House&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-001700/</link>
      <pubDate>Sat, 10 Jul 2021 00:17:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210710-001700/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haiti-requests-u-s-u-n-forces-after-presidents-assassination-idUSKCN2EF1JI&amp;#34;&amp;gt;Haiti requests U.S., U.N. forces after president&amp;#39;s assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Haiti has requested U.S. and U.N. security forces to help it protect key infrastructure like the airport and ports after the assassination of President Jovenel Moise by foreign mercenaries, a government minister said on Friday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-politics-president/mexico-president-casts-video-of-brother-taking-cash-as-political-smear-idUSKCN2EF1DM&amp;#34;&amp;gt;Mexico president casts video of brother taking cash as political smear&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-biden-india/biden-picks-los-angeles-mayor-garcetti-to-be-u-s-ambassador-to-india-idUSKCN2EF259&amp;#34;&amp;gt;Biden picks Los Angeles Mayor Garcetti to be U.S. ambassador to India&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210710-001647/</link>
      <pubDate>Sat, 10 Jul 2021 00:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210710-001647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/09/business/biden-big-business-executive-order.html&amp;#34;&amp;gt;Biden Urges More Scrutiny of Big Businesses, Such as Tech Giants An executive order reflects the administration’s growing embrace of warnings by some economists that declining competition is hobbling the economy’s vitality. By David McCabe and Jim Tankersley&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210710-001647/</link>
      <pubDate>Sat, 10 Jul 2021 00:16:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210710-001647/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/feds-indict-the-bull-for-allegedly-selling-insider-stock-info-on-the-dark-web/&amp;#34;&amp;gt;Feds indict “The Bull” for allegedly selling insider stock info on the dark web&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Data allegedly sold individually or through weekly or monthly subscriptions.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210710-001517/</link>
      <pubDate>Sat, 10 Jul 2021 00:15:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210710-001517/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/07/20/a-history-of-backdoors/&amp;#34;&amp;gt;A history of backdoors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-202005/</link>
      <pubDate>Fri, 09 Jul 2021 20:20:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-202005/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132852_british-startup-mcmurtry-unveils-electric-track-car-with-downforce-generating-fan&amp;#34;&amp;gt;British startup McMurtry unveils electric track car with downforce-generating fan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1117564_aston-martin-valkyrie-amr-pro-porsche-cayenne-turbo-gt-volvo-concept-recharge-this-week-s-top-photos&amp;#34;&amp;gt;Aston Martin Valkyrie AMR Pro, Porsche Cayenne Turbo GT, Volvo Concept Recharge: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-201646/</link>
      <pubDate>Fri, 09 Jul 2021 20:16:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-201646/</guid>
      <description>&amp;lt;p&amp;gt;President Biden plans to nominate Los Angeles Mayor Eric Garcetti to be U.S. ambassador to India &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2EF259&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/u-s-colombia-sending-officials-to-haiti-after-assassination-arrests-idUSKCN2EF1JI&amp;#34;&amp;gt;U.S., Colombia sending officials to Haiti after assassination arrests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The United States and Colombia said on Friday they will send law enforcement and intelligence officials to help Haiti following the assassination of President Jovenel Moise and arrests of their nationals by Haitian authorities.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-un/u-s-strikes-deal-with-russia-to-continue-u-n-syria-aid-access-idUSKCN2EF1QE&amp;#34;&amp;gt;U.S. strikes deal with Russia to continue U.N. Syria aid access&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210709-201356/</link>
      <pubDate>Fri, 09 Jul 2021 20:13:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210709-201356/</guid>
      <description>for ad-hoc tag dispatch&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pearls&amp;#34;&amp;gt;pearls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#templates&amp;#34;&amp;gt;templates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I’ve mentioned the&amp;lt;br&amp;gt;
trick a couple of times in previous posts;
it’s time I did a post specifically on this trick.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210709-200615/</link>
      <pubDate>Fri, 09 Jul 2021 20:06:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210709-200615/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/spike-in-chain-gang-destructive-attacks-on-atms/&amp;#34;&amp;gt;Spike in “Chain Gang” Destructive Attacks on ATMs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Last summer, financial institutions throughout Texas started reporting a sudden increase in attacks involving well-orchestrated teams that would show up at night, use stolen trucks and heavy chains to rip Automated Teller Machines (ATMs) out of their foundations, and make off with the cash boxes inside. Now it appears the crime — known variously as “ ATM smash-and-grab ” or “ chain gang ” attacks — is rapidly increasing in other states.&amp;lt;br&amp;gt;
Four different ATM “chain gang” attacks in Texas recently. Image: Texas Bankers Association.&amp;lt;br&amp;gt;
The Texas Bankers Association documented at least 139 chain gang attacks against Texas financial institutions in the year ending November 2020. The association says organized crime is the main source of the destructive activity, and that Houston-based FBI officials have made more than 50 arrests and are actively tracking about 250 individuals suspected of being part of these criminal rings.&amp;lt;br&amp;gt;
From surveillance camera footage examined by fraud investigators, the perpetrators have followed the same playbook in each incident. The bad guys show up in the early morning hours with a truck or tractor that’s been stolen from a local construction site.&amp;lt;br&amp;gt;
Then two or three masked men will pry the front covering from the ATM using crowbars, and attach heavy chains to the cash machine. The canisters of cash inside are exposed once the crooks pull the ATM’s safe door off using the stolen vehicle.&amp;lt;br&amp;gt;
In nearly all cases, the perpetrators are done in less than five minutes.&amp;lt;br&amp;gt;
Tracey Santor is the bond product manager for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.travelers.com/&amp;#34;&amp;gt;Travelers&amp;lt;/a&amp;gt; , which insures a large number of financial institutions against this type of crime. Santor said investigators questioning some of the suspects learned that the smash-and-grabs are used as a kind of initiation for would-be gang members.&amp;lt;br&amp;gt;
“One of the things they found out during the arrest was the people wanting to be in the gang were told they had to bring them $250,000 within a week,” Santor said. “And they were given instructions on how to do it. I’ve also heard of cases where the perpetrators put construction cones around the ATM so it looks to anyone passing by that they’re legitimately doing construction at the site.”&amp;lt;br&amp;gt;
Santor said the chain gang attacks have spread to other states, and that in the year ending June 2021 Travelers saw a 257 percent increase in the number of insurance claims related to ATM smash-and-grabs.&amp;lt;br&amp;gt;
That 257 percent increase also includes claims involving incidents where attackers will crash a stolen car into a convenience store, and then in the ensuing commotion load the store’s ATM into the back of the vehicle and drive away.&amp;lt;br&amp;gt;
In addition to any cash losses — which can often exceed $200,000 — replacing destroyed ATMs and any associated housing can take weeks, and newer model ATMs can cost $80,000 or more.&amp;lt;br&amp;gt;
“It’s not stopping,” Santor said of the chain gang attacks. “In the last year we counted 32 separate states we’ve seen this type of attack in. Normally we are seeing single digits across the country. 2021 is going to be the same or worse for us than last year.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/spike-in-chain-gang-destructive-attacks-on-atms/#more-56096&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-161913/</link>
      <pubDate>Fri, 09 Jul 2021 16:19:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-161913/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132849_glickenhaus-004s-debuts-at-2021-goodwood-festival-of-speed&amp;#34;&amp;gt;Glickenhaus 004S debuts at 2021 Goodwood Festival of Speed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132808_one-millionth-toyota-tacoma-is-a-trd-pro-and-it-s-headed-to-auction&amp;#34;&amp;gt;One-millionth Toyota Tacoma is a TRD Pro, and it&amp;amp;#39;s headed to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1112214_2024-volkswagen-id-buzz-spy-shots-and-video&amp;#34;&amp;gt;2024 Volkswagen ID Buzz spy shots and video: Modern electric Bus takes shape&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-161601/</link>
      <pubDate>Fri, 09 Jul 2021 16:16:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-161601/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/colombian-suspects-in-haiti-presidents-killing-arrived-via-dominican-republic-idUSKCN2EF1JI&amp;#34;&amp;gt;Colombian suspects in Haiti president&amp;#39;s killing arrived via Dominican Republic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-migrants-lithuania/lithuania-toughens-belarus-border-with-razor-wire-to-bar-migrants-idUSKCN2EF0VI&amp;#34;&amp;gt;Lithuania toughens Belarus border with razor wire to bar migrants&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/09/the-week-in-numbers-didi-drops-wise-pops?videoId=732710313&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: Didi drops, Wise pops&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210709-161532/</link>
      <pubDate>Fri, 09 Jul 2021 16:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210709-161532/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/07/09/us/joe-biden-news/biden-is-expected-to-sign-an-executive-order-encouraging-us-agencies-to-crack-down-on-major-tech-companies&amp;#34;&amp;gt;Biden is expected to sign an executive order encouraging U.S. agencies to crack down on major tech companies. An executive order will tell the federal agencies that approve mergers that they should scrutinize the tech industry’s practices more closely. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-121931/</link>
      <pubDate>Fri, 09 Jul 2021 12:19:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-121931/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132848_2021-ford-shelby-f-150-rolls-in-with-775-hp&amp;#34;&amp;gt;2021 Ford Shelby F-150 rolls in with 775 hp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1120250_2024-porsche-911-turbo-s-e-hybrid-spy-shots&amp;#34;&amp;gt;2024 Porsche 911 Turbo S E-Hybrid spy shots: Electrified 911 starts testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132495_first-look-at-2022-jeep-grand-cherokee-two-row-4xe-plug-in-hybrid&amp;#34;&amp;gt;First look at 2022 Jeep Grand Cherokee two-row, 4xe plug-in hybrid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-121612/</link>
      <pubDate>Fri, 09 Jul 2021 12:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-121612/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-pilots-special-r/special-report-afghan-pilots-assassinated-by-taliban-as-u-s-withdraws-idUSKCN2EF11F&amp;#34;&amp;gt;Special Report-Afghan pilots assassinated by Taliban as U.S. withdraws&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Afghan Air Force Major Dastagir Zamaray had grown so fearful of Taliban assassinations of off-duty forces in Kabul that he decided to sell his home to move to a safer pocket of Afghanistan&amp;amp;#39;s sprawling capital.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-murder/uk-police-officer-pleads-guilty-to-sarah-everards-murder-idUSKCN2EF0U5&amp;#34;&amp;gt;UK police officer pleads guilty to Sarah Everard&amp;amp;#39;s murder&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210709-121556/</link>
      <pubDate>Fri, 09 Jul 2021 12:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210709-121556/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/09/technology/biden-tech-executive-order.html&amp;#34;&amp;gt;Biden to Urge More Scrutiny of Tech Mergers and Data Privacy The order is the president’s latest acknowledgment of concerns that the tech giants have obtained outsize market power. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/09/books/review/the-ugly-truth-sheera-frenkel-and-cecilia-kang.html&amp;#34;&amp;gt;Nonfiction The ‘Ugly Truth’ About Facebook A new, deeply reported book by the Times reporters Sheera Frenkel and Cecilia Kang recounts the full story of the social media company’s foibles. By Sarah Frier&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-081552/</link>
      <pubDate>Fri, 09 Jul 2021 08:15:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-081552/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-biden/analysis-biden-lost-faith-in-the-u-s-mission-in-afghanistan-over-a-decade-ago-idUSKCN2EF0BG&amp;#34;&amp;gt;Analysis-Biden lost faith in the U.S. mission in Afghanistan over a decade ago&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
President Joe Biden&amp;amp;#39;s frustrations with Afghanistan boiled over more than a decade ago, and they never again eased.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-faces-covid-19-lockdown-extension-amid-record-2021-cases-idUSKCN2EE2L8&amp;#34;&amp;gt;Sydney faces COVID-19 lockdown extension amid record 2021 cases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210709-080940/</link>
      <pubDate>Fri, 09 Jul 2021 08:09:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210709-080940/</guid>
      <description>This page lists everything. For a short selection of highlights, see my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/overview.html&amp;#34;&amp;gt;overview&amp;lt;/a&amp;gt; page.&amp;lt;br&amp;gt;
My plenary talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;Computing Performance: On the Horizon&amp;lt;/a&amp;gt; for the USENIX LISA 2021 conference, covering the present and future of processors, memory, disks, networking, hypervisors, and more. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/computing-performance-on-the-horizon-2021&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2021_ComputingPerformance.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-03/how-to-add-bpf-observability.html&amp;#34;&amp;gt;How To Add eBPF Observability To Your Product&amp;lt;/a&amp;gt; aimed at those adding it to commercial or internal observability platforms (2021).&amp;lt;br&amp;gt;
A 122-slide talk on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;BPF Internals (eBPF)&amp;lt;/a&amp;gt; for the USENIX LISA 2021 conference, where I show all the steps from the high-level bpftrace language to machine code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.slideshare.net/brendangregg/bpf-internals-ebpf&amp;#34;&amp;gt;slideshare&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/Slides/LISA2021_BPF_Internals.pdf&amp;#34;&amp;gt;PDF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_5Z2AU7QTH4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; ) (2021).&amp;lt;br&amp;gt;
The story of the most surprising software demo I&amp;#39;ve been given: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-04/an-unbelievable-demo.html&amp;#34;&amp;gt;An Unbelievable Demo&amp;lt;/a&amp;gt; (2021).&amp;lt;br&amp;gt;
As it has become an FAQ, a post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-05-23/what-is-observability.html&amp;#34;&amp;gt;What is Observability&amp;lt;/a&amp;gt; , a term myself and other performance engineers have used since before it was popular (2021).&amp;lt;br&amp;gt;
A post on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2020-11-04/bpf-co-re-btf-libbpf.html&amp;#34;&amp;gt;BPF binaries: BTF, CO-RE, and the future of eBPF perf tools&amp;lt;/a&amp;gt; (2020).&amp;lt;br&amp;gt;
My latest book website: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/systems-performance-2nd-edition-book.html&amp;#34;&amp;gt;Systems Performance: Enterprise and the Cloud, Second Edition&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2020-07-15/systems-performance-2nd-edition.html&amp;#34;&amp;gt;blog post&amp;lt;/a&amp;gt; about it. The publisher is Addison-Wesley, and the draft book is over 800 pages. This updates the Linux and cloud content, and adds chapters on perf, Ftrace, and BPF (2020).&amp;lt;br&amp;gt;
Linux gets a high-level eBPF front-end: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html&amp;#34;&amp;gt;bpftrace (DTrace 2.0) for Linux 2018&amp;lt;/a&amp;gt; . The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace&amp;#34;&amp;gt;repository&amp;lt;/a&amp;gt; has tools and docs I developed, including a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md&amp;#34;&amp;gt;bpftrace one-liners tutorial&amp;lt;/a&amp;gt; , a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/reference_guide.md&amp;#34;&amp;gt;bpftrace reference guide&amp;lt;/a&amp;gt; , and an &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/iovisor/bpftrace/blob/master/docs/internals_development.md&amp;#34;&amp;gt;internals development guide&amp;lt;/a&amp;gt; (2018).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2016-10-27/dtrace-for-linux-2016.html&amp;#34;&amp;gt;DTrace for Linux 2016&amp;lt;/a&amp;gt; , announcing that the Linux kernel now has similar raw capabilities as DTrace in Linux 4.9 via enhanced BPF. I&amp;#39;ve been heavily involved in this project, especially as the number one user, and it was great to reach this milestone.&amp;lt;br&amp;gt;
A summary of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2013-01-11/virtualization-performance-zones-kvm-xen.html&amp;#34;&amp;gt;Virtualization Performance: Zones, KVM, Xen&amp;lt;/a&amp;gt; , focusing on I/O path overheads (2013).&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2011-10-10/top-10-dtrace-scripts-for-mac-os-x.html&amp;#34;&amp;gt;Top 10 DTrace Scripts&amp;lt;/a&amp;gt; for Mac OS X performance analysis and troubleshooting, written to reach the broader Mac OS X community.  This includes step by step instructions on how to find and run the Terminal application and sudo.&amp;lt;br&amp;gt;
My USENIX LISA2021 plenary video on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;Computing Performance: On the Horizon&amp;lt;/a&amp;gt; , covering the present and future of  performance. ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=5nN1wjA_S30&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) (41 mins) (2021).&amp;lt;br&amp;gt;
My USENIX LISA2021 talk video on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;BPF Internals (eBPF)&amp;lt;/a&amp;gt; showing high-level to machine code ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=_5Z2AU7QTH4&amp;#34;&amp;gt;youtube&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;blog&amp;lt;/a&amp;gt; ) (39 mins) (2021).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-041558/</link>
      <pubDate>Fri, 09 Jul 2021 04:15:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-041558/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/ex-colombian-military-haitian-americans-suspected-in-killing-of-haiti-president-idUSKCN2EE1NU&amp;#34;&amp;gt;Ex-Colombian military, Haitian Americans suspected in killing of Haiti president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A heavily armed commando unit that assassinated Haitian President Jovenel Moise this week comprised 26 Colombians and two Haitian Americans, authorities said on Thursday, as the hunt went on for the masterminds of the brazen killing.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia-state/australias-new-south-wales-flags-lockdown-extension-after-record-cases-idUSKCN2EF03U&amp;#34;&amp;gt;Australia&amp;amp;#39;s New South Wales flags lockdown extension after record cases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210709-041452/</link>
      <pubDate>Fri, 09 Jul 2021 04:14:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210709-041452/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/she-advocated-for-women-then-microsoft&amp;#34;&amp;gt;She Advocated For Women, Then Microsoft Pushed Her Off Its Board&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/she-advocated-for-women-then-microsoft&amp;#34;&amp;gt;“Are you trying to fucking destroy the company?” Bill Gates asked former board member Maria Klawe when she pushed for diversity.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jul 2 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;8&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/okay-lets-talk-about-social-media/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jaana Dogan – Medium</title>
      <link>https://www.whatsupup.com/blog/doable/warrantable/20210709-041203/</link>
      <pubDate>Fri, 09 Jul 2021 04:12:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/doable/warrantable/20210709-041203/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0----------------------------&amp;#34;&amp;gt;1 day ago&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://rakyll.medium.com/three-ways-to-trace-end-to-end-f61181d6db63?source=user_profile---------0----------------------------&amp;#34;&amp;gt;Three ways to trace end-to-end&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Having end-to-end distributed traces is a huge challenge for any project. In distributed tracing, end-to-end tracing is a term often used to refer to traces that capture most components in a critical path. Imagine an HTTP request made to trigger a Lambda function. Being able to see the HTTP client, load balancing and scheduling decisions, any outgoing requests made from the Lambda function to serve the request would be “more end-to-end” than just capturing a trace with a function invocation. End-to-end traces are critical because they tell you the larger picture story and how your systems interact with others. …&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/new-story?source=user_profile-------------------------------------&amp;#34;&amp;gt;Write&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-002009/</link>
      <pubDate>Fri, 09 Jul 2021 00:20:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210709-002009/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132838_dodge-confirms-electric-muscle-car-for-2024&amp;#34;&amp;gt;Dodge confirms electric muscle car for 2024&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-001645/</link>
      <pubDate>Fri, 09 Jul 2021 00:16:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210709-001645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/two-haitian-americans-in-custody-after-presidents-killing-minister-says-idUSKCN2EE1NU&amp;#34;&amp;gt;Two Haitian Americans in custody after president&amp;#39;s killing, minister says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -Haitian police killed four suspects in the assassination of President Jovenel Moise and arrested six more including two Haitian Americans, a minister said on Thursday, as authorities sought the masterminds behind the killing that stunned the impoverished Caribbean nation.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210709-001645/</link>
      <pubDate>Fri, 09 Jul 2021 00:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210709-001645/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/morgan-stanley-discloses-data-breach-that-resulted-from-accellion-fta-hacks/&amp;#34;&amp;gt;Morgan Stanley discloses data breach that resulted from Accellion FTA hacks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Financial services firm says data was stolen by exploiting flaws discovered in December.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210709-001457/</link>
      <pubDate>Fri, 09 Jul 2021 00:14:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210709-001457/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2014/03/19/how-do-you-know-if-rng-is-working/&amp;#34;&amp;gt;How do you know if an RNG is working?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210709-000624/</link>
      <pubDate>Fri, 09 Jul 2021 00:06:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210709-000624/</guid>
      <description>Last week cybercriminals deployed ransomware to 1,500 organizations, including many that provide IT security and technical support to other companies. The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to a data-leaking security flaw that was first identified in the same software six years ago.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-202032/</link>
      <pubDate>Thu, 08 Jul 2021 20:20:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-202032/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132836_1994-audi-rs-2-avant-for-sale-on-bring-a-trailer&amp;#34;&amp;gt;1994 Audi RS 2 Avant for sale on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1097801_2023-mercedes-benz-glc-class-spy-shots-and-video&amp;#34;&amp;gt;2023 Mercedes-Benz GLC-Class spy shots: Popular crossover coming in for redesign&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210708-201850/</link>
      <pubDate>Thu, 08 Jul 2021 20:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210708-201850/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/08/technology/fidji-simo-instacart.html&amp;#34;&amp;gt;Instacart hires a top Facebook executive as its new chief. Fidji Simo, the new chief, worked on Facebook’s advertising business and helped develop parts of the company’s mobile advertising. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-201655/</link>
      <pubDate>Thu, 08 Jul 2021 20:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-201655/</guid>
      <description>&amp;lt;p&amp;gt;U.S. judge sentences Michael Avenatti, former lawyer for Stormy Daniels, to 30 months in prison in Nike extortion case &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2EE29B&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haiti-police-say-they-have-presidents-suspected-killers-still-hunting-masterminds-idUSKCN2EE1NU&amp;#34;&amp;gt;Haiti police say they have president&amp;#39;s suspected killers, still hunting masterminds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Haiti&amp;amp;#39;s police has killed or apprehended the suspected killers of President Jovenel Moise, officials said on Thursday, and are hunting for the masterminds behind the assassination that stunned the impoverished Caribbean nation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-biden-afghanistan/biden-says-afghans-must-decide-own-future-u-s-to-leave-on-aug-31-idUSKCN2EE0CZ&amp;#34;&amp;gt;Biden says Afghans must decide own future; U.S. to leave on Aug. 31&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-venezuela-politics-exclusive/exclusive-talks-between-venezuelan-govt-opposition-set-for-august-sources-idUSKCN2EE29Z&amp;#34;&amp;gt;Exclusive-Talks between Venezuelan gov&amp;amp;#39;t, opposition set for August -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210708-200552/</link>
      <pubDate>Thu, 08 Jul 2021 20:05:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210708-200552/</guid>
      <description>Michael Sanders , executive vice president of account management at Kaseya, confirmed that the customer portal was taken offline in response to a vulnerability report. Sanders said the portal had been retired in 2018 in favor of a more modern customer support and ticketing system, yet somehow the old site was still left available online.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-161948/</link>
      <pubDate>Thu, 08 Jul 2021 16:19:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-161948/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132835_stellantis-confirms-plans-for-solid-state-batteries-4-ev-platforms&amp;#34;&amp;gt;Stellantis confirms plans for solid-state batteries, 4 EV platforms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132834_british-startup-wells-reveals-porsche-boxster-rival&amp;#34;&amp;gt;British startup Wells reveals Porsche Boxster rival&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-161640/</link>
      <pubDate>Thu, 08 Jul 2021 16:16:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-161640/</guid>
      <description>&amp;lt;p&amp;gt;The 2020 Tokyo Olympics will be held without spectators, says Japan’s Olympics minister &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2EE1HS&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haitians-awake-to-uncertainty-after-presidential-assassination-idUSKCN2EE1NU&amp;#34;&amp;gt;Haitians awake to uncertainty after presidential assassination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Haitians awoke to uncertainty on Thursday, awaiting the outcome of a gunbattle between police and a hit squad that assassinated President Jovenel Moise, while politicians argued over who should assume the leadership of the violence-wracked country.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020/host-city-tokyo-bans-olympic-spectators-amid-covid-19-emergency-idUSKCN2EE01R&amp;#34;&amp;gt;Host city Tokyo bans Olympic spectators amid COVID-19 emergency&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hungary-lgbt/as-hungarys-anti-lgbt-law-takes-effect-some-teachers-are-defiant-idUSKCN2EE108&amp;#34;&amp;gt;As Hungary&amp;amp;#39;s anti-LGBT law takes effect, some teachers are defiant&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210708-160540/</link>
      <pubDate>Thu, 08 Jul 2021 16:05:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210708-160540/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/kaseya-left-customer-portal-vulnerable-to-2015-flaw-in-its-own-software/&amp;#34;&amp;gt;Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Last week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to a data-leaking security flaw that was first identified in the same software six years ago.&amp;lt;br&amp;gt;
On July 3, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=revil&amp;#34;&amp;gt;REvil ransomware affiliate program&amp;lt;/a&amp;gt; began using a zero-day security hole ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30116&amp;#34;&amp;gt;CVE-2021-30116&amp;lt;/a&amp;gt; ) to deploy ransomware to hundreds of IT management companies running Kaseya’s remote management software — known as the Kaseya Virtual System Administrator (VSA).&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30116&amp;#34;&amp;gt;this entry for CVE-2021-30116&amp;lt;/a&amp;gt; , the security flaw that powers that Kaseya VSA zero-day was assigned a vulnerability number on April 2, 2021, indicating Kaseya &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/&amp;#34;&amp;gt;had roughly three months to address the bug before it was exploited in the wild&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Also on July 3, security incident response firm Mandiant notified Kaseya that their billing and customer support site — portal.kaseya.net — was vulnerable to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/vuln/detail/CVE-2015-2862&amp;#34;&amp;gt;CVE-2015-2862&amp;lt;/a&amp;gt; , a “directory traversal” vulnerability in Kaseya VSA that allows remote users to read any files on the server using nothing more than a Web browser.&amp;lt;br&amp;gt;
As its name suggests, CVE-2015-2862 was issued in July 2015. Six years later, Kaseya’s customer portal was still exposed to the data-leaking weakness.&amp;lt;br&amp;gt;
The Kaseya customer support and billing portal. Image: Archive.org.&amp;lt;br&amp;gt;
Mandiant notified Kaseya after hearing about it from Alex Holden , founder and chief technology officer of Milwaukee-based cyber intelligence firm &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.holdsecurity.com&amp;#34;&amp;gt;Hold Security&amp;lt;/a&amp;gt; . Holden said the 2015 vulnerability was present on Kaseya’s customer portal until Saturday afternoon, allowing him to download the site’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/webconfig-file-detected/&amp;#34;&amp;gt;“web.config” file&amp;lt;/a&amp;gt; , a server component that often contains sensitive information such as usernames and passwords and the locations of key databases.&amp;lt;br&amp;gt;
“It’s not like they forgot to patch something that Microsoft fixed years ago,” Holden said. “It’s a patch for their own software. And it’s not zero-day. It’s from 2015!”&amp;lt;br&amp;gt;
The official description of CVE-2015-2862 says a would-be attacker would need to be already authenticated to the server for the exploit to work. But Holden said that was not the case with the vulnerability on the Kaseya portal that he reported via Mandiant.&amp;lt;br&amp;gt;
“This is worse because the CVE calls for an authenticated user,” Holden said. “This was not.”&amp;lt;br&amp;gt;
“It was deprecated but left up,” Sanders said.&amp;lt;br&amp;gt;
In a written statement shared with KrebsOnSecurity, Kaseya said that in 2015 CERT reported two vulnerabilities in its VSA product.&amp;lt;br&amp;gt;
“We worked with CERT on responsible disclosure and released patches for VSA versions V7, R8, R9 and R9 along with the public disclosure (CVEs) and notifications to our customers. Portal.kaseya.net was not considered by our team to be part of the VSA shipping product and was not part of the VSA product patch in 2015. It has no access to customer endpoints and has been shut down – and will no longer be enabled or used by Kaseya.”&amp;lt;br&amp;gt;
“At this time, there is no evidence this portal was involved in the VSA product security incident,” the statement continued. “We are continuing to do forensic analysis on the system and investigating what data is actually there.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/kaseya-left-customer-portal-vulnerable-to-2015-flaw-in-its-own-software/#more-56209&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-121932/</link>
      <pubDate>Thu, 08 Jul 2021 12:19:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210708-121932/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132829_review-update-2021-porsche-911-turbo-s-deals-out-supercar-thrills&amp;#34;&amp;gt;Review update: 2021 Porsche 911 Turbo S deals out supercar thrills&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132833_tuned-polestar-2-with-469-hp-shows-up-at-2021-goodwood-festival-of-speed&amp;#34;&amp;gt;Tuned Polestar 2 with 469 hp shows up at 2021 Goodwood Festival of Speed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-121629/</link>
      <pubDate>Thu, 08 Jul 2021 12:16:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-121629/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-afghanistan-withdrawal/britain-has-withdrawn-nearly-all-its-troops-from-afghanistan-pm-johnson-idUSKCN2EE19X&amp;#34;&amp;gt;Britain has withdrawn nearly all its troops from Afghanistan - PM Johnson&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -Most British troops have been pulled out of Afghanistan, British Prime Minister Boris Johnson said on Thursday, ending its official role in a two-decades long conflict amid fears the departure of foreign soldiers could lead to a chaotic civil war.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-violence/israel-demolishes-family-home-of-suspected-palestinian-attacker-idUSKCN2EE10J&amp;#34;&amp;gt;Israel demolishes family home of suspected Palestinian attacker&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210708-121600/</link>
      <pubDate>Thu, 08 Jul 2021 12:15:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210708-121600/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/07/08/business/mark-zuckerberg-sheryl-sandberg-facebook.html&amp;#34;&amp;gt;Mark Zuckerberg and Sheryl Sandberg’s Partnership Did Not Survive Trump The company they built is wildly successful. But her Washington wisdom didn’t hold up, and neither did their close working relationship. By Sheera Frenkel and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-081606/</link>
      <pubDate>Thu, 08 Jul 2021 08:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-081606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia-state/sydney-sees-worst-pandemic-day-of-2021-two-weeks-into-lockdown-idUSKCN2EE049&amp;#34;&amp;gt;Sydney sees worst pandemic day of 2021 two weeks into lockdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SYDNEY (Reuters) -Australia&amp;amp;#39;s New South Wales (NSW) state on Thursday reported its biggest daily rise in locally acquired cases of COVID-19 this year as officials struggle to stamp out a growing cluster of the highly infectious Delta variant.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020/spectators-to-face-olympic-ban-as-tokyo-declares-coronavirus-emergency-report-idUSKCN2EE01R&amp;#34;&amp;gt;Spectators to face Olympic ban as Tokyo declares coronavirus emergency-report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-041717/</link>
      <pubDate>Thu, 08 Jul 2021 04:17:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-041717/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haiti-police-battle-gunmen-who-killed-president-amid-fears-of-chaos-idUSKCN2ED0YM&amp;#34;&amp;gt;Haiti police battle gunmen who killed president, amid fears of chaos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -Haiti&amp;amp;#39;s security forces were locked in a fierce gun battle on Wednesday with assailants who assassinated President Jovenel Moise at his home overnight, plunging the already impoverished, violence-wracked nation deeper into chaos.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president-snapshot/haiti-may-slip-deeper-into-lawlessness-after-presidents-killing-idUSKCN2EE00P&amp;#34;&amp;gt;Haiti may slip deeper into lawlessness after president&amp;amp;#39;s killing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020/japan-to-declare-covid-19-emergency-for-tokyo-as-it-mulls-olympics-without-fans-idUSKCN2EE01R&amp;#34;&amp;gt;Japan to declare COVID-19 emergency for Tokyo as it mulls Olympics without fans&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210708-001849/</link>
      <pubDate>Thu, 08 Jul 2021 00:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210708-001849/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/microsofts-emergency-patch-fails-to-fix-critical-printnightmare-vulnerability/&amp;#34;&amp;gt;Microsoft’s emergency patch fails to fix critical “PrintNightmare” vulnerability&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Game-over code-execution attacks are still possible even after fix is installed.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-001843/</link>
      <pubDate>Thu, 08 Jul 2021 00:18:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210708-001843/</guid>
      <description>&amp;lt;p&amp;gt;A U.S. appeals court has suspended former Trump lawyer Rudy Giuliani from practicing law in Washington, D.C. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2ED2OF&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
PORT-AU-PRINCE (Reuters) -Haitian President Jovenel Moise was shot dead by gunmen with assault rifles in his private residence overnight on Wednesday, sparking fears of a further descent into chaos in the impoverished Caribbean nation as a manhunt got underway.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iraq-security/rockets-hit-iraqi-base-housing-u-s-forces-wounding-two-americans-officials-idUSKCN2ED122&amp;#34;&amp;gt;Rockets hit Iraqi base housing U.S. forces, wounding two Americans -officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear/iran-says-concern-over-its-enriched-uranium-metal-process-is-unnecessary-idUSKCN2ED2AJ&amp;#34;&amp;gt;Iran says concern over its enriched uranium metal process is &amp;amp;#34;unnecessary&amp;amp;#34;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-202119/</link>
      <pubDate>Wed, 07 Jul 2021 20:21:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-202119/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132702_pearl-yellow-2012-lexus-lfa-with-72-miles-sells-for-808-000-on-bring-a-trailer&amp;#34;&amp;gt;Pearl Yellow 2012 Lexus LFA with 72 miles sells for $808,000 on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128707_ineos-grenadier-off-roader-s-rugged-interior-revealed&amp;#34;&amp;gt;Ineos Grenadier off-roader&amp;amp;#39;s rugged interior revealed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-201740/</link>
      <pubDate>Wed, 07 Jul 2021 20:17:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-201740/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/gunmen-assassinate-haitian-president-at-his-home-hunt-launched-for-killers-idUSKCN2ED0YM&amp;#34;&amp;gt;Gunmen assassinate Haitian president at his home, hunt launched for killers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
PORT-AU-PRINCE (Reuters) -Haitian President Jovenel Moise was shot dead by gunmen with heavy-caliber weapons in his private residence overnight on Wednesday, sparking an international outcry amid fears of a descent into chaos in the impoverished Caribbean nation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iraq-security/rockets-hit-iraqi-base-housing-u-s-forces-wounding-two-americans-officials-idUSKCN2ED122&amp;#34;&amp;gt;Rockets hit Iraqi base housing U.S. forces, wounding two Americans- officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210707-200635/</link>
      <pubDate>Wed, 07 Jul 2021 20:06:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210707-200635/</guid>
      <description>Microsoft’s out-of-band update may not completely fix the PrinterNightmare vulnerability. Security researcher &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.gentilkiwi.com/&amp;#34;&amp;gt;Benjamin Delpy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/gentilkiwi/status/1412771368534528001&amp;#34;&amp;gt;posted on Twitter&amp;lt;/a&amp;gt; that the exploit still works on a fully patched Windows server if the server also has Point &amp;amp;amp; Print enabled — a Windows feature that automatically downloads and installs available printer drivers.&amp;lt;br&amp;gt;
Delpy said it’s common for organizations to enable Point &amp;amp;amp; Print using group policies because it allows users to install printer updates without getting approval first from IT.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-162045/</link>
      <pubDate>Wed, 07 Jul 2021 16:20:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-162045/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132823_2022-ram-1500-g-t-pickups-offer-popular-mods-straight-from-the-factory&amp;#34;&amp;gt;2022 Ram 1500 G/T pickups offer popular mods straight from the factory&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-161752/</link>
      <pubDate>Wed, 07 Jul 2021 16:17:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-161752/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haitian-president-assassinated-by-gunmen-at-home-state-of-emergency-declared-idUSKCN2ED0YM&amp;#34;&amp;gt;Haitian president assassinated by gunmen at home, state of emergency declared&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Haitian President Jovenel Moise was shot dead by unidentified attackers in his private residence overnight in a &amp;amp;#34;barbaric act&amp;amp;#34;, the government said on Wednesday, stirring fears of escalating turmoil in the impoverished Caribbean nation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iraq-security/rockets-hit-iraqi-base-housing-u-s-forces-wounding-two-u-s-coalition-idUSKCN2ED122&amp;#34;&amp;gt;Rockets hit Iraqi base housing U.S. forces, wounding two - U.S. coalition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-crossing/with-aid-in-balance-syrians-who-fled-assad-fear-deeper-hardship-idUSKCN2ED1EO&amp;#34;&amp;gt;With aid in balance, Syrians who fled Assad fear deeper hardship&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Overreacted — A blog by Dan Abramov</title>
      <link>https://www.whatsupup.com/blog/vernalize/massed/20210707-160625/</link>
      <pubDate>Wed, 07 Jul 2021 16:06:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/vernalize/massed/20210707-160625/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://overreacted.io/npm-audit-broken-by-design/&amp;#34;&amp;gt;npm audit: Broken by Design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Found 99 vulnerabilities (84 moderately irrelevant, 15 highly irrelevant)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210707-160617/</link>
      <pubDate>Wed, 07 Jul 2021 16:06:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210707-160617/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/microsoft-issues-emergency-patch-for-windows-flaw/&amp;#34;&amp;gt;Microsoft Issues Emergency Patch for Windows Flaw&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “ PrintNightmare ,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, and follows the publishing of exploit code showing would-be attackers how to leverage the flaw to break into Windows computers.&amp;lt;br&amp;gt;
At issue is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527&amp;#34;&amp;gt;CVE-2021-34527&amp;lt;/a&amp;gt; , which involves a flaw in the Windows Print Spooler service that could be exploited by attackers to run code of their choice on a target’s system. Microsoft says it has already detected active exploitation of the vulnerability.&amp;lt;br&amp;gt;
Satnam Narang , staff research engineer at Tenable , said Microsoft’s patch warrants urgent attention because of the vulnerability’s ubiquity across organizations and the prospect that attackers could exploit this flaw in order to take over a Windows domain controller.&amp;lt;br&amp;gt;
“We expect it will only be a matter of time before it is more broadly incorporated into attacker toolkits,” Narang said. “PrintNightmare will remain a valuable exploit for cybercriminals as long as there are unpatched systems out there, and as we know, unpatched vulnerabilities have a long shelf life for attackers.”&amp;lt;br&amp;gt;
In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc-blog.microsoft.com/2021/07/06/out-of-band-oob-security-update-available-for-cve-2021-34527/&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; , Microsoft’s Security Response Center said it was delayed in developing fixes for the vulnerability in Windows Server 2016 , Windows 10 version 1607 , and Windows Server 2012 . The fix also apparently includes a new feature that allows Windows administrators to implement stronger restrictions on the installation of printer software.&amp;lt;br&amp;gt;
“Prior to installing the July 6, 2021, and newer Windows Updates containing protections for CVE-2021-34527, the printer operators’ security group could install both signed and unsigned printer drivers on a printer server,” reads Microsoft’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.microsoft.com/en-us/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7&amp;#34;&amp;gt;support advisory&amp;lt;/a&amp;gt; . “After installing such updates, delegated admin groups like printer operators can only install signed printer drivers. Administrator credentials will be required to install unsigned printer drivers on a printer server going forward.”&amp;lt;br&amp;gt;
Windows 10 users can check for the patch by opening Windows Update. Chances are, it will show what’s pictured in the screenshot below — that KB5004945 is available for download and install. A reboot will be required after installation.&amp;lt;br&amp;gt;
Friendly reminder: It’s always a good idea to backup your data before applying security updates. Windows 10 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lifehacker.com/how-to-back-up-your-computer-automatically-with-windows-1762867473&amp;#34;&amp;gt;has some built-in tools&amp;lt;/a&amp;gt; to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once.&amp;lt;br&amp;gt;
This post will be updated if Windows users start reporting any issues in applying the patch.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-122106/</link>
      <pubDate>Wed, 07 Jul 2021 12:21:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-122106/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131329_2022-volkswagen-golf-r-variant-price-specs-review-photos-info&amp;#34;&amp;gt;2022 Volkswagen Golf R wagon revealed with 315 hp, drift mode&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1117959_lamborghini-aventador-ultimae-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: Lamborghini Aventador Ultimae revealed as last bull with non-electrified V-12&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-121746/</link>
      <pubDate>Wed, 07 Jul 2021 12:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-121746/</guid>
      <description>&amp;lt;p&amp;gt;Haitian President shot dead at home overnight: prime minister &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2ED0YM&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-lebanon-crisis/french-envoy-slams-lebanon-pm-for-shifting-blame-on-economic-collapse-idUSKCN2ED18Z&amp;#34;&amp;gt;French envoy slams Lebanon PM for shifting blame on economic collapse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The French ambassador rebuked Lebanon&amp;amp;#39;s prime minister for saying the country was under siege and blamed years of &amp;amp;#34;mismanagement and inactivity&amp;amp;#34; by Lebanese leaders for its economic collapse.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-haiti-president/haitian-president-assassinated-at-home-in-barbaric-act-pm-idUSKCN2ED0YM&amp;#34;&amp;gt;Haitian president assassinated at home in &amp;amp;#39;barbaric act&amp;amp;#39; -PM&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iraq-security/rockets-hit-iraqi-base-housing-u-s-forces-wounding-three-u-s-coalition-idUSKCN2ED122&amp;#34;&amp;gt;Rockets hit Iraqi base housing U.S. forces, wounding three - U.S. coalition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/07/07/bubble-man-brings-joy-to-san-francisco-s?videoId=732594083&amp;amp;videoChannel=118169&amp;#34;&amp;gt;&amp;amp;#39;Bubble man&amp;amp;#39; brings joy to San Francisco streets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-082106/</link>
      <pubDate>Wed, 07 Jul 2021 08:21:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-082106/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132819_preview-lotus-emira-is-automaker-s-farewell-to-internal-combustion&amp;#34;&amp;gt;Preview: Lotus Emira is automaker&amp;#39;s farewell to internal combustion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132817_preview-2022-bentley-flying-spur-hybrid-debuts-as-536-hp-plug-in-grand-tourer&amp;#34;&amp;gt;Preview: 2022 Bentley Flying Spur Hybrid debuts as 536-hp plug-in grand tourer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-081813/</link>
      <pubDate>Wed, 07 Jul 2021 08:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-081813/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-locked-down-for-another-week-as-delta-covid-19-variant-spreads-idUSKCN2EC2IG&amp;#34;&amp;gt;Sydney locked down for another week as Delta COVID-19 variant spreads&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SYDNEY (Reuters) -The leader of Australia&amp;amp;#39;s New South Wales (NSW) state on Wednesday ordered a week-long extension of Sydney&amp;amp;#39;s COVID-19 lockdown, warning new cases are bound to rise as the country&amp;amp;#39;s biggest city grapples with the highly infectious Delta variant.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-rights-lgbt/chinas-wechat-deletes-university-lgbt-accounts-idUSKCN2ED08Y&amp;#34;&amp;gt;China&amp;amp;#39;s Wechat deletes university LGBT accounts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-041945/</link>
      <pubDate>Wed, 07 Jul 2021 04:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-041945/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea/iran-takes-steps-to-make-enriched-uranium-metal-u-s-europe-powers-dismayed-idUSKCN2EC21S&amp;#34;&amp;gt;Iran takes steps to make enriched uranium metal; U.S., Europe powers dismayed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-locked-down-for-another-week-as-delta-covid-variant-spreads-idUSKCN2EC2IG&amp;#34;&amp;gt;Sydney locked down for another week as Delta COVID variant spreads&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-002509/</link>
      <pubDate>Wed, 07 Jul 2021 00:25:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210707-002509/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132734_2022-bmw-2-series-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW 2-Series coupe keeps the rear-wheel-drive dream alive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132819_lotus-emira-is-automaker-s-farewell-to-internal-combustion&amp;#34;&amp;gt;Lotus Emira is automaker&amp;amp;#39;s farewell to internal combustion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-002123/</link>
      <pubDate>Wed, 07 Jul 2021 00:21:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210707-002123/</guid>
      <description>&amp;lt;p&amp;gt;Eric Adams poised to win New York City Democratic mayoral primary with one-point lead over Kathryn Garcia &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2EC1TP&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea/iran-begins-process-of-making-enriched-uranium-metal-u-s-e3-dismayed-idUSKCN2EC21S&amp;#34;&amp;gt;Iran begins process of making enriched uranium metal; U.S., E3 dismayed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
VIENNA/WASHINGTON (Reuters) -Iran has begun the process of producing enriched uranium metal, the U.N. atomic watchdog said on Tuesday, a move that could help it develop a nuclear weapon and that three European powers said threatened talks to revive the 2015 Iran nuclear deal.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children/canadian-indigenous-group-takes-charge-of-child-welfare-services-idUSKCN2EC2GB&amp;#34;&amp;gt;Canadian indigenous group takes charge of child welfare services&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-liverpool/mass-testing-reduced-liverpool-covid-19-cases-by-a-fifth-study-finds-idUSKCN2EC2KG&amp;#34;&amp;gt;Mass-testing reduced Liverpool COVID-19 cases by a fifth, study finds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210707-002107/</link>
      <pubDate>Wed, 07 Jul 2021 00:21:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210707-002107/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/up-to-1500-businesses-infected-in-one-of-the-worst-ransomware-attacks-ever/&amp;#34;&amp;gt;Up to 1,500 businesses infected in one of the worst ransomware attacks ever&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Mass compromise is having cascading effects around the world.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210707-001918/</link>
      <pubDate>Wed, 07 Jul 2021 00:19:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210707-001918/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2013/09/06/on-nsa/&amp;#34;&amp;gt;On the NSA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-202356/</link>
      <pubDate>Tue, 06 Jul 2021 20:23:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-202356/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125996_peugeot-reveals-9x8-le-mans-hypercar-destined-for-2022-world-endurance-championship&amp;#34;&amp;gt;Peugeot reveals 9X8 Le Mans Hypercar destined for 2022 World Endurance Championship&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-202025/</link>
      <pubDate>Tue, 06 Jul 2021 20:20:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-202025/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea/iran-gives-iaea-notice-of-escalating-uranium-metal-work-idUSKCN2EC21S&amp;#34;&amp;gt;Iran gives IAEA notice of escalating uranium metal work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-dam-un/u-n-urges-ethiopia-egypt-and-sudan-to-recommit-to-dam-talks-idUSKCN2EC294&amp;#34;&amp;gt;U.N. urges Ethiopia, Egypt and Sudan to recommit to dam talks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-162420/</link>
      <pubDate>Tue, 06 Jul 2021 16:24:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-162420/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132817_2022-bentley-flying-spur-hybrid-debuts-as-536-hp-plug-in-grand-tourer&amp;#34;&amp;gt;2022 Bentley Flying Spur Hybrid debuts as 536-hp plug-in grand tourer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132812_audi-teases-concepts-for-electric-gt-sports-car-and-urban-crossover&amp;#34;&amp;gt;Audi teases concepts for electric GT, sports car and urban crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-162017/</link>
      <pubDate>Tue, 06 Jul 2021 16:20:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-162017/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-russia-tajikista/russia-drills-attack-helicopters-pledges-help-to-secure-tajik-afghan-border-idUSKCN2EC0WN&amp;#34;&amp;gt;Russia drills attack helicopters, pledges help to secure Tajik-Afghan border&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-race-sweeper-widerimage/scholar-by-day-street-sweeper-by-night-one-black-man-navigates-rios-racial-divide-idUSKCN2EC1K9&amp;#34;&amp;gt;Scholar by day, street-sweeper by night, one Black man navigates Rio&amp;amp;#39;s racial divide&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20210706-160938/</link>
      <pubDate>Tue, 06 Jul 2021 16:09:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20210706-160938/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/hwh.html&amp;#34;&amp;gt;How to Work Hard&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/own.html&amp;#34;&amp;gt;Project&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/fn.html&amp;#34;&amp;gt;Fierce&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/newideas.html&amp;#34;&amp;gt;Crazy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-122244/</link>
      <pubDate>Tue, 06 Jul 2021 12:22:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210706-122244/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132811_2022-genesis-g80-sport-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Genesis G80 Sport revealed with all-wheel steering&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129997_2023-bmw-x8-m-spy-shots&amp;#34;&amp;gt;2023 BMW X8 M spy shots: M division plans electrified V-8 crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129768_hyundai-teases-elantra-n-sport-sedan-debut-set-for-july-14&amp;#34;&amp;gt;Hyundai teases Elantra N sport sedan, debut set for July 14&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210706-122057/</link>
      <pubDate>Tue, 06 Jul 2021 12:20:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210706-122057/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/07/06/business/economy-stock-market-news/nextdoor-the-social-network-for-neighborhoods-plans-to-go-public&amp;#34;&amp;gt;Nextdoor, the social network for neighborhoods, plans to go public. This was featured in live coverage. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-121845/</link>
      <pubDate>Tue, 06 Jul 2021 12:18:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-121845/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-babariko/belarus-jails-lukashenko-foe-babariko-for-14-years-in-sham-trial-idUSKCN2EC0KQ&amp;#34;&amp;gt;Belarus jails Lukashenko foe Babariko for 14 years in &amp;#39;sham&amp;#39; trial&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MOSCOW (Reuters) -A court in Belarus jailed former presidential contender Viktor Babariko for 14 years on Tuesday after convicting him on corruption charges he denied, sparking condemnation from the West and the embattled opposition-in-exile.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-airplane/no-survivors-from-plane-crash-in-russias-far-east-rescue-officials-say-idUSKCN2EC0D1&amp;#34;&amp;gt;No survivors from plane crash in Russia&amp;amp;#39;s far east, rescue officials say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-081859/</link>
      <pubDate>Tue, 06 Jul 2021 08:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-081859/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-india-twitter/twitter-loses-immunity-over-user-generated-content-in-india-idUSKCN2EC0HE&amp;#34;&amp;gt;Twitter loses immunity over user-generated content in India&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-041923/</link>
      <pubDate>Tue, 06 Jul 2021 04:19:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-041923/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-israel-pfizer/israel-sees-drop-in-pfizer-vaccine-protection-against-infections-still-strong-in-severe-illness-idUSKCN2EB1NH&amp;#34;&amp;gt;Israel sees drop in Pfizer vaccine protection against infections, still strong in severe illness&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israel reported on Monday a decrease in the effectiveness of the Pfizer/BioNTech COVID-19 vaccine in preventing infections and symptomatic illness but said it remained highly effective in preventing serious illness.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-rainfall/rescuers-resume-search-for-24-missing-in-japan-landslides-idUSKCN2EC03K&amp;#34;&amp;gt;Rescuers resume search for 24 missing in Japan landslides&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hk-leader-says-ideologies-pose-security-risk-teenagers-need-to-be-monitored-idUSKCN2EC07C&amp;#34;&amp;gt;HK leader says &amp;amp;#39;ideologies&amp;amp;#39; pose security risk, teenagers need to be monitored&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-001923/</link>
      <pubDate>Tue, 06 Jul 2021 00:19:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210706-001923/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nigeria-security-kidnappings-school/some-150-students-missing-after-gunmen-raid-nigerian-school-parent-administrator-idUSKCN2EB0YZ&amp;#34;&amp;gt;Some 150 students missing after gunmen raid Nigerian school –parent, administrator&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210706-000915/</link>
      <pubDate>Tue, 06 Jul 2021 00:09:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210706-000915/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-a-super-subscription-center-in-retool-using-stripe-and-sync-inc/&amp;#34;&amp;gt;How to build a Super Subscription Center in Retool using Stripe and Sync Inc. This tutorial walks how to build a subscription management center using Retool, Stripe, and Sync Inc.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-201925/</link>
      <pubDate>Mon, 05 Jul 2021 20:19:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-201925/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-lockdown/return-to-normal-uk-pm-johnson-outlines-end-to-englands-virus-restrictions-idUSKCN2EB0FW&amp;#34;&amp;gt;Return to normal? UK PM Johnson outlines end to England&amp;#39;s virus restrictions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -British Prime Minister Boris Johnson set out plans on Monday to end social and economic COVID-19 restrictions in England in two weeks&amp;amp;#39; time, a test of whether a rapid vaccine rollout offers enough protection from the highly contagious Delta variant.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-taliban/tajikistan-calls-up-reservists-to-bolster-border-as-afghan-troops-fleeing-taliban-seek-refuge-idUSKCN2EB0QA&amp;#34;&amp;gt;Tajikistan calls up reservists to bolster border as Afghan troops, fleeing Taliban, seek refuge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-161958/</link>
      <pubDate>Mon, 05 Jul 2021 16:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-161958/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-taliban/afghan-security-personnel-flee-into-tajikistan-as-taliban-advance-idUSKCN2EB0QA&amp;#34;&amp;gt;Afghan security personnel flee into Tajikistan as Taliban advance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DUSHANBE, Tajikistan/KABUL (Reuters) -More than 1,000 Afghan security personnel have fled across the border into Tajikistan after Taliban advances in northern Afghanistan, the Tajik border guard service said on Monday, while dozens of others were captured by the insurgents.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-lockdown/uk-pm-johnson-outlines-end-englands-virus-restrictions-idUSKCN2EB0FW&amp;#34;&amp;gt;UK PM Johnson outlines end England&amp;amp;#39;s virus restrictions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nigeria-security-kidnappings-school/some-150-students-missing-after-gunmen-raid-nigerian-school-parent-administrator-idUSKCN2EB0YZ&amp;#34;&amp;gt;Some 150 students missing after gunmen raid Nigerian school – parent, administrator&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210705-161202/</link>
      <pubDate>Mon, 05 Jul 2021 16:12:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210705-161202/</guid>
      <description>05 Jul 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-05/computing-performance-on-the-horizon.html&amp;#34;&amp;gt;USENIX LISA2021 Computing Performance: On the Horizon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210705-122246/</link>
      <pubDate>Mon, 05 Jul 2021 12:22:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210705-122246/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132789_deep-dive-2022-cadillac-ct4-v-blackwing-gets-serious-about-downforce&amp;#34;&amp;gt;Deep dive: 2022 Cadillac CT4-V Blackwing gets serious about downforce&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132804_vanderhall-brawley-is-a-200-mile-electric-off-roader-with-35-inch-tires&amp;#34;&amp;gt;Vanderhall Brawley is a 200-mile electric off-roader with 35-inch tires&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132767_a-v-8-powered-datsun-240z-rumbles-into-jay-leno-s-garage&amp;#34;&amp;gt;A V-8-powered Datsun 240Z rumbles into Jay Leno&amp;amp;#39;s Garage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-121859/</link>
      <pubDate>Mon, 05 Jul 2021 12:18:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-121859/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-lockdown/pm-johnson-to-set-out-lockdown-easing-though-pandemic-not-over-idUSKCN2EB0FW&amp;#34;&amp;gt;PM Johnson to set out lockdown easing, though pandemic &amp;#39;not over&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -British Prime Minister Boris Johnson will set out plans on Monday for the final step in easing England&amp;amp;#39;s COVID-19 lockdown, including guidance on social distancing, face coverings and working from home.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-pope-surgery/pope-in-good-condition-alert-after-surgery-to-remove-part-of-colon-idUSKCN2EB0PT&amp;#34;&amp;gt;Pope in good condition, alert after surgery to remove part of colon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-mexico-cases/mexico-officials-hope-vaccine-coverage-will-make-pandemic-surge-less-deadly-idUSKCN2EB0S0&amp;#34;&amp;gt;Mexico officials hope vaccine coverage will make pandemic surge less deadly&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-082040/</link>
      <pubDate>Mon, 05 Jul 2021 08:20:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-082040/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-rainfall/eighty-missing-after-japan-landslide-search-races-time-weather-idUSKCN2EB00D&amp;#34;&amp;gt;Eighty missing after Japan landslide, search races time, weather&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
TOKYO (Reuters) -Rescuers in Japan searched desperately on Monday for survivors among 80 people believed to be still missing two days after landslides tore through the seaside city of Atami, destroying houses and burying roads under mud and rock.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-philippines-airplane-crash/philippines-orders-probe-after-military-plane-crash-kills-50-idUSKCN2EA0MN&amp;#34;&amp;gt;Philippines orders probe after military plane crash kills 50&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-telecoms-exclusive/exclusive-after-pressuring-telecom-firms-myanmars-junta-bans-executives-from-leaving-idUSKCN2EB00N&amp;#34;&amp;gt;Exclusive: After pressuring telecom firms, Myanmar&amp;amp;#39;s junta bans executives from leaving&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-002134/</link>
      <pubDate>Mon, 05 Jul 2021 00:21:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210705-002134/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-philippines-airplane-crash/philippines-plane-crash-kills-47-injures-49-probe-ordered-idUSKCN2EA0MN&amp;#34;&amp;gt;Philippines&amp;#39; plane crash kills 47, injures 49; probe ordered&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MANILA (Reuters) -All 96 passengers of the Philippine Air Force plane that crashed on Sunday killing 47 people have been accounted for, military chief Cirilito Sobejana said on Monday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210704-202354/</link>
      <pubDate>Sun, 04 Jul 2021 20:23:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210704-202354/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132803_2021-ford-f-150-raptor-is-now-a-1-379-piece-lego-model&amp;#34;&amp;gt;2021 Ford F-150 Raptor is now a 1,379-piece Lego model&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132752_2022-subaru-wrx-teased-debuting-soon&amp;#34;&amp;gt;2022 Subaru WRX teased, debuting soon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210704-202106/</link>
      <pubDate>Sun, 04 Jul 2021 20:21:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210704-202106/</guid>
      <description>July 4, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/04/Is-GitHub-a-derivative-work.html&amp;#34;&amp;gt;Is GitHub a derivative work of GPL&amp;#39;d software?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
July 3, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/07/03/How-does-IRC-federate.html&amp;#34;&amp;gt;How does IRC&amp;#39;s federation model compare to ActivityPub?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210704-201957/</link>
      <pubDate>Sun, 04 Jul 2021 20:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210704-201957/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cyber-kaseya-sweden/major-ransomware-attack-against-u-s-tech-provider-forces-swedish-store-closures-idUSKCN2E90F5&amp;#34;&amp;gt;Major ransomware attack against U.S. tech provider forces Swedish store closures&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
STOCKHOLM (Reuters) -One of the largest ransomware attacks in history spread worldwide on Saturday, forcing the Swedish Coop grocery store chain to close all 800 of its stores because it could not  operate its cash registers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-kremlin/kremlin-says-provocations-like-uk-warship-episode-demand-tough-response-idUSKCN2EA09D&amp;#34;&amp;gt;Kremlin says &amp;amp;#39;provocations&amp;amp;#39; like UK warship episode demand tough response&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A British warship&amp;amp;#39;s entry into what Moscow considers Russian territorial waters near Crimea last month is the kind of provocation that demands a tough response, the Kremlin said on Sunday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict/ethiopias-tigray-demands-troop-withdrawals-for-ceasefire-talks-idUSKCN2EA08X&amp;#34;&amp;gt;Ethiopia&amp;amp;#39;s Tigray demands troop withdrawals for ceasefire talks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/myanmar-forces-kill-25-in-raid-on-town-residents-and-media-say-idUSKCN2EA069&amp;#34;&amp;gt;Myanmar forces kill 25 in raid on town, residents and media say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210704-201806/</link>
      <pubDate>Sun, 04 Jul 2021 20:18:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210704-201806/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/&amp;#34;&amp;gt;How safe is Apple&amp;#39;s Safe Browsing?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>https://intuitiveexplanations.com/tech</title>
      <link>https://www.whatsupup.com/blog/emphysema/mesalliance/000000-000000/</link>
      <pubDate>Sun, 04 Jul 2021 16:03:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/emphysema/mesalliance/000000-000000/</guid>
      <description>[Marking site as being monitored from now on]</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-161932/</link>
      <pubDate>Sat, 03 Jul 2021 16:19:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-161932/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-bagram/what-was-the-point-afghans-rue-decades-of-war-as-u-s-quits-bagram-idUSKCN2E90FL&amp;#34;&amp;gt;&amp;#39;What was the point?&amp;#39; Afghans rue decades of war as U.S. quits Bagram&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
As American troops left their main military base in Afghanistan on Friday, marking a symbolic end to the longest war in U.S. history, locals living in the shadow of the base and in nearby Kabul were left ruing the past and bracing for what comes next.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-vatican-trial/cardinal-among-10-indicted-by-vatican-for-financial-crimes-idUSKCN2E908B&amp;#34;&amp;gt;Cardinal among 10 indicted by Vatican for financial crimes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-politics/brazil-top-court-gives-nod-for-probe-into-bolsonaro-over-vaccine-deal-idUSKCN2E90D9&amp;#34;&amp;gt;Brazil top court gives nod for probe into Bolsonaro over vaccine deal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210703-161150/</link>
      <pubDate>Sat, 03 Jul 2021 16:11:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210703-161150/</guid>
      <description>03 Jul 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-07-03/how-to-add-bpf-observability.html&amp;#34;&amp;gt;How To Add eBPF Observability To Your Product&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-121949/</link>
      <pubDate>Sat, 03 Jul 2021 12:19:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-121949/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-vatican-trial/vatican-judge-indicts-10-including-a-cardinal-for-alleged-financial-crimes-idUSKCN2E908B&amp;#34;&amp;gt;Vatican judge indicts 10, including a cardinal, for alleged financial crimes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
VATICAN CITY (Reuters) -A Vatican judge on Saturday ordered 10 people, including an Italian cardinal, to stand trial for alleged financial crimes including embezzlement, money laundering, fraud, extortion and abuse of office.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210703-080702/</link>
      <pubDate>Sat, 03 Jul 2021 08:07:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210703-080702/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/another-0-day-looms-for-many-western-digital-users/&amp;#34;&amp;gt;Another 0-Day Looms for Many Western Digital Users&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Some of Western Digital’s MyCloud-based data storage devices. Image: WD.&amp;lt;br&amp;gt;
Countless Western Digital customers saw their MyBook Live network storage drives remotely wiped in the past month thanks to a bug in a product line the company stopped supporting in 2015, as well as a previously unknown zero-day flaw. But there is a similarly serious zero-day flaw present in a much broader range of newer Western Digital MyCloud network storage devices that will remain unfixed for many customers who can’t or won’t upgrade to the latest operating system.&amp;lt;br&amp;gt;
At issue is a remote code execution flaw residing in all Western Digital network attached storage (NAS) devices running MyCloud OS 3 , an operating system the company only recently stopped supporting.&amp;lt;br&amp;gt;
Researchers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.flashback.sh/&amp;#34;&amp;gt;Radek Domanski and Pedro Ribeiro&amp;lt;/a&amp;gt; originally planned to present their findings at the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thezdi.com/blog/2020/7/28/announcing-pwn2own-tokyo-2020-live-from-toronto&amp;#34;&amp;gt;Pwn2Own hacking competition in Tokyo&amp;lt;/a&amp;gt; last year. But just days before the event Western Digital released MyCloud OS 5 , which eliminated the bug they found. That update effectively nullified their chances at competing in Pwn2Own, which requires exploits to work against the latest firmware or software supported by the targeted device.&amp;lt;br&amp;gt;
Nevertheless, in February 2021, the duo published &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=vsg9YgvGBec&amp;#34;&amp;gt;this detailed YouTube video&amp;lt;/a&amp;gt; , which documents how they discovered a chain of weaknesses that allows an attacker to remotely update a vulnerable device’s firmware with a malicious backdoor — using a low-privileged user account that has a blank password.&amp;lt;br&amp;gt;
The researchers said Western Digital never responded to their reports. In a statement provided to KrebsOnSecurity, Western Digital said it received their report after Pwn2Own Tokyo 2020, but that at the time the vulnerability they reported had already been fixed by the release of My Cloud OS 5.&amp;lt;br&amp;gt;
“The communication that came our way confirmed the research team involved planned to release details of the vulnerability and asked us to contact them with any questions,” Western Digital said. “We didn’t have any questions so we didn’t respond. Since then, we have updated our process and respond to every report in order to avoid any miscommunication like this again. We take reports from the security research community very seriously and conduct investigations as soon as we receive them.”&amp;lt;br&amp;gt;
Western Digital ignored questions about whether the flaw found by Domanski and Ribeiro was ever addressed in OS 3. A statement published on its support site March 12, 2021 says the company will &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.westerndigital.com/support/productsecurity/wdc-21004-recommended-upgrade-to-mycloud-os-5&amp;#34;&amp;gt;no longer provide further security updates to the MyCloud OS 3 firmware&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“We strongly encourage moving to the My Cloud OS5 firmware,” the statement reads. “If your device is not eligible for upgrade to My Cloud OS 5, we recommend that you upgrade to one of our other My Cloud offerings that support My Cloud OS 5. More information can be found &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://shop.westerndigital.com/support/software/my-cloud-os&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .” A list of MyCloud devices that can support OS 5 is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/another-0-day-looms-for-many-western-digital-users/#more-56182&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-042025/</link>
      <pubDate>Sat, 03 Jul 2021 04:20:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-042025/</guid>
      <description>&amp;lt;p&amp;gt;Jul 02 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-south-korea-ferry-extradition/south-korea-can-seek-extradition-linked-to-2014-ferry-sinking-u-s-judge-idUSKCN2E9004&amp;#34;&amp;gt;South Korea can seek extradition linked to 2014 ferry sinking -U.S. judge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australian-officials-report-biggest-daily-covid-19-caseload-for-2021-idUSKCN2E902Z&amp;#34;&amp;gt;Australian officials report biggest daily COVID-19 caseload for 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210703-002132/</link>
      <pubDate>Sat, 03 Jul 2021 00:21:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210703-002132/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/google-boots-google-play-apps-for-stealing-users-facebook-passwords/&amp;#34;&amp;gt;Apps with 5.8 million Google Play downloads stole users’ Facebook passwords&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Researchers uncovered 9 apps that used a sneaking method to pilfer credentials.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-002128/</link>
      <pubDate>Sat, 03 Jul 2021 00:21:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210703-002128/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-cyber-kaseya/ransomware-breach-at-florida-it-firm-hits-200-businesses-idUSKCN2E82FB&amp;#34;&amp;gt;Ransomware breach at Florida IT firm hits 200 businesses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -Hundreds of American businesses were hit Friday by an unusually sophisticated ransomware attack that hijacked widely used technology management software from a Miami-based supplier called Kaseya.&amp;lt;br&amp;gt;
KABUL (Reuters) -American troops pulled out of their main military base in Afghanistan on Friday, leaving behind a piece of the World Trade Center they buried 20 years ago in a country that could descend into civil war without them.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-un/u-n-warns-of-worsening-famine-more-clashes-in-ethiopias-tigray-idUSKCN2E82D4&amp;#34;&amp;gt;U.N. warns of worsening famine, more clashes in Ethiopia&amp;amp;#39;s Tigray&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-congress/china-bill-delayed-in-u-s-house-amid-partisan-wrangling-idUSKCN2E82E4&amp;#34;&amp;gt;China bill delayed in U.S. House amid partisan wrangling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210703-001940/</link>
      <pubDate>Sat, 03 Jul 2021 00:19:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210703-001940/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2018/12/17/on-ghost-users-and-messaging-backdoors/&amp;#34;&amp;gt;On Ghost Users and Messaging Backdoors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-202328/</link>
      <pubDate>Fri, 02 Jul 2021 20:23:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-202328/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132794_1994-bugatti-eb-110-gt-prototype-for-sale&amp;#34;&amp;gt;1994 Bugatti EB 110 GT Prototype for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132729_ferrari-296-gtb-2022-honda-civic-2022-toyota-tundra-this-week-s-top-photos&amp;#34;&amp;gt;Ferrari 296 GTB, 2022 Honda Civic, 2022 Toyota Tundra: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-202010/</link>
      <pubDate>Fri, 02 Jul 2021 20:20:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-202010/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-taliban/era-ends-uncertainty-looms-as-u-s-forces-quit-main-afghanistan-base-idUSKCN2E80G6&amp;#34;&amp;gt;Era ends, uncertainty looms as U.S. forces quit main Afghanistan base&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-lebanon-crisis-blast/beirut-blast-judge-to-question-top-politicians-security-officials-idUSKCN2E8197&amp;#34;&amp;gt;Beirut blast judge to question top politicians, security officials&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-corruption-bolsonaro/brazil-top-prosecutor-to-investigate-bolsonaro-over-covid-19-vaccine-deal-idUSKCN2E81OU&amp;#34;&amp;gt;Brazil top prosecutor to investigate Bolsonaro over COVID-19 vaccine deal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-162401/</link>
      <pubDate>Fri, 02 Jul 2021 16:24:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-162401/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130341_1952-ferrari-that-raced-at-le-mans-and-once-traded-hands-for-200-heads-to-auction&amp;#34;&amp;gt;1952 Ferrari that raced at Le Mans and once traded hands for $200 heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-162032/</link>
      <pubDate>Fri, 02 Jul 2021 16:20:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-162032/</guid>
      <description>&amp;lt;p&amp;gt;KABUL (Reuters) -American troops pulled out of their main military base in Afghanistan on Friday, leaving behind a piece of the World Trade Center they buried 20 years ago in a country that the top U.S. commander has warned may descend into civil war without them.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-tigray-analysis/analysis-ethiopia-govt-withdrawal-from-tigray-capital-opens-new-chapter-in-war-idUSKCN2E81PS&amp;#34;&amp;gt;Analysis-Ethiopia govt withdrawal from Tigray capital opens new chapter in war&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-politics-bolsonaro-analysis/analysis-brazils-bolsonaro-is-paying-dearly-to-fend-off-impeachment-idUSKCN2E81VW&amp;#34;&amp;gt;Analysis-Brazil&amp;amp;#39;s Bolsonaro is paying dearly to fend off impeachment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210702-162007/</link>
      <pubDate>Fri, 02 Jul 2021 16:20:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210702-162007/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/07/passwords-in-amazon-echo-dots-live-on-even-after-you-factory-reset-them/&amp;#34;&amp;gt;Thinking about selling your Echo Dot—or any IoT device? Read this first&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Deleting data from Echo Dots—and other IoT devices from Amazon and elsewhere—is hard.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-122440/</link>
      <pubDate>Fri, 02 Jul 2021 12:24:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210702-122440/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132795_review-update-2022-infiniti-qx55-delivers-style-without-substance&amp;#34;&amp;gt;Review update: 2022 Infiniti QX55 delivers style without substance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132292_watch-gmc-s-9-000-lb-hummer-ev-hit-60-mph-in-3-seconds&amp;#34;&amp;gt;Watch GMC&amp;amp;#39;s 9,000-lb Hummer EV hit 60 mph in 3 seconds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132798_north-america-becomes-bugatti-s-biggest-market-for-first-time&amp;#34;&amp;gt;North America becomes Bugatti&amp;amp;#39;s biggest market for first time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-122052/</link>
      <pubDate>Fri, 02 Jul 2021 12:20:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-122052/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-taliban/era-ends-war-looms-as-u-s-forces-quit-main-base-in-afghanistan-idUSKCN2E80G6&amp;#34;&amp;gt;Era ends, war looms as U.S. forces quit main base in Afghanistan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
American troops pulled out of their main military base in Afghanistan on Friday, leaving behind a piece of the World Trade Center they buried 20 years ago in a country that the top U.S. commander has warned may descend into civil war without them.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-asia/delta-variant-sweeps-asia-prompting-curbs-as-vaccination-remains-tepid-idUSKCN2E80RR&amp;#34;&amp;gt;Delta variant sweeps Asia, prompting curbs as vaccination remains tepid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-day-indigenous-statues/statues-of-queen-victoria-queen-elizabeth-ii-toppled-in-canada-idUSKCN2E8151&amp;#34;&amp;gt;Statues of Queen Victoria, Queen Elizabeth II toppled in Canada&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-081935/</link>
      <pubDate>Fri, 02 Jul 2021 08:19:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-081935/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-taliban/u-s-forces-leave-bagram-base-in-afghanistan-official-idUSKCN2E80G6&amp;#34;&amp;gt;U.S. forces leave Bagram base in Afghanistan - official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KABUL (Reuters) -American troops pulled out of their main military base in Afghanistan on Friday, a U.S. defence official said, under an agreement with the Taliban allowing for the withdrawal of all U.S. forces from the country after a two-decade war.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-humantrafficking-asia/forced-labour-main-human-trafficking-crime-in-malaysia-u-s-says-idUSKCN2E80H6&amp;#34;&amp;gt;Forced labour main human trafficking crime in Malaysia, U.S. says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-southkorea-japan-comfortwomen/s-koreas-few-surviving-comfort-women-face-lifes-end-as-political-fight-rages-on-idUSKCN2E80J1&amp;#34;&amp;gt;S.Korea&amp;amp;#39;s few surviving &amp;amp;#39;comfort women&amp;amp;#39; face life&amp;amp;#39;s end as political fight rages on&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-041939/</link>
      <pubDate>Fri, 02 Jul 2021 04:19:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210702-041939/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-nuclear/u-s-calls-build-up-of-chinas-nuclear-arsenal-concerning-idUSKCN2E75KK&amp;#34;&amp;gt;U.S. calls build-up of China&amp;#39;s nuclear arsenal &amp;#39;concerning&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The United States said on Thursday China&amp;amp;#39;s rapid build-up of its nuclear forces was concerning and called on Beijing to engage with it &amp;amp;#34;on practical measures to reduce the risks of destabilizing arms races.&amp;amp;#34;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-policeman-was-stabbed-in-lone-wolf-attack-security-chief-idUSKCN2E8070&amp;#34;&amp;gt;Hong Kong policeman was stabbed in &amp;amp;#34;lone wolf&amp;amp;#34; attack- security chief&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-southkorea-northkorea/s-koreas-moon-and-norths-kim-exchanged-letters-ahead-of-biden-summit-newspaper-idUSKCN2E80BF&amp;#34;&amp;gt;S.Korea&amp;amp;#39;s Moon and North&amp;amp;#39;s Kim exchanged letters ahead of Biden summit -newspaper&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210702-041835/</link>
      <pubDate>Fri, 02 Jul 2021 04:18:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210702-041835/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/okay-lets-talk-about-social-media&amp;#34;&amp;gt;Okay, Let’s Talk About Social Media And Allegations Of Anti-Conservative Bias&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/okay-lets-talk-about-social-media&amp;#34;&amp;gt;The charge is playing a role in the antitrust debate, so some context would be nice.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210702-041748/</link>
      <pubDate>Fri, 02 Jul 2021 04:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210702-041748/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2013/05/14/a-few-thoughts-on-cellular-encryption/&amp;#34;&amp;gt;On cellular encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-202139/</link>
      <pubDate>Thu, 01 Jul 2021 20:21:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-202139/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132766_2005-saleen-s7-twin-turbo-competition-package-with-1-300-miles-for-sale-on-bring-a-trailer&amp;#34;&amp;gt;2005 Saleen S7 twin-turbo competition package with 1,300 miles for sale on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132691_jay-leno-drives-a-1957-chevrolet-step-van-with-a-unique-story&amp;#34;&amp;gt;Jay Leno drives a 1957 Chevrolet Step Van with a unique story&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210701-201817/</link>
      <pubDate>Thu, 01 Jul 2021 20:18:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210701-201817/</guid>
      <description>&amp;lt;p&amp;gt;X&amp;lt;br&amp;gt;
Edition:&amp;lt;br&amp;gt;
International&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world&amp;#34;&amp;gt;World&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world&amp;#34;&amp;gt;World Home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us-politics&amp;#34;&amp;gt;U.S. Politics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/us&amp;#34;&amp;gt;United States&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/uk&amp;#34;&amp;gt;United Kingdom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/china&amp;#34;&amp;gt;China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/india&amp;#34;&amp;gt;India&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/americas&amp;#34;&amp;gt;Americas&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific&amp;#34;&amp;gt;Asia Pacific&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/europe&amp;#34;&amp;gt;Europe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/middle-east-africa&amp;#34;&amp;gt;Middle East &amp;amp;amp; Africa&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/the-great-reboot&amp;#34;&amp;gt;The Great Reboot&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business&amp;#34;&amp;gt;Business&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business&amp;#34;&amp;gt;Business Home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/sustainable-business&amp;#34;&amp;gt;Sustainable Business&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/legal&amp;#34;&amp;gt;Legal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/energy&amp;#34;&amp;gt;Energy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/environment&amp;#34;&amp;gt;Environment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/finance&amp;#34;&amp;gt;Finance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/media-telecom&amp;#34;&amp;gt;Media &amp;amp;amp; Telecoms&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/healthcare-pharmaceuticals&amp;#34;&amp;gt;Healthcare &amp;amp;amp; Pharmaceuticals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/autos-transportation&amp;#34;&amp;gt;Autos &amp;amp;amp; Transportation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/aerospace-defense&amp;#34;&amp;gt;Aerospace &amp;amp;amp; Defense&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/change-suite&amp;#34;&amp;gt;The Change Suite&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/retail-consumer&amp;#34;&amp;gt;Retail &amp;amp;amp; Consumer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/reuters-next&amp;#34;&amp;gt;Reuters Next&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/business/take-five&amp;#34;&amp;gt;Take Five&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets&amp;#34;&amp;gt;Markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets&amp;#34;&amp;gt;Markets Home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/us&amp;#34;&amp;gt;U.S. Markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/europe&amp;#34;&amp;gt;European Markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/asia&amp;#34;&amp;gt;Asian Markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/deals&amp;#34;&amp;gt;Deals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/global-market-data&amp;#34;&amp;gt;Global Market Data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/stocks&amp;#34;&amp;gt;Stocks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/bonds&amp;#34;&amp;gt;Bonds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/funds&amp;#34;&amp;gt;Funds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/commodities&amp;#34;&amp;gt;Commodities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/markets/currencies&amp;#34;&amp;gt;Currencies&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/breakingviews&amp;#34;&amp;gt;Breakingviews&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/technology&amp;#34;&amp;gt;Technology&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/&amp;#34;&amp;gt;Investigations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle&amp;#34;&amp;gt;Lifestyle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle&amp;#34;&amp;gt;Lifestyle Home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports&amp;#34;&amp;gt;Sports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/science&amp;#34;&amp;gt;Science&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/wealth&amp;#34;&amp;gt;Wealth&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/oddly-enough&amp;#34;&amp;gt;Oddly Enough&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/pictures&amp;#34;&amp;gt;Pictures&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video&amp;#34;&amp;gt;Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://graphics.reuters.com/&amp;#34;&amp;gt;Graphics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com&amp;#34;&amp;gt;International&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cn.reuters.com&amp;#34;&amp;gt;中国&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jp.reuters.com&amp;#34;&amp;gt;日本&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-microsoft-breach/microsoft-says-new-breach-discovered-in-probe-of-suspected-solarwinds-hackers-idUSKCN2E12EB&amp;#34;&amp;gt;Microsoft says new breach discovered in probe of suspected SolarWinds hackers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -Microsoft said on Friday an attacker had won access to one of its customer-service agents and then used information from that to launch hacking attempts against customers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea-exclusive/exclusive-iran-restricts-iaea-access-to-main-enrichment-plant-after-attack-diplomats-idUSKCN2E74G4&amp;#34;&amp;gt;Exclusive-Iran restricts IAEA access to main enrichment plant after attack -diplomats&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
PARIS/VIENNA (Reuters) -Iran has been restricting U.N. nuclear inspectors&amp;amp;#39; access to its main uranium enrichment plant at Natanz, citing security concerns after what it says was an attack on the site by Israel in April, diplomats say.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-humantrafficking/in-a-first-u-s-warns-of-dangers-of-systemic-racism-in-human-trafficking-report-idUSKCN2E756T&amp;#34;&amp;gt;In a first, U.S. warns of dangers of systemic racism in human trafficking report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-colombia-protests/colombias-duque-looks-to-get-tough-on-vandalism-critics-decry-attack-on-protests-idUSKCN2E75GO&amp;#34;&amp;gt;Colombia&amp;amp;#39;s Duque looks to get tough on vandalism, critics decry attack on protests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/06/25/the-week-in-numbers-big-brands-and-bitco?videoId=732048377&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: big brands and bitcoin bling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Follow Reuters:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.twitter.com/reuters&amp;#34;&amp;gt;Follow Us On Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/Reuters&amp;#34;&amp;gt;Follow Us On Facebook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/journalists/%20//instagram.com/reuters/&amp;#34;&amp;gt;Follow Us On Instagram&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/user/ReutersVideo&amp;#34;&amp;gt;Follow Us On YouTube&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/company/10256858/&amp;#34;&amp;gt;Follow Us On LinkedIn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Subscribe: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://newslink.reuters.com/join/subscribe&amp;#34;&amp;gt;Newsletters&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/tools/podcasts&amp;#34;&amp;gt;Podcasts&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/tools/mobile&amp;#34;&amp;gt;Apps&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reutersagency.com/?utm_source=website&amp;amp;utm_medium=reuters&amp;amp;utm_campaign=site-referral&amp;amp;utm_content=us&amp;amp;utm_term=0&amp;#34;&amp;gt;Reuters News Agency&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reutersagency.com/en/about/brand-attribution-guidelines/&amp;#34;&amp;gt;Brand Attribution Guidelines&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sales.reuters.com/en%20&amp;#34;&amp;gt;Advertise with Us&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://thomsonreuters.com/en/careers.html&amp;#34;&amp;gt;Careers&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reutersagency.com/en/about/leadership-team/&amp;#34;&amp;gt;Reuters Leadership&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/fact-check&amp;#34;&amp;gt;Reuters Fact Check&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://static.reuters.com/resources/media/editorial/20210405/DiversityReportApril2021.pdf&amp;#34;&amp;gt;Reuters Diversity Report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Reuters, the news and media division of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://thomsonreuters.com/&amp;#34;&amp;gt;Thomson Reuters&amp;lt;/a&amp;gt; , is the world’s largest multimedia news provider, reaching billions of people worldwide every day. Reuters provides business, financial, national and international news to professionals via desktop terminals, the world&amp;amp;#39;s media organizations, industry events and directly to consumers.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.refinitiv.com/en/products/eikon-trading-software&amp;#34;&amp;gt;Eikon Information, analytics and exclusive news on financial markets - delivered in an intuitive desktop and mobile interface&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.refinitiv.com/en/products/refinitiv-data-platform&amp;#34;&amp;gt;Refinitiv Data Platform Access to real-time, reference, and non-real time data in the cloud to power your enterprise.&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.refinitiv.com/en/products/world-check-kyc-screening&amp;#34;&amp;gt;World-Check Screen for heightened risk individuals and entities globally to help uncover hidden risks in business relationships and human networks&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://legalsolutions.thomsonreuters.com/law-products/westlaw-legal-research/&amp;#34;&amp;gt;Westlaw Build the strongest argument relying on authoritative content, attorney-editor expertise, and industry defining technology&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tax.thomsonreuters.com/products/brands/onesource/&amp;#34;&amp;gt;ONESOURCE The most comprehensive solution to manage all your complex and ever-expanding tax and compliance needs&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tax.thomsonreuters.com/products/brands/checkpoint/&amp;#34;&amp;gt;CHECKPOINT The industry leader for online information for tax, accounting and finance professionals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
All quotes delayed a minimum of 15 minutes. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/info/disclaimer&amp;#34;&amp;gt;See here for a complete list&amp;lt;/a&amp;gt; of exchanges and delays.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thomsonreuters.com/en/policies/copyright.html&amp;#34;&amp;gt;©  2021 Reuters. All Rights Reserved.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reutersagency.com/en/contact-reuters/&amp;#34;&amp;gt;Site Feedback&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reutersagency.com/en/contact-reuters/&amp;#34;&amp;gt;Corrections&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thomsonreuters.com/en/privacy-statement.html&amp;#34;&amp;gt;Privacy Policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:window.OneTrust.ToggleInfoDisplay();&amp;#34;&amp;gt;Do Not Sell My Personal Information&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210701-201557/</link>
      <pubDate>Thu, 01 Jul 2021 20:15:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210701-201557/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html&amp;#34;&amp;gt;An EPYC escape: Case-study of a KVM breakout&amp;lt;/a&amp;gt; (Jun)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210701-201215/</link>
      <pubDate>Thu, 01 Jul 2021 20:12:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210701-201215/</guid>
      <description>Just setting up my bitclout &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/7McZFxbiT1&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/7McZFxbiT1&amp;#34;&amp;gt;https://t.co/7McZFxbiT1&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210701-200554/</link>
      <pubDate>Thu, 01 Jul 2021 20:05:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210701-200554/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/&amp;#34;&amp;gt;Intuit to Share Payroll Data from 1.4M Small Businesses With Equifax&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Financial services giant Intuit this week informed 1.4 million small businesses using its QuickBooks Online Payroll and Intuit Online Payroll products that their payroll information will be shared with big-three consumer credit bureau Equifax starting later this year unless customers opt out by the end of this month.&amp;lt;br&amp;gt;
Intuit says the change is tied to an “exciting” and “free” new service that will let millions of small business employees get easy access to employment and income verification services when they wish to apply for a loan or line of credit.&amp;lt;br&amp;gt;
“In early fall 2021, your QuickBooks Online Payroll subscription will include an automated income and employment verification service powered by The Work Number from Equifax,” reads the Intuit email, which &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://glam.app.intuit.com/app/guesttos?glocale=en_US&amp;amp;cid=DR_EM-ELM2953-001a-Text1-NA-TWNPayroll-NA-NA-CN-COMPL-NA-US-QBOPR&amp;#34;&amp;gt;includes a link to the new Terms of Service&amp;lt;/a&amp;gt; . “Your employees may need to verify their income and employment info when applying for things like loans, credit, or public aid. Before, you likely had to manually provide this info to lenders, creditors or government agencies. These verifications will be automated by The Work Number, which helps employees get faster approvals and saves you time.”&amp;lt;br&amp;gt;
An Intuit spokesperson clarified that the new service is not available through QuickBooks Online or to QuickBooks Online users as a whole. Intuit’s FAQ on the changes is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quickbooks.intuit.com/learn-support/en-us/data-utilities/get-answers-to-questions-about-the-work-number-from-equifax/00/897361&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Equifax’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=equifax&#43;breach&amp;#34;&amp;gt;2017 megabreach that exposed the personal and financial details of 145.5 million Americans&amp;lt;/a&amp;gt; may have shocked the public, but it did little to stop &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://secure.theworknumber.talx.com/twneeer/PreAuthenticated/EnterEmployerSearchCriteria.ascx&amp;#34;&amp;gt;more than a million employers&amp;lt;/a&amp;gt; from continuing to sell Equifax their employee payroll data, Bloomberg found in late 2017.&amp;lt;br&amp;gt;
“The workforce-solutions unit is now among Equifax’s fastest-growing businesses, contributing more than a fifth of the firm’s $3.1 billion of revenue last year,” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bloomberg.com/news/articles/2017-10-02/equifax-has-amassed-salary-details-for-people-at-7-100-companies&amp;#34;&amp;gt;wrote&amp;lt;/a&amp;gt; Jennifer Surane . “Using payroll data from government agencies and thousands of employers — including a vast majority of Fortune 500 companies — Equifax has cultivated a database of 300 million current and historic employment records, according to regulatory filings.”&amp;lt;br&amp;gt;
QuickBooks Online user Anthony Citrano &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/acitrano/status/1410351452346720259&amp;#34;&amp;gt;posted on Twitter about receiving the notice&amp;lt;/a&amp;gt; , noting that the upcoming changes had yet to receive any attention in the financial or larger media space.&amp;lt;br&amp;gt;
“The way I read the terms, Equifax gets to proactively collect all payroll data just in case they need to share it later — similar to how they already handle credit reporting,” said Citrano, who is founder and CEO of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://acquicent.com/&amp;#34;&amp;gt;Acquicent&amp;lt;/a&amp;gt; , a company that issues non-fungible tokens (NFTs). “And that feels like a disaster waiting to happen, especially given Equifax’s history.”&amp;lt;br&amp;gt;
In selling payroll data to Equifax, Intuit will be joining some of the world’s largest payroll providers. For example, ADP — the largest payroll software provider in the United States — has long shared payroll data with Equifax.&amp;lt;br&amp;gt;
But Citrano said this move by Intuit will incorporate a large number of fairly small businesses.&amp;lt;br&amp;gt;
“ADP participates in some way already, but QuickBooks Online jumping on the bandwagon means a lot of employees of small to mid-sized businesses are going to be affected,” he said.&amp;lt;br&amp;gt;
Why might small businesses want to think twice before entrusting Equifax with their payroll data? The answer is the company doesn’t have a great track record of protecting that information. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/#more-56153&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/we-infiltrated-a-counterfeit-check-ring-now-what/&amp;#34;&amp;gt;We Infiltrated a Counterfeit Check Ring! Now What?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Imagine waking up each morning knowing the identities of thousands of people who are about to be mugged for thousands of dollars each. You know exactly when and where each of those muggings will take place, and you’ve shared this information in advance with the authorities each day for a year with no outward indication that they are doing anything about it. How frustrated would you be?&amp;lt;br&amp;gt;
A counterfeit check image [redacted] that was intended for a person helping this fraud gang print and mail phony checks tied to a raft of email-based scams. One fraud-fighting group is intercepting hundreds to thousands of these per day.&amp;lt;br&amp;gt;
Such is the curse of the fraud fighter known online by the handles “ Brianna Ware ” and “ B. Ware ” for short, a longtime member of a global group of volunteers who’ve infiltrated a cybercrime gang that disseminates counterfeit checks tied to a dizzying number of online scams.&amp;lt;br&amp;gt;
For the past year, B. Ware has maintained contact with an insider from the criminal group that’s been sending daily lists of would-be victims who are to receive counterfeit checks printed using the real bank account information of legitimate companies.&amp;lt;br&amp;gt;
“Some days we’re seeing thousands of counterfeit checks going out,” B. Ware said.&amp;lt;br&amp;gt;
The scams used in connection with the fraudulent checks vary widely, from fake employment and “mystery shopper” schemes to those involving people who have been told they can get paid to cover their cars in advertisements (a.k.a. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.consumer.ftc.gov/blog/2016/08/how-spot-car-wrap-scam&amp;#34;&amp;gt;the “car wrap” scam&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
A form letter mailed out with a counterfeit check urges the recipient to text a phone number after the check has been deposited.&amp;lt;br&amp;gt;
Most of the counterfeit checks being disseminated by this fraud group are in amounts ranging from $2,500 to $5,000. The crimes that the checks enable are known variously as “ advanced fee ” scams, in that they involve tricking people into making payments in anticipation of receiving something of greater value in return.&amp;lt;br&amp;gt;
But in each scheme the goal is the same: Convince the recipient to deposit the check and then wire a portion of the amount somewhere else. A few days after the check is deposited, it gets invariably canceled by the organization whose bank account information was on the check. And then person who deposited the phony check is on the hook for the entire amount.&amp;lt;br&amp;gt;
“Like the car wrap scam, where they send you a check for $5,000, and you agree to keep $1,000 for your first payment and send the rest back to them in exchange for the car wrap materials,” B. Ware said. “Usually the check includes a letter that says they want you to text a specific phone number to let them know you received the check. When you do that, they’ll start sending you instructions on how and where to send the money.”&amp;lt;br&amp;gt;
A typical confirmation letter that accompanies a counterfeit check for a car wrap scam.&amp;lt;br&amp;gt;
Traditionally, these groups have asked recipients to transit money via wire transfer. But these days, B. Ware said, the same crooks are now asking people to forward the money via mobile applications like CashApp and Venmo .&amp;lt;br&amp;gt;
B. Ware and other volunteer fraud fighters believe the fake checks gang is using people looped into phony employment schemes and wooed through online romance scams to print the counterfeit checks, and that other recruits are responsible for mailing them out each day.&amp;lt;br&amp;gt;
“More often than not, the scammers creating the shipping labels will provide those to an unwitting accomplice, or the accomplice is told to log in to an account and print the labels,” B. Ware explained.&amp;lt;br&amp;gt;
Often the counterfeit checks and labels forwarded by B. Ware’s informant come with notes attached indicating the type of scam with which they are associated.&amp;lt;br&amp;gt;
“Sometimes they’re mystery shopper scams, and other times it’s overpayment for an item sold on Craigslist,” B. Ware said. “We don’t know how the scammers are getting the account and routing numbers for these checks, but they are drawn on real companies and always scan fine through a bank’s systems initially. The recipients can deposit them at any bank, but we try to get the checks to the banks when we can so they have a heads up.”&amp;lt;br&amp;gt;
SHRINKING FROM THE FIREHOSE?&amp;lt;br&amp;gt;
Roughly a year ago, B. Ware’s group started sharing its intelligence with fraud investigators at FedEx and the U.S. Postal Service — the primary delivery mechanisms for these counterfeit checks.&amp;lt;br&amp;gt;
Both the USPS and FedEx have an interest in investigating because the fraudsters in this case are using stolen shipping labels paid for by companies who have no idea their FedEx or USPS accounts are being used for such purposes.&amp;lt;br&amp;gt;
“In most cases, the name of the sender will be completely unrelated to what’s being sent,” B. Ware said. “For example, you’ll see a label for a letter to go out with a counterfeit check for a car wrap scam, and the sender on the shipping label will be something like XYZ Biological Resources.”&amp;lt;br&amp;gt;
But B. Ware says a year later, there is little sign that anyone is interested in acting on the shared intelligence.&amp;lt;br&amp;gt;
“It’s so much information that they really don’t want it anymore and they’re not doing anything about it,” B. Ware said of FedEx and the USPS. “It’s almost like they’re turning a blind eye. There are so many of these checks going out each day that instead of trying to drink from the firehouse, they’re just turning their heads.”&amp;lt;br&amp;gt;
FedEx did not respond to requests for comment. The U.S. Postal Inspection Service responded with a statement saying it “does not comment publicly on its investigative procedures and operational protocols.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/we-infiltrated-a-counterfeit-check-ring-now-what/#more-55409&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-162136/</link>
      <pubDate>Thu, 01 Jul 2021 16:21:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-162136/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132788_805-hp-e-legend-el1-electric-super-coupe-channels-the-audi-sport-quattro-in-fantastic-fashion&amp;#34;&amp;gt;805-hp E-Legend EL1 electric super coupe channels the Audi Sport Quattro in fantastic fashion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132785_klein-vision-s-flying-car-completes-first-intercity-flight&amp;#34;&amp;gt;Klein Vision&amp;amp;#39;s flying car completes first intercity flight&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210701-161458/</link>
      <pubDate>Thu, 01 Jul 2021 16:14:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210701-161458/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/measuring-security-risks-in-open-source.html&amp;#34;&amp;gt;Measuring Security Risks in Open Source Software: Scorecards Launches V2&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Kim Lewandowski, Azeem Shaikh, Laurent Simon, Google Open Source Security Team &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/07/measuring-security-risks-in-open-source.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Kim Lewandowski, Azeem Shaikh, Laurent Simon, Google Open Source Security Team&amp;lt;br&amp;gt;
Contributors to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard&amp;#34;&amp;gt;Scorecards project&amp;lt;/a&amp;gt; , an automated security tool that produces a “risk score” for open source projects, have accomplished a lot since &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2020/11/security-scorecards-for-open-source.html&amp;#34;&amp;gt;our launch last fall.&amp;lt;/a&amp;gt; Today, in collaboration  with the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://openssf.org/&amp;#34;&amp;gt;Open Source Security Foundation&amp;lt;/a&amp;gt; community, we are announcing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/releases/tag/v2.0.0&amp;#34;&amp;gt;Scorecards v2&amp;lt;/a&amp;gt; . We have added new security checks, scaled up the number of projects being scored, and made this data easily accessible for analysis. With so much software today relying on open-source projects, consumers need an easy way to judge whether their dependencies are safe. Scorecards helps reduce the toil and manual effort required to continually evaluate changing packages when maintaining a project’s supply chain. Consumers can automatically assess the risks that dependencies introduce and use this data to make informed decisions about accepting these risks, evaluating alternative solutions, or working with the maintainers to make improvements.&amp;lt;br&amp;gt;
Identifying Risks&amp;lt;br&amp;gt;
Since last fall, Scorecards’ coverage has grown; we&amp;amp;#39;ve added several new checks, following the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html&amp;#34;&amp;gt;Know, Prevent, Fix framework&amp;lt;/a&amp;gt; proposed by Google earlier this year, to prioritize our additions:&amp;lt;br&amp;gt;
Malicious contributors Contributors with malicious intent or compromised accounts can introduce potential backdoors into code. Code reviews help mitigate against such attacks. With the new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#branch-protection&amp;#34;&amp;gt;Branch-Protection&amp;lt;/a&amp;gt; check, developers can verify that the project enforces mandatory code review from another developer before code is committed. Currently, this check can only be run by a repository admin due to GitHub API limitations. For a third-party repository, use the less informative &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#code-review&amp;#34;&amp;gt;Code-Review&amp;lt;/a&amp;gt; check instead.&amp;lt;br&amp;gt;
Vulnerable code Despite best efforts by developers and peer reviews, vulnerable code can enter source control and remain undetected. That’s why it&amp;amp;#39;s important to enable continuous fuzzing and static code analysis to catch bugs early in the development lifecycle. We have added checks to detect if a project uses &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#fuzzing&amp;#34;&amp;gt;Fuzzing&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#sast&amp;#34;&amp;gt;SAST&amp;lt;/a&amp;gt; tools as part of their CI/CD system.&amp;lt;br&amp;gt;
Build system compromise A common CI/CD solution used by GitHub projects is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/features/actions&amp;#34;&amp;gt;GitHub Actions&amp;lt;/a&amp;gt; . A danger with these action workflows is that they may handle untrusted user input. Meaning, an attacker can craft a malicious pull request to gain access to the privileged GitHub token, and with it the ability to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/heres-how-a-researcher-broke-into-microsoft-vs-codes-github/&amp;#34;&amp;gt;push malicious code to the repo&amp;lt;/a&amp;gt; without review. To mitigate this risk, Scorecard&amp;amp;#39;s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#token-permissions&amp;#34;&amp;gt;Token-Permissions&amp;lt;/a&amp;gt; prevention check now verifies that the GitHub workflows follow the principle of least privilege by making GitHub tokens read-only by default.&amp;lt;br&amp;gt;
Bad dependencies Any software is as secure as its weakest dependency. This may sound obvious, but the first step to knowing our dependencies is simply to declare them... and have our dependencies declare them too. Once we have this provenance information, we can assess the risks of our software and mitigate those risks. Unfortunately, there are several widely-used anti-patterns that break this provenance principle. The first of these anti-patterns is checked-in binaries -- as there&amp;amp;#39;s no way to easily verify or check the contents of the binary in the project. Scorecards provides &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#binary-artifacts&amp;#34;&amp;gt;Binary-Artifacts&amp;lt;/a&amp;gt; check for testing this. Another anti-pattern is the use of curl | bash in scripts which dynamically pulls dependencies. Cryptographic hashes let us pin our dependencies to a known value: if this value ever changes, the build system will detect it and refuse to build. Pinning dependencies is useful everywhere we have dependencies: not just during compilation, but also in Dockerfiles, CI/CD workflows, etc. Scorecards checks for these anti-patterns with the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#frozen-deps&amp;#34;&amp;gt;Frozen-Deps&amp;lt;/a&amp;gt; check. This check is helpful for mitigating against malicious dependency attacks such as the recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://about.codecov.io/security-update/&amp;#34;&amp;gt;CodeCov&amp;lt;/a&amp;gt; attack. Even with hash-pinning, hashes need to be updated once in a while when dependencies patch vulnerabilities. Tools like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.github.com/en/code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/configuring-dependabot-security-updates&amp;#34;&amp;gt;dependabot&amp;lt;/a&amp;gt; or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/renovatebot/renovate&amp;#34;&amp;gt;renovatebot&amp;lt;/a&amp;gt; give us the opportunity to review and update the hashes. The Scorecards &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#automatic-dependency-update&amp;#34;&amp;gt;Automated-Dependency-Update&amp;lt;/a&amp;gt; check verifies that developers rely on such tools to update their dependencies. It is important to know vulnerabilities in a project before uptaking it as a dependency. Scorecards can provide this information via the new &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/checks/checks.md#vulnerabilities&amp;#34;&amp;gt;Vulnerabilities&amp;lt;/a&amp;gt; check, without the need to subscribe to a vulnerability alert system.&amp;lt;br&amp;gt;
Scaling the impact&amp;lt;br&amp;gt;
To date, the Scorecards project has scaled up to evaluate security criteria for over &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/cron/data/projects.csv&amp;#34;&amp;gt;50,000&amp;lt;/a&amp;gt; open source projects. In order to scale this project, we undertook a massive redesign of our architecture and used a PubSub model which achieved horizontal scalability and higher throughput. This fully automated tool periodically evaluates critical open source projects and exposes the Scorecards check information through a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://console.cloud.google.com/bigquery?p=openssf&amp;amp;page=table&amp;amp;d=scorecardcron&amp;amp;t=scorecard&amp;#34;&amp;gt;public BigQuery dataset&amp;lt;/a&amp;gt; which is refreshed weekly.&amp;lt;br&amp;gt;
This data can be retrieved using the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cloud.google.com/bigquery/docs/reference/bq-cli-reference&amp;#34;&amp;gt;bq command line tool&amp;lt;/a&amp;gt; . The following example shows how to export data for the Kubernetes project. Substitute the url for the repo to export data from a different project:&amp;lt;br&amp;gt;
$ bq query --nouse_legacy_sql &amp;amp;#39;SELECT Repo, Date, Checks FROM openssf.scorecardcron.scorecard_latest WHERE Repo=&amp;amp;#34;github.com/kubernetes/kubernetes&amp;amp;#34;&amp;amp;#39;&amp;lt;br&amp;gt;
To export the latest data on all analyzed projects, see instructions &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard#public-data&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
How does the internet measure up?&amp;lt;br&amp;gt;
Scorecards data for available projects is now included in the recently &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2021/06/introducing-open-source-insights-project.html&amp;#34;&amp;gt;announced&amp;lt;/a&amp;gt; Google Open Source Insights &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/&amp;#34;&amp;gt;project&amp;lt;/a&amp;gt; and also showcased in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://metrics.openssf.org/&amp;#34;&amp;gt;OpenSSF Security Metrics project&amp;lt;/a&amp;gt; . The data on these sites shows that there are still important security gaps to fill, even in widely used packages &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://deps.dev/go/k8s.io%2Fkubernetes&amp;#34;&amp;gt;like Kubernetes&amp;lt;/a&amp;gt; . We also analyzed Scorecards data through Google Data Studio -- one of our data analysis and visualization tools.The diagram below shows a breakdown of the checks that were run and the pass/fail outcome for the 50,000 repositories:&amp;lt;br&amp;gt;
As we can see, a lot needs to be done to improve the security of these critical projects. A large number of these projects are not continuously &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz&amp;#34;&amp;gt;fuzzed&amp;lt;/a&amp;gt; , do not define a security policy for reporting vulnerabilities, and do not pin dependencies, to name just a few common problems. We all need to come together as an industry to drive awareness of these widespread security risks, and to make improvements that will benefit everyone.&amp;lt;br&amp;gt;
Scorecards in Action&amp;lt;br&amp;gt;
Several large projects have adopted Scorecards and are keeping us updated on their experiences with it. Below are some examples of Scorecards in action:&amp;lt;br&amp;gt;
Envoy Early on we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.envoyproxy.io/security-scorecards-envoy-automating-supply-chain-analysis-7b8fd9829169&amp;#34;&amp;gt;talked&amp;lt;/a&amp;gt; about how the Envoy maintainers adopted Scorecards for their project and integrated it within their policy on introducing new dependencies. Since then, pull requests introducing new dependencies to Envoy must get approval from a dependency maintainer who uses Scorecards to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/envoyproxy/envoy/blob/main/DEPENDENCY_POLICY.md#new-external-dependencies&amp;#34;&amp;gt;evaluate&amp;lt;/a&amp;gt; the dependency against a set of criteria. In addition, Envoy also got right to work in improving its own security health metrics according to its own Scorecards evaluation, and is now pinning C&#43;&#43; dependencies and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/envoyproxy/envoy/issues/12951&amp;#34;&amp;gt;requiring&amp;lt;/a&amp;gt; pip hashes for python dependencies. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/envoyproxy/envoy/issues/16579&amp;#34;&amp;gt;Github actions&amp;lt;/a&amp;gt; are also pinned in the continuous integration flow. Previously, Envoy had created a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/envoyproxy/envoy/blob/main/tools/dependency/ossf_scorecard.py&amp;#34;&amp;gt;tool&amp;lt;/a&amp;gt; that outputs Scorecards data on its dependencies as a CSV that can be used to generate a table of results:&amp;lt;br&amp;gt;
Now with more project data, Envoy is able to automatically generate up-to-date Scorecard information about its dependencies and publish it in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.envoyproxy.io/docs/envoy/latest/intro/arch_overview/security/external_deps&amp;#34;&amp;gt;documentation&amp;lt;/a&amp;gt; , like the following:&amp;lt;br&amp;gt;
Scorecards We improved our own score for the Scorecards! For example, we are now pinning our own dependencies by hash (e.g. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commit/3b1c9b8496a7ff8dad8506691fa28f2d60b14a90&amp;#34;&amp;gt;docker dependencies&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commit/6367cc44f6a1d8318e452761253f2935b1becd4a&amp;#34;&amp;gt;workflow dependencies&amp;lt;/a&amp;gt; ) to prevent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://about.codecov.io/security-update/&amp;#34;&amp;gt;CodeCov&amp;lt;/a&amp;gt; style attacks. We’ve also included a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/SECURITY.md&amp;#34;&amp;gt;Security Policy&amp;lt;/a&amp;gt; based on this &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-vulnerability-guide&amp;#34;&amp;gt;recommended template&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We look forward to continuing to grow the Scorecards community. The project now has contributions from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/graphs/contributors&amp;#34;&amp;gt;23&amp;lt;/a&amp;gt; developers. Thank you to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commits?author=azeemshaikh38&amp;#34;&amp;gt;Azeem&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commits?author=naveensrinivasan&amp;#34;&amp;gt;Naveen&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commits?author=laurentsimon&amp;#34;&amp;gt;Laurent&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commits?author=asraa&amp;#34;&amp;gt;Asra&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/commits?author=chrismcgehee&amp;#34;&amp;gt;Chris&amp;lt;/a&amp;gt; for their work building these new features and scaling Scorecards. If you would like to join the fun, check out these good first timer &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/issues&amp;#34;&amp;gt;issues&amp;lt;/a&amp;gt; . If you would like us to help you run Scorecards on specific projects, please submit a GitHub pull request to add those projects &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/blob/main/cron/data/projects.csv&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; . Last but not least, we have a lot of ideas and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/issues?q=is%3Aopen&#43;is%3Aissue&#43;%22new&#43;check%3A%22&amp;#34;&amp;gt;many more checks we’d like to add&amp;lt;/a&amp;gt; , but we want to hear from you. Tell us which checks you would like to see in the next version of Scorecards.&amp;lt;br&amp;gt;
What’s next?&amp;lt;br&amp;gt;
There are a couple of big enhancements we’re especially excited about:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/issues/271&amp;#34;&amp;gt;Scorecards Badges&amp;lt;/a&amp;gt; - GitHub badges to show off compliance&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/scorecard/issues/193&amp;#34;&amp;gt;Integration with CI/CD and GitHub Code Scanning Results&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/ossf/allstar&amp;#34;&amp;gt;Integration with Allstar project&amp;lt;/a&amp;gt; - GitHub App for enforcing security policies&amp;lt;br&amp;gt;
Thanks again to the entire Scorecards community and the OpenSSF for making this project successful. If you’re adopting and improving the score of the projects you maintain, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slack.openssf.org/#security_scorecards&amp;#34;&amp;gt;tell us&amp;lt;/a&amp;gt; about it. Until next time, keep on improving those scores!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-122109/</link>
      <pubDate>Thu, 01 Jul 2021 12:21:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-122109/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1034652_2021-lexus-ls-review-price-photos-specs-info&amp;#34;&amp;gt;First drive review: 2021 Lexus LS 500 delivers bargain flagship in need of a flagship powertrain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132782_dallara-stradale-sports-car-spawns-more-extreme-track-variant&amp;#34;&amp;gt;Dallara Stradale sports car spawns more extreme track variant&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-042042/</link>
      <pubDate>Thu, 01 Jul 2021 04:20:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210701-042042/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132769_volvo-concept-recharge-is-the-electric-wagon-of-the-future&amp;#34;&amp;gt;Volvo Concept Recharge is the electric wagon of the future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132764_the-quickest-police-car-isn-t-a-car-it-s-a-ford-f-150-pickup-truck&amp;#34;&amp;gt;The quickest police car isn&amp;amp;#39;t a car, it&amp;amp;#39;s a Ford F-150 pickup truck&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132553_princess-diana-s-1981-ford-escort-sells-for-65-000&amp;#34;&amp;gt;Princess Diana&amp;amp;#39;s 1981 Ford Escort sells for $65,000&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132759_2022-audi-meb-electric-crossover-for-china-spy-shots&amp;#34;&amp;gt;2022 Audi electric crossover for China spy shots&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210701-001522/</link>
      <pubDate>Thu, 01 Jul 2021 00:15:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210701-001522/</guid>
      <description>SLSA 1 requires that the build process be fully scripted/automated and generate provenance. Provenance is metadata about how an artifact was built, including the build process, top-level source, and dependencies. Knowing the provenance allows software consumers to make risk-based security decisions. Though provenance at SLSA 1 does not protect against tampering, it offers a basic level of code source identification and may aid in vulnerability management. SLSA 2 requires using version control and a hosted build service that generates authenticated provenance. These additional requirements give the consumer greater confidence in the origin of the software. At this level, the provenance prevents tampering to the extent that the build service is trusted. SLSA 2 also provides an easy upgrade path to SLSA 3. SLSA 3 further requires that the source and build platforms meet specific standards to guarantee the auditability of the source and the integrity of the provenance, respectively. We envision an accreditation process whereby auditors certify that platforms meet the requirements, which consumers can then rely on. SLSA 3 provides much stronger protections against tampering than earlier levels by preventing specific classes of threats, such as cross-build contamination. SLSA 4 is currently the highest level, requiring two-person review of all changes and a hermetic, reproducible build process. Two-person review is an industry best practice for catching mistakes and deterring bad behavior. Hermetic builds guarantee that the provenance’s list of dependencies is complete. Reproducible builds, though not strictly required, provide many auditability and reliability benefits. Overall, SLSA 4 gives the consumer a high degree of confidence that the software has not been tampered with. More details on these proposed levels can be found in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa&amp;#34;&amp;gt;GitHub repository&amp;lt;/a&amp;gt; , including the corresponding Source and Build/Provenance &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://slsa.dev/&amp;#34;&amp;gt;requirements&amp;lt;/a&amp;gt; . We are open to feedback and suggestions for changes on these requirements.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210630-200845/</link>
      <pubDate>Wed, 30 Jun 2021 20:08:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210630-200845/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/unleash-your-creativity-with-stickers-on-discord-99363194871?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Unleash Your Creativity with Stickers on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/unleash-your-creativity-with-stickers-on-discord-99363194871?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Unleash Your Creativity with Stickers on Discord We’re reintroducing Stickers to Discord and giving you ways to incorporate your own sets of stickers within your communities.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210630-161347/</link>
      <pubDate>Wed, 30 Jun 2021 16:13:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210630-161347/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/25/Investing&amp;#34;&amp;gt;Investing Intro&amp;lt;/a&amp;gt; · We’ve started to actively manage some of our family investments. It’s entertaining me, and I notice people really like     talking about money, so why not talk about it here? This is the start of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/What/Investing&amp;#34;&amp;gt;a new blog category&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/25/Investing&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210630-081730/</link>
      <pubDate>Wed, 30 Jun 2021 08:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210630-081730/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/hackers-exploited-0-day-not-2018-bug-to-mass-wipe-my-book-live-devices/&amp;#34;&amp;gt;Hackers exploited 0-day, not 2018 bug, to mass-wipe My Book Live devices [Updated]&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210630-002414/</link>
      <pubDate>Wed, 30 Jun 2021 00:24:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210630-002414/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132320_2022-porsche-cayenne-turbo-gt-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Porsche Cayenne Turbo GT is your top track-focused crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210630-001811/</link>
      <pubDate>Wed, 30 Jun 2021 00:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210630-001811/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/03/05/secure-computing-for-journalists/&amp;#34;&amp;gt;Secure computing for journalists&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210629-202316/</link>
      <pubDate>Tue, 29 Jun 2021 20:23:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210629-202316/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132756_toyota-announces-more-replacement-parts-for-a70-and-a80-supras&amp;#34;&amp;gt;Toyota announces more replacement parts for A70 and A80 Supras&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132751_porsche-tests-cloud-based-warning-system-that-identifies-hazards-in-real-time&amp;#34;&amp;gt;Porsche tests cloud-based warning system that identifies hazards in real time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132749_2023-mercedes-benz-amg-a45-hatchback-spy-shots-mid-cycle-update-on-the-way&amp;#34;&amp;gt;2023 Mercedes-Benz AMG A45 Hatchback spy shots: Mid-cycle update on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210629-202149/</link>
      <pubDate>Tue, 29 Jun 2021 20:21:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210629-202149/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/projects/&amp;#34;&amp;gt;projects&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/teaching/&amp;#34;&amp;gt;teaching&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/pedagogy/&amp;#34;&amp;gt;pedagogy&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/programming/&amp;#34;&amp;gt;programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/sets/&amp;#34;&amp;gt;sets&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/types/&amp;#34;&amp;gt;types&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/language/&amp;#34;&amp;gt;language&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/foundations/&amp;#34;&amp;gt;foundations&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/24/types-versus-sets-in-math-and-programming-languages/#comments&amp;#34;&amp;gt;6 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210629-202132/</link>
      <pubDate>Tue, 29 Jun 2021 20:21:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210629-202132/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/29/technology/facebook-newsletters-bulletin.html&amp;#34;&amp;gt;Facebook unveils ‘Bulletin,’ a newsletter subscription service. The recent growth of start-ups like Substack and Revue has renewed interest in newsletters. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/29/technology/facebook-google-antitrust-tech.html&amp;#34;&amp;gt;Congress Faces Renewed Pressure to ‘Modernize Our Antitrust Laws’ After a federal judge threw out state and federal competition cases against Facebook, calls grew for lawmakers to quickly change century-old monopoly laws. By David McCabe and Steve Lohr&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210629-201941/</link>
      <pubDate>Tue, 29 Jun 2021 20:19:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210629-201941/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/microsoft-digitally-signs-malicious-rootkit-driver/&amp;#34;&amp;gt;Microsoft digitally signs malicious rootkit driver&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Company still hasn&amp;amp;#39;t revealed the cause of this serious security lapse.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Project Zero</title>
      <link>https://www.whatsupup.com/blog/spectrometry/obol/20210629-201712/</link>
      <pubDate>Tue, 29 Jun 2021 20:17:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/spectrometry/obol/20210629-201712/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html&amp;#34;&amp;gt;An EPYC escape: Case-study of a KVM breakout&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Felix Wilhelm, Project Zero&amp;lt;br&amp;gt;
Introduction&amp;lt;br&amp;gt;
KVM (for Kernel-based Virtual Machine) is the de-facto standard hypervisor for Linux-based cloud environments. Outside of Azure, almost all large-scale cloud and hosting providers are running on top of KVM, turning it into one of the fundamental security boundaries in the cloud.&amp;lt;br&amp;gt;
In this blog post I describe a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2177&amp;amp;q=owner%3Afwilhelm%40google.com&amp;amp;can=1&amp;#34;&amp;gt;vulnerability&amp;lt;/a&amp;gt; in KVM’s AMD-specific code and discuss how this bug can be turned into a full virtual machine escape. To the best of my knowledge, this is the first public writeup of a KVM guest-to-host breakout that does not rely on bugs in user space components such as QEMU. The discussed bug was assigned CVE-2021-29657, affects kernel versions v5.10-rc1 to v5.12-rc6 and was patched at the end of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a58d9166a756a0f4a6618e4f593232593d6df134&amp;#34;&amp;gt;March&amp;lt;/a&amp;gt; 2021 . As the bug only became exploitable in v5.10 and was discovered roughly 5 months later, most real world deployments of KVM should not be affected. I still think the issue is an interesting case study in the work required to build a stable guest-to-host escape against KVM and hope that this writeup can strengthen the case that hypervisor compromises are not only theoretical issues.&amp;lt;br&amp;gt;
I start with a short overview of KVM’s architecture, before diving into the bug and its exploitation.&amp;lt;br&amp;gt;
KVM&amp;lt;br&amp;gt;
KVM is a Linux based open source hypervisor supporting hardware accelerated virtualization on x86, ARM, PowerPC and S/390. In contrast to the other big open source hypervisor Xen, KVM is deeply integrated with the Linux Kernel and builds on its scheduling, memory management and hardware integrations to provide efficient virtualization.&amp;lt;br&amp;gt;
KVM is implemented as one or more kernel modules (kvm.ko plus kvm-intel.ko or kvm-amd.ko on x86) that expose a low-level IOCTL-based &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.kernel.org/doc/html/latest/virt/kvm/api.html&amp;#34;&amp;gt;API&amp;lt;/a&amp;gt; to user space processes over the /dev/kvm device. Using this API, a user space process (often called VMM for Virtual Machine Manager) can create new VMs, assign vCPUs and memory, and intercept memory or IO accesses to provide access to emulate d or virtualization-aware hardware devices. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.qemu.org/&amp;#34;&amp;gt;QEMU&amp;lt;/a&amp;gt; has been the standard user space choice for KVM-based virtualization for a long time, but in the last few years alternatives like &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/lkvm/lkvm&amp;#34;&amp;gt;LKVM&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chromium.googlesource.com/chromiumos/platform/crosvm/&amp;#34;&amp;gt;crosvm&amp;lt;/a&amp;gt; or &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/firecracker-microvm/firecracker&amp;#34;&amp;gt;Firecracker&amp;lt;/a&amp;gt; have started to become popular.&amp;lt;br&amp;gt;
While KVM’s reliance on a separate user space component might seem complicated at first, it has a very nice benefit: Each VM running on a KVM host has a 1:1 mapping to a Linux process, making it managable using standard Linux tools.&amp;lt;br&amp;gt;
This means for example, that a guest&amp;amp;#39;s memory can be inspected by dumping the allocated memory of its user space process or that resource limits for CPU time and memory can be applied easily. Additionally, KVM can offload most work related to device emulation to the userspace component. Outside of a couple of performance-sensitive devices related to interrupt handling, all of the complex low-level code for providing virtual disk, network or GPU access can be implemented in userspace.&amp;lt;br&amp;gt;
When looking at public writeups of KVM-related vulnerabilities and exploits it becomes clear that this design was a wise decision. The large majority of disclosed vulnerabilities and all publicly available exploits affect QEMU and its support for emulated/paravirtualized devices.&amp;lt;br&amp;gt;
Even though KVM’s kernel attack surface is significantly smaller than the one exposed by a default QEMU configuration or similar user space VMMs, a KVM vulnerability has advantages that make it very valuable for an attacker:&amp;lt;br&amp;gt;
Whereas user space VMMs can be sandboxed to reduce the impact of a VM breakout, no such option is available for KVM itself. Once an attacker is able to achieve code execution (or similarly powerful primitives like write access to page tables) in the context of the host kernel, the system is fully compromised.&amp;lt;br&amp;gt;
Due to the somewhat poor security history of QEMU, new user space VMMs like crosvm or Firecracker are written in Rust, a memory safe language. Of course, there can still be non-memory safety vulnerabilities or problems due to incorrect or buggy usage of the KVM APIs, but using Rust effectively prevents the large majority of bugs that were discovered in C-based user space VMMs in the past.&amp;lt;br&amp;gt;
Finally, a pure KVM exploit can work against targets that use proprietary or heavily modified user space VMMs. While the big cloud providers do not go into much detail about their virtualization stacks publicly, it is safe to assume that they do not depend on an unmodified QEMU version for their production workloads. In contrast, KVM’s smaller code base makes heavy modifications unlikely (and KVM’s contributor list points at a strong tendency to upstream such modifications when they exist).&amp;lt;br&amp;gt;
With these advantages in mind, I decided to spend some time hunting for a KVM vulnerability that could be turned into a guest-to-host escape. In the past, I had &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bugs.chromium.org/p/project-zero/issues/list?q=vmx%20owner%3Afwilhelm&amp;amp;can=1&amp;#34;&amp;gt;some success&amp;lt;/a&amp;gt; with finding vulnerabilities in KVM’s support for nested virtualization on Intel CPUs so reviewing the same functionality for AMD seemed like a good starting point. This is even more true, because the recent increase of AMD’s market share in the server segment means that KVM’s AMD implementation is suddenly becoming a more interesting target than it was in the last years.&amp;lt;br&amp;gt;
Nested virtualization, the ability for a VM (called L1) to spawn nested guests (L2), was also a niche feature for a long time. However, due to hardware improvements that reduce its overhead and increasing customer demand it’s becoming more widely available. For example, Microsoft is heavily pushing for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-vbs&amp;#34;&amp;gt;Virtualization-based Security&amp;lt;/a&amp;gt; as part of newer Windows versions, requiring nested virtualization to support cloud-hosted Windows installations. KVM enables support for nested virtualization on both AMD and Intel by default, so if an administrator or the user space VMM does not explicitly disable it, it’s part of the attack surface for a malicious or compromised VM.&amp;lt;br&amp;gt;
AMD’s virtualization extension is called SVM (for Secure Virtual Machine) and in order to support nested virtualization, the host hypervisor needs to intercept all SVM instructions that are executed by its guests, emulate their behavior and keep its state in sync with the underlying hardware. As you might imagine, implementing this correctly is quite difficult with a large potential for complex logic flaws, making it a perfect target for manual code review.&amp;lt;br&amp;gt;
The Bug&amp;lt;br&amp;gt;
Before diving into the KVM codebase and the bug I discovered, I want to quickly introduce how AMD SVM works to make the rest of the post easier to understand. (For a thorough documentation see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.amd.com/system/files/TechDocs/24593.pdf&amp;#34;&amp;gt;AMD64 Architecture Programmer’s Manual, Volume 2: System Programming Chapter 15&amp;lt;/a&amp;gt; .) SVM adds support for 6 new instructions to x86-64 if SVM support is enabled by setting the SVME bit in the EFER MSR. The most interesting of these instructions is VMRUN , which (as its name suggests) is responsible for running a guest VM. VMRUN takes an implicit parameter via the RAX register pointing to the page-aligned physical address of a data structure called “virtual machine control block” (VMCB), which describes the state and configuration of the VM.&amp;lt;br&amp;gt;
The VMCB is split into two parts: First, the State Save area, which stores the values of all guest registers, including segment and control registers. Second, the Control area which describes the configuration of the VM. The Control area describes the virtualization features enabled for a VM,  sets which VM actions are intercepted to trigger a VM exit and stores some fundamental configuration values such as the page table address used for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Second_Level_Address_Translation&amp;#34;&amp;gt;nested paging&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
If the VMCB is correctly prepared (and we are not already running in a VM), VMRUN will first save the host state in a memory region called the host save area, whose address is configured by writing a physical address to the VM_HSAVE_PA MSR. Once the host state is saved, the CPU switches to the VM context and VMRUN only returns once a VM exit is triggered for one reason or another.&amp;lt;br&amp;gt;
An interesting aspect of SVM is that a lot of the state recovery after a VM exit has to be done by the hypervisor. Once a VM exit occurs, only RIP, RSP and RAX are restored to the previous host values and all other general purpose registers still contain the guest values. In addition, a full context switch requires manual execution of the VMSAVE/VMLOAD instructions which save/load additional system registers (FS, SS, LDTR, STAR, LSTAR …) from memory.&amp;lt;br&amp;gt;
For nested virtualization to work, KVM intercepts execution of the VMRUN instruction and creates its own VMCB based on the VMCB the L1 guest prepared (called vmcb12 in KVM terminology). Of course, KVM can’t trust the guest provided vmcb12 and needs to carefully validate all fields that end up in the real VMCB that gets passed to the hardware (known as vmcb02).&amp;lt;br&amp;gt;
Most of the KVM’s code for nested virtualization on AMD is implemented in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/arch/x86/kvm/svm/nested.c?h=v5.11&amp;#34;&amp;gt;arch/x86/kvm/svm/nested.c&amp;lt;/a&amp;gt; and the code that intercepts VMRUN instructions of nested guests is implemented in nested_svm_vmrun :&amp;lt;br&amp;gt;
int nested_svm_vmrun ( struct vcpu_svm * svm )&amp;lt;br&amp;gt;
int ret ;&amp;lt;br&amp;gt;
struct vmcb * vmcb12 ;&amp;lt;br&amp;gt;
struct vmcb * hsave = svm -&amp;amp;gt; nested . hsave ;&amp;lt;br&amp;gt;
struct vmcb * vmcb = svm -&amp;amp;gt; vmcb ;&amp;lt;br&amp;gt;
struct kvm_host_map map ;&amp;lt;br&amp;gt;
u64 vmcb12_gpa ;&amp;lt;br&amp;gt;
vmcb12_gpa = svm -&amp;amp;gt; vmcb -&amp;amp;gt; save . rax ; ** 1 **&amp;lt;br&amp;gt;
ret = kvm_vcpu_map (&amp;amp;amp; svm -&amp;amp;gt; vcpu , gpa_to_gfn ( vmcb12_gpa ), &amp;amp;amp; map ); ** 2 **&amp;lt;br&amp;gt;
ret = kvm_skip_emulated_instruction (&amp;amp;amp; svm -&amp;amp;gt; vcpu );&amp;lt;br&amp;gt;
vmcb12 = map . hva ;&amp;lt;br&amp;gt;
if (! nested_vmcb_checks ( svm , vmcb12 )) { ** 3 **&amp;lt;br&amp;gt;
vmcb12 -&amp;amp;gt; control . exit_code = SVM_EXIT_ERR ;&amp;lt;br&amp;gt;
vmcb12 -&amp;amp;gt; control . exit_code_hi = 0 ;&amp;lt;br&amp;gt;
vmcb12 -&amp;amp;gt; control . exit_info_1 = 0 ;&amp;lt;br&amp;gt;
goto out ;&amp;lt;br&amp;gt;
* Save the old vmcb, so we don&amp;amp;#39;t need to pick what we save, but can&amp;lt;br&amp;gt;
* restore everything when a VMEXIT occurs&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . es = vmcb -&amp;amp;gt; save . es ;&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . cs = vmcb -&amp;amp;gt; save . cs ;&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . ss = vmcb -&amp;amp;gt; save . ss ;&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . ds = vmcb -&amp;amp;gt; save . ds ;&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . gdtr = vmcb -&amp;amp;gt; save . gdtr ;&amp;lt;br&amp;gt;
hsave -&amp;amp;gt; save . …</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20210629-161937/</link>
      <pubDate>Tue, 29 Jun 2021 16:19:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20210629-161937/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.blog/2021-06-29-introducing-github-copilot-ai-pair-programmer/&amp;#34;&amp;gt;Introducing GitHub Copilot: your AI pair programmer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Today, we’re launching a technical preview of GitHub Copilot, a new AI pair programmer that helps you write better code.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210629-121802/</link>
      <pubDate>Tue, 29 Jun 2021 12:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210629-121802/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/hackers-exploited-0-day-not-2018-bug-to-mass-wipe-my-book-live-devices/&amp;#34;&amp;gt;Hackers exploited 0-day, not 2018 bug, to mass-wipe My Book Live devices&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Western Digital removed code that would have prevented the wiping of petabytes of data.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210629-082316/</link>
      <pubDate>Tue, 29 Jun 2021 08:23:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210629-082316/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1127494_aston-martin-valkyrie-spied-on-the-road-ahead-of-start-of-deliveries-this-summer&amp;#34;&amp;gt;Aston Martin Valkyrie spied on the road ahead of start of deliveries this summer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210629-081900/</link>
      <pubDate>Tue, 29 Jun 2021 08:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210629-081900/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/29/technology/boom-times-for-lawyers-as-washington-pursues-big-tech.html&amp;#34;&amp;gt;Boom Times for Lawyers as Washington Pursues Big Tech Not since the government sued to break up Microsoft in the late 1990s has there been greater demand for people who know the ins and outs of corporate competition law. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210629-042054/</link>
      <pubDate>Tue, 29 Jun 2021 04:20:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210629-042054/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/28/technology/facebook-ftc-lawsuit.html&amp;#34;&amp;gt;Judge Throws Out 2 Antitrust Cases Against Facebook The decisions were a major blow to attempts to rein in Big Tech. The judge said one of the complaints, from the Federal Trade Commission, lacked facts and gave the agency 30 days to refile it. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210629-041851/</link>
      <pubDate>Tue, 29 Jun 2021 04:18:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210629-041851/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/28/technology/facebook-ftc-lawsuit.html&amp;#34;&amp;gt;Judge Throws Out 2 Antitrust Cases Against Facebook The decisions were a major blow to attempts to rein in Big Tech. The judge said one of the complaints, from the Federal Trade Commission, lacked facts and gave the agency 30 days to refile it. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Jeff Huang · Computer Science at Brown University</title>
      <link>https://www.whatsupup.com/blog/popularization/compilable/20210629-040821/</link>
      <pubDate>Tue, 29 Jun 2021 04:08:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/popularization/compilable/20210629-040821/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://jeffhuang.com/papers/Portalware_DIS21.pdf&amp;#34;&amp;gt;Portalware: Exploring Free-Hand AR Drawing with a Dual-Display Smartphone-Wearable Paradigm&amp;lt;/a&amp;gt; Jing Qian, Tongyu Zhou, Meredith Young-Ng, Jiaju Ma, Angel Cheung, Xiangyu Li, Ian Gonsher, Jeff Huang DIS 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210629-001649/</link>
      <pubDate>Tue, 29 Jun 2021 00:16:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210629-001649/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/25/Investing&amp;#34;&amp;gt;Investing Intro&amp;lt;/a&amp;gt; · We’ve started to actively manage some of our family investments. It’s entertaining me, and I notice people really like     talking about money, so why not talk about it here? This is the start of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/What/Investing&amp;#34;&amp;gt;a new blog category&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/25/Investing&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/22/Galaxy-Tab-S7-Plus&amp;#34;&amp;gt;Galaxy Tab S7&#43;&amp;lt;/a&amp;gt; · I impulse-bought this big Samsung slab which I guess represents the state of the art in Android tabletry and is trying to     occupy an iPad-like spot in the ecosystem.     It’s got issues but I’m keeping it.  I’m writing this based on my perception that not many people have a tablet that’s     not an iPad, so the territory is only lightly explored &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/22/Galaxy-Tab-S7-Plus&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [4 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20210629-001632/</link>
      <pubDate>Tue, 29 Jun 2021 00:16:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20210629-001632/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://medium.com/new-story&amp;#34;&amp;gt;Write&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210628-122341/</link>
      <pubDate>Mon, 28 Jun 2021 12:23:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210628-122341/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128825_2021-ford-bronco-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Ford Bronco bucking for king of the hill&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210628-082246/</link>
      <pubDate>Mon, 28 Jun 2021 08:22:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210628-082246/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1113841_aston-martin-valkyrie-amr-pro-le-mans-hypercar-aping-track-car-revealed&amp;#34;&amp;gt;Aston Martin Valkyrie AMR Pro: Le Mans Hypercar-aping track car revealed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210628-041710/</link>
      <pubDate>Mon, 28 Jun 2021 04:17:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210628-041710/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#argument-dependent-lookup&amp;#34;&amp;gt;argument-dependent-lookup&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#stl-classic&amp;#34;&amp;gt;stl-classic&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#templates&amp;#34;&amp;gt;templates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Today, while inventing questions for my next &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/09/18/cppcon-2020-pub-quiz-2/&amp;#34;&amp;gt;C&#43;&#43; Pub Quiz&amp;lt;/a&amp;gt; ,
I ran into a fairly obscure and meaningless divergence among
vendors’ implementations of&amp;lt;br&amp;gt;
vector&amp;amp;lt;bool&amp;amp;gt;::reference&amp;lt;br&amp;gt;
. Given:&amp;lt;br&amp;gt;
std::vector&amp;amp;lt;bool&amp;amp;gt; v = {true, true};&amp;lt;br&amp;gt;
The correct way to swap&amp;lt;br&amp;gt;
v[0]&amp;lt;br&amp;gt;
with&amp;lt;br&amp;gt;
is of course&amp;lt;br&amp;gt;
swap(v[0], v[1])&amp;lt;br&amp;gt;
,
optionally preceded by&amp;lt;br&amp;gt;
using std::swap&amp;lt;br&amp;gt;
;
see &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2020/07/11/the-std-swap-two-step/&amp;#34;&amp;gt;“What is the std::swap two-step?”&amp;lt;/a&amp;gt; (2020-07-11).
But look at all these wrong things you can try! …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210628-001917/</link>
      <pubDate>Mon, 28 Jun 2021 00:19:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210628-001917/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2014/10/15/attack-of-week-poodle/&amp;#34;&amp;gt;Attack of the week: POODLE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210627-162115/</link>
      <pubDate>Sun, 27 Jun 2021 16:21:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210627-162115/</guid>
      <description>June 27, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/27/You-cant-capture-the-nuance.html&amp;#34;&amp;gt;You can&amp;#39;t capture the nuance of my form fields&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210627-122437/</link>
      <pubDate>Sun, 27 Jun 2021 12:24:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210627-122437/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132720_mid-engine-hellcat-powered-1968-dodge-charger-lets-you-live-your-fast-and-furious-dreams&amp;#34;&amp;gt;Mid-engine Hellcat-powered 1968 Dodge Charger lets you live your &amp;amp;quot;Fast and Furious&amp;amp;quot; dreams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132175_why-mpg-is-a-dumb-unit-for-fuel-economy&amp;#34;&amp;gt;Why MPG is a dumb unit for fuel economy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210627-041940/</link>
      <pubDate>Sun, 27 Jun 2021 04:19:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210627-041940/</guid>
      <description>Big Technology is on Substack – the place for independent writing&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210627-001827/</link>
      <pubDate>Sun, 27 Jun 2021 00:18:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210627-001827/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/08/19/dear-apple-please-set-imessage-free/&amp;#34;&amp;gt;Dear Apple: Please set iMessage free&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210626-161840/</link>
      <pubDate>Sat, 26 Jun 2021 16:18:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210626-161840/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/solarwinds-hackers-breach-new-victims-including-a-microsoft-support-agent/&amp;#34;&amp;gt;SolarWinds hackers breach new victims, including a Microsoft support agent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Discovery came as Microsoft was investigating new breaches by the same hacker group.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210626-000940/</link>
      <pubDate>Sat, 26 Jun 2021 00:09:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210626-000940/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-is-low-code/&amp;#34;&amp;gt;What is low code? A comprehensive guide Low code and no code have all the hype, but among developers, they also have equal amounts of skepticism. In March 2021, no code pioneer Zapier acquired no-code community Makerpad. In April 2021,&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210626-000716/</link>
      <pubDate>Sat, 26 Jun 2021 00:07:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210626-000716/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/mybook-users-urged-to-unplug-devices-from-internet/&amp;#34;&amp;gt;MyBook Users Urged to Unplug Devices from Internet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device.&amp;lt;br&amp;gt;
One of many similar complaints on Western Digital’s user forum.&amp;lt;br&amp;gt;
Earlier this week, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/&amp;#34;&amp;gt;Bleeping Computer&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/mass-data-wipe-in-my-book-devices-prompts-warning-from-western-digital/?utm_brand=arstechnica&amp;amp;utm_source=twitter&amp;amp;utm_social-type=owned&amp;amp;utm_medium=social&amp;#34;&amp;gt;Ars Technica&amp;lt;/a&amp;gt; pointed to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://community.wd.com/t/help-all-data-in-mybook-live-gone-and-owner-password-unknown/268111&amp;#34;&amp;gt;a heated discussion thread on Western Digital’s user forum&amp;lt;/a&amp;gt; where many customers complained of finding their MyBook Live and MyBook Live Duo devices completely wiped of their data.&amp;lt;br&amp;gt;
“Western Digital has determined that some My Book Live and My Book Live Duo devices are being compromised through exploitation of a remote command execution vulnerability,” the company said in a statement June 24. “In some cases, this compromise has led to a factory reset that appears to erase all data on the device. The My Book Live and My Book Live Duo devices received its final firmware update in 2015. We understand that our customers’ data is very important. We are actively investigating the issue and will provide an updated advisory when we have more information.”&amp;lt;br&amp;gt;
Western Digital’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo&amp;#34;&amp;gt;brief advisory&amp;lt;/a&amp;gt; includes &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/vuln/detail/CVE-2018-18472#VulnChangeHistorySection&amp;#34;&amp;gt;a link to an entry in the National Vulnerability Database for CVE-2018-18472&amp;lt;/a&amp;gt; . The NVD writeup says Western Digital WD My Book Live and WD My Book Live Duo (all versions) have a root Remote Command Execution bug.&amp;lt;br&amp;gt;
“It can be triggered by anyone who knows the IP address of the affected device, as exploited in the wild in June 2021 for factory reset commands,” NVD wrote.&amp;lt;br&amp;gt;
Examine the CVE attached to this flaw and you’ll notice it was issued in 2018. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/vuln/detail/CVE-2018-18472#VulnChangeHistorySection&amp;#34;&amp;gt;NVD’s advisory&amp;lt;/a&amp;gt; credits VPN reviewer Wizcase.com with reporting the bug to Western Digital three years ago, back in June 2018.&amp;lt;br&amp;gt;
In some ways, it’s remarkable that it took this long for vulnerable MyBook devices to be attacked: The 2018 Wizcase writeup on the flaw includes proof-of-concept code that lets anyone run commands on the devices as the all-powerful “root” user. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/mybook-users-urged-to-unplug-devices-from-internet/#more-56082&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-202344/</link>
      <pubDate>Fri, 25 Jun 2021 20:23:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-202344/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132709_rush-drummer-neil-peart-s-car-collection-to-be-auctioned-in-pebble-beach&amp;#34;&amp;gt;Rush drummer Neil Peart&amp;#39;s car collection to be auctioned in Pebble Beach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-162336/</link>
      <pubDate>Fri, 25 Jun 2021 16:23:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-162336/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128272_2022-honda-civic-type-r-spy-shots&amp;#34;&amp;gt;2022 Honda Civic Type R spy shots: Redesigned hot hatch coming soon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132719_2021-jeep-wrangler-rubicon-xtreme-recon-package-takes-aim-at-the-ford-bronco&amp;#34;&amp;gt;2021 Jeep Wrangler Rubicon Xtreme Recon package takes aim at the Ford Bronco&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>MooseyAnon – Medium</title>
      <link>https://www.whatsupup.com/blog/novice/millrace/20210625-161558/</link>
      <pubDate>Fri, 25 Jun 2021 16:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/novice/millrace/20210625-161558/</guid>
      <description>&amp;lt;p&amp;gt;MooseyAnon Follows&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://delatango.medium.com/?source=blogrolls_sidebar-------------------------------------&amp;#34;&amp;gt;Kelsea Delatango&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mooseyanon.medium.com/following?source=blogrolls_sidebar-------------------------------------&amp;#34;&amp;gt;See all (8)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210625-160909/</link>
      <pubDate>Fri, 25 Jun 2021 16:09:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210625-160909/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/what-is-low-code/&amp;#34;&amp;gt;What is low code? The last guide you’ll ever need Low code and no code have all the hype, but among developers, they also have equal amounts of skepticism. In March 2021, no code pioneer Zapier acquired no-code community Makerpad. In April 2021,&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-122323/</link>
      <pubDate>Fri, 25 Jun 2021 12:23:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-122323/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132713_2023-porsche-panamera-spy-shots&amp;#34;&amp;gt;2023 Porsche Panamera spy shots: 2nd update on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10067359_robert-duffer&amp;#34;&amp;gt;Robert Duffer - Senior Editor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210625-042238/</link>
      <pubDate>Fri, 25 Jun 2021 04:22:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210625-042238/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/projects/&amp;#34;&amp;gt;projects&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/teaching/&amp;#34;&amp;gt;teaching&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/foundations/&amp;#34;&amp;gt;foundations&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/language/&amp;#34;&amp;gt;language&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/pedagogy/&amp;#34;&amp;gt;pedagogy&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/programming/&amp;#34;&amp;gt;programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/sets/&amp;#34;&amp;gt;sets&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/types/&amp;#34;&amp;gt;types&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/24/types-versus-sets-in-math-and-programming-languages/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210625-041937/</link>
      <pubDate>Fri, 25 Jun 2021 04:19:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210625-041937/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/mass-data-wipe-in-my-book-devices-prompts-warning-from-western-digital/&amp;#34;&amp;gt;“I’m totally screwed.” WD My Book Live users wake up to find their data deleted&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Storage-device maker advises customers to unplug My Book Lives from the Internet ASAP.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210625-041326/</link>
      <pubDate>Fri, 25 Jun 2021 04:13:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210625-041326/</guid>
      <description>I&amp;#39;m discussing “ GTS: Talking crypto with A16z” with @sriramk, @pdavison, @cdixon, @aarthir, @alive_eth, @AriannaSimpson, @katie_haun, @stevesi, and Good Time. Today, Jun 24 at 6:00 PM PDT on @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0wTCc50XpL&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0wTCc50XpL&amp;#34;&amp;gt;https://t.co/0wTCc50XpL&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-002353/</link>
      <pubDate>Fri, 25 Jun 2021 00:23:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210625-002353/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132702_pearl-yellow-2012-lexus-lfa-with-72-miles-never-left-dealership-for-sale-on-bring-a-trailer&amp;#34;&amp;gt;Pearl Yellow 2012 Lexus LFA with 72 miles never left dealership, for sale on Bring A Trailer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132703_electric-volvo-xc90-successor-to-be-revealed-in-2022-with-lidar-and-advanced-driver-assist-tech&amp;#34;&amp;gt;Electric Volvo XC90 successor to be revealed in 2022 with lidar and advanced driver-assist tech&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210625-001932/</link>
      <pubDate>Fri, 25 Jun 2021 00:19:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210625-001932/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/24/technology/antitrust-overhaul-congress.html&amp;#34;&amp;gt;Antitrust Overhaul Passes Its First Tests. Now, the Hard Parts. When the Judiciary Committee began approving a suite of bills on Wednesday, fault lines were exposed that could make final passage difficult. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Internal Server Error</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210625-001919/</link>
      <pubDate>Fri, 25 Jun 2021 00:19:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210625-001919/</guid>
      <description>&amp;lt;p&amp;gt;Server Encountered an Error&amp;lt;br&amp;gt;
Our apologies, the content you requested cannot be rendered at the moment. Please try refreshing the page or visit to our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/&amp;#34;&amp;gt;homepage.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/tools/mobile&amp;#34;&amp;gt;Apps&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://newslink.reuters.com/join/subscribe&amp;#34;&amp;gt;Newsletters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://sales.reuters.com/en/&amp;#34;&amp;gt;Advertise with Us&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.thomsonreuters.com/en/privacy-statement.html&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
All quotes delayed a minimum of 15 minutes. See &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/info/disclaimer&amp;#34;&amp;gt;here for a complete list&amp;lt;/a&amp;gt; of exchanges and delays.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://thomsonreuters.com/copyright/&amp;#34;&amp;gt;©2020 Reuters. All Rights Reserved.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210625-001910/</link>
      <pubDate>Fri, 25 Jun 2021 00:19:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210625-001910/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-big-techs-chamber-of-progress&amp;#34;&amp;gt;What Big Tech’s “Chamber of Progress” Is Really All About&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-big-techs-chamber-of-progress&amp;#34;&amp;gt;A vaguely-named influence shop does Big Tech’s heavy lifting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/people/10286039-alex-kantrowitz&amp;#34;&amp;gt;Alex Kantrowitz&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/what-big-techs-chamber-of-progress/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210625-001722/</link>
      <pubDate>Fri, 25 Jun 2021 00:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210625-001722/</guid>
      <description>In recent months, Google has launched &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html&amp;#34;&amp;gt;several efforts&amp;lt;/a&amp;gt; to strengthen open-source security on multiple fronts. One important focus is improving how we identify and respond to known security vulnerabilities without doing extensive manual work. It is essential to have a precise common data format to triage and remediate security vulnerabilities, particularly when communicating about risks to affected dependencies—it enables easier automation and empowers consumers of open-source software to know when they are impacted and make security fixes as soon as possible. We released the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2021/02/launching-osv-better-vulnerability.html&amp;#34;&amp;gt;Open Source Vulnerabilities (OSV) database&amp;lt;/a&amp;gt; in February with the goal of automating and improving vulnerability triage for developers and users of open source software. This initial effort was bootstrapped with a dataset of a few thousand vulnerabilities from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz&amp;#34;&amp;gt;OSS-Fuzz&amp;lt;/a&amp;gt; project. Implementing OSV to communicate precise vulnerability data for hundreds of critical open-source projects proved the success and utility of the format, and garnered feedback to help us improve the project; for example, we dropped the Cloud API key requirement, making the database even easier to access by more users. The community response also showed that there was broad interest in extending the effort further. Today, we’re excited to announce a new milestone in expanding OSV to several key open-source ecosystems: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/golang/vulndb&amp;#34;&amp;gt;Go&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/RustSec/advisory-db&amp;#34;&amp;gt;Rust&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db&amp;#34;&amp;gt;Python&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/distributedweaknessfiling/dwflist&amp;#34;&amp;gt;DWF&amp;lt;/a&amp;gt; . This expansion unites and aggregates four important vulnerability databases, giving software developers a better way to track and remediate the security issues that affect them. Our effort also aligns with the recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity&amp;#34;&amp;gt;US Executive Order on Improving the Nation’s Cybersecurity&amp;lt;/a&amp;gt; , which emphasized the need to remove barriers to sharing threat information in order to strengthen national infrastructure. This expanded shared vulnerability database marks an important step toward creating a more secure open-source environment for all users.&amp;lt;br&amp;gt;
A simple, unified schema for describing vulnerabilities precisely As with open source development, vulnerability databases in open source follow a distributed model, with many ecosystems and organizations creating their own database. Since each uses their own format to describe vulnerabilities, a client tracking vulnerabilities across multiple databases must handle each completely separately. Sharing of vulnerabilities between databases is also difficult. The Google Open Source Security team, Go team, and the broader open-source community have been developing a simple &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tinyurl.com/vuln-json&amp;#34;&amp;gt;vulnerability interchange schema&amp;lt;/a&amp;gt; for describing vulnerabilities that’s designed from the beginning for open-source ecosystems. After starting work on the schema a few months ago, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://tinyurl.com/vuln-json&amp;#34;&amp;gt;requested public feedback and received hundreds of comments&amp;lt;/a&amp;gt; . We have incorporated the input from readers to arrive at the current schema:&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210624-202100/</link>
      <pubDate>Thu, 24 Jun 2021 20:21:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210624-202100/</guid>
      <description>June 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/24/finger-client.html&amp;#34;&amp;gt;A finger client&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210624-201934/</link>
      <pubDate>Thu, 24 Jun 2021 20:19:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210624-201934/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/zyxel-scrambles-to-thwart-active-hacks-targeting-customers-firewalls-and-vpns/&amp;#34;&amp;gt;Hackers are using unknown user accounts to target Zyxel firewalls and VPNs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Authentication bypass attacks allow hackers to change breach network security.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210624-200852/</link>
      <pubDate>Thu, 24 Jun 2021 20:08:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210624-200852/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-raises-50-million-led-by-sequoia/&amp;#34;&amp;gt;Retool raises $50M led by Sequoia Since Retool launched two years ago on HN, tens of thousands of companies have come to rely on Retool. It&amp;#39;s how Allbirds measures the efficacy of their marketing campaigns; how Brex builds applications&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210624-200850/</link>
      <pubDate>Thu, 24 Jun 2021 20:08:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210624-200850/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discord-github-help-make-online-hackathons-easier-for-everyone-e5ba683a1666?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discord &amp;amp;amp; GitHub Help Make Online Hackathons Easier for Everyone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discord-github-help-make-online-hackathons-easier-for-everyone-e5ba683a1666?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discord &amp;amp;amp; GitHub Help Make Online Hackathons Easier for Everyone Discord has joined forces with GitHub and Major League Hacking to produce the ultimate easy-to-use environment for running hackathons.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210624-200727/</link>
      <pubDate>Thu, 24 Jun 2021 20:07:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210624-200727/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/why-you-should-practice-voluntary-discomfort-to-become-happier&amp;#34;&amp;gt;Why you should practice voluntary discomfort to become happier&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/put-yourself-on-the-productive-path&amp;#34;&amp;gt;Put yourself on the Productive Path&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-162229/</link>
      <pubDate>Thu, 24 Jun 2021 16:22:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-162229/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130983_2021-hennessey-mammoth-1000-ram-1500-trx-price&amp;#34;&amp;gt;2021 Hennessey Mammoth 1000 is a 1,000-plus-hp Ram 1500 TRX, and it&amp;#39;s ready to hit the plains&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132700_ferrari-296-gtb-revealed-with-818-hp-from-a-v-6-hybrid-powertrain&amp;#34;&amp;gt;Ferrari 296 GTB revealed with 818 hp from a V-6 hybrid powertrain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210624-162058/</link>
      <pubDate>Thu, 24 Jun 2021 16:20:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210624-162058/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/24/types-versus-sets-in-math-and-programming-languages/&amp;#34;&amp;gt;Types versus sets in math and programming languages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210624-161902/</link>
      <pubDate>Thu, 24 Jun 2021 16:19:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210624-161902/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/newsletter&amp;#34;&amp;gt;Newsletters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/06/24/after-repeatedly-promising-not-to-facebook-keeps-recommending-political-groups-to-its-users&amp;#34;&amp;gt;Citizen Browser After Repeatedly Promising Not to, Facebook Keeps Recommending Political Groups to Its Users The company announced the policy as a way to stop spreading divisive content June 24, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-161830/</link>
      <pubDate>Thu, 24 Jun 2021 16:18:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-161830/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-britain-navy/russia-warns-britain-it-will-bomb-ships-next-time-idUSKCN2E00K3&amp;#34;&amp;gt;Russia warns Britain it will bomb ships next time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON/MOSCOW (Reuters) -Russia warned Britain on Thursday that it would bomb British naval vessels in the Black Sea if there were any further provocative actions by the British navy off the coast of Russia-annexed Crimea.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children/indigenous-group-in-canada-finds-751-unmarked-graves-at-former-residential-school-idUSKCN2E0203&amp;#34;&amp;gt;Indigenous group in Canada finds 751 unmarked graves at former residential school&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hks-apple-daily-owner-lai-punished-for-exercising-fundamental-rights-uns-bachelet-idUSKCN2E0045&amp;#34;&amp;gt;HK&amp;amp;#39;s Apple Daily owner Lai punished for exercising fundamental rights-UN&amp;amp;#39;s Bachelet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210624-161607/</link>
      <pubDate>Thu, 24 Jun 2021 16:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210624-161607/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/announcing-unified-vulnerability-schema.html&amp;#34;&amp;gt;Announcing a unified vulnerability schema for open source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Oliver Chang, Google Open Source Security team and Russ Cox, Go team&amp;lt;br&amp;gt;
In recent months, Google has launched &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html&amp;#34;&amp;gt;several efforts&amp;lt;/a&amp;gt; to strengthen open-source security on multiple fronts. One important focus is improving how we identify and respond to known security vulnerabilities without doing extensive manual work. It is essential to have a precise common data format to triage and remediate security vulnerabilities, particularly when communicating about risks to affected dependencies—it enables easier automation and empowers consumers of open-source software to know when they are impacted and make security fixes as soon as possible. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/announcing-unified-vulnerability-schema.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In recent months, Google has launched &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html&amp;#34;&amp;gt;several efforts&amp;lt;/a&amp;gt; to strengthen open-source security on multiple fronts. One important focus is improving how we identify and respond to known security vulnerabilities without doing extensive manual work. It is essential to have a precise common data format to triage and remediate security vulnerabilities, particularly when communicating about risks to affected dependencies—it enables easier automation and empowers consumers of open-source software to know when they are impacted and make security fixes as soon as possible. We released the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2021/02/launching-osv-better-vulnerability.html&amp;#34;&amp;gt;Open Source Vulnerabilities (OSV) database&amp;lt;/a&amp;gt; in February with the goal of automating and improving vulnerability triage for developers and users of open source software. This initial effort was bootstrapped with a dataset of a few thousand vulnerabilities from the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz&amp;#34;&amp;gt;OSS-Fuzz&amp;lt;/a&amp;gt; project. Implementing OSV to communicate precise vulnerability data for hundreds of critical open-source projects proved the success and utility of the format, and garnered feedback to help us improve the project; for example, we dropped the Cloud API key requirement, making the database even easier to access by more users. The community response also showed that there was broad interest in extending the effort further. Today, we’re excited to announce a new milestone in expanding OSV to several key open-source ecosystems: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/golang/vulndb&amp;#34;&amp;gt;Go&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/RustSec/advisory-db&amp;#34;&amp;gt;Rust&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db&amp;#34;&amp;gt;Python&amp;lt;/a&amp;gt; , and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/distributedweaknessfiling/dwflist&amp;#34;&amp;gt;DWF&amp;lt;/a&amp;gt; . This expansion unites and aggregates four important vulnerability databases, giving software developers a better way to track and remediate the security issues that affect them. Our effort also aligns with the recent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity&amp;#34;&amp;gt;US Executive Order on Improving the Nation’s Cybersecurity&amp;lt;/a&amp;gt; , which emphasized the need to remove barriers to sharing threat information in order to strengthen national infrastructure. This expanded shared vulnerability database marks an important step toward creating a more secure open-source environment for all users. A simple, unified schema for describing vulnerabilities precisely As with open source development, vulnerability databases in open source follow a distributed model, with many ecosystems and organizations creating their own database. Since each uses their own format to describe vulnerabilities, a client tracking vulnerabilities across multiple databases must handle each completely separately. Sharing of vulnerabilities between databases is also difficult. The Google Open Source Security team, Go team, and the broader open-source community have been developing a simple &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tinyurl.com/vuln-json&amp;#34;&amp;gt;vulnerability interchange schema&amp;lt;/a&amp;gt; for describing vulnerabilities that’s designed from the beginning for open-source ecosystems. After starting work on the schema a few months ago, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://tinyurl.com/vuln-json&amp;#34;&amp;gt;requested public feedback and received hundreds of comments&amp;lt;/a&amp;gt; . We have incorporated the input from readers to arrive at the current schema:&amp;lt;br&amp;gt;
{&amp;lt;br&amp;gt;
&amp;amp;#34;id&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;modified&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;published&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;withdrawn&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;aliases&amp;amp;#34; : [ string ],&amp;lt;br&amp;gt;
&amp;amp;#34;related&amp;amp;#34; : [ string ],&amp;lt;br&amp;gt;
&amp;amp;#34;package&amp;amp;#34; : {&amp;lt;br&amp;gt;
&amp;amp;#34;ecosystem&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;name&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;purl&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
},&amp;lt;br&amp;gt;
&amp;amp;#34;summary&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;details&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;affects&amp;amp;#34; : [ {&amp;lt;br&amp;gt;
&amp;amp;#34;ranges&amp;amp;#34; : [ {&amp;lt;br&amp;gt;
&amp;amp;#34;type&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;repo&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;introduced&amp;amp;#34; : string ,&amp;lt;br&amp;gt;
&amp;amp;#34;fixed&amp;amp;#34; : string&amp;lt;br&amp;gt;
} ],&amp;lt;br&amp;gt;
&amp;amp;#34;versions&amp;amp;#34; : [ string ]&amp;lt;br&amp;gt;
&amp;amp;#34;references&amp;amp;#34; : [ {&amp;lt;br&amp;gt;
&amp;amp;#34;url&amp;amp;#34; : string&amp;lt;br&amp;gt;
&amp;amp;#34;ecosystem_specific&amp;amp;#34; : { see spec },&amp;lt;br&amp;gt;
&amp;amp;#34;database_specific&amp;amp;#34; : { see spec },&amp;lt;br&amp;gt;
}&amp;lt;br&amp;gt;
This new vulnerability schema aims to address some key problems with managing vulnerabilities in open source. We found that there was no existing standard format which:&amp;lt;br&amp;gt;
Enforces version specification that precisely matches naming and versioning schemes used in actual open source package ecosystems. For instance, matching a vulnerability such as a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cve.mitre.org/&amp;#34;&amp;gt;CVE&amp;lt;/a&amp;gt; to a package name and set of versions in a package manager is difficult to do in an automated way using existing mechanisms such as &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://nvd.nist.gov/products/cpe&amp;#34;&amp;gt;CPEs&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Can be used to describe vulnerabilities in any open source ecosystem, while not requiring ecosystem-dependent logic to process them.&amp;lt;br&amp;gt;
Is easy to use by both automated systems and humans.&amp;lt;br&amp;gt;
With this schema we hope to define a format that all vulnerability databases can export. A unified format means that vulnerability databases, open source users, and security researchers can easily share tooling and consume vulnerabilities across all of open source. This means a more complete view of vulnerabilities in open source for everyone, as well as faster detection and remediation times resulting from easier automation.&amp;lt;br&amp;gt;
The current state&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tinyurl.com/vuln-json&amp;#34;&amp;gt;vulnerability schema spec&amp;lt;/a&amp;gt; has gone through several iterations, and we are inviting further feedback as it gets closer to finalized. A number of public vulnerability databases today are already exporting this format, with more in the pipeline:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/golang/vulndb&amp;#34;&amp;gt;Go vulnerability database&amp;lt;/a&amp;gt; for Go packages&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/RustSec/advisory-db&amp;#34;&amp;gt;Rust advisory database&amp;lt;/a&amp;gt; for Cargo packages&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db&amp;#34;&amp;gt;Python advisory database&amp;lt;/a&amp;gt; for PyPI packages&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/distributedweaknessfiling/dwflist&amp;#34;&amp;gt;DWF database&amp;lt;/a&amp;gt; for vulnerabilities in the Linux kernel and other popular software&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/oss-fuzz-vulns&amp;#34;&amp;gt;OSS-Fuzz database&amp;lt;/a&amp;gt; for vulnerabilities in C/C&#43;&#43; software found by OSS-Fuzz&amp;lt;br&amp;gt;
The OSV service has also aggregated all of these vulnerability databases, which are viewable at our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://osv.dev/list&amp;#34;&amp;gt;web UI&amp;lt;/a&amp;gt; . They can also be queried with a single command via the same &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://osv.dev/docs/#tag/api&amp;#34;&amp;gt;existing APIs&amp;lt;/a&amp;gt; :&amp;lt;br&amp;gt;
curl - X POST - d \&amp;lt;br&amp;gt;
&amp;amp;#39;{&amp;amp;#34;commit&amp;amp;#34;: &amp;amp;#34;a46c08c533cfdf10260e74e2c03fa84a13b6c456&amp;amp;#34;}&amp;amp;#39; \&amp;lt;br&amp;gt;
&amp;amp;#34;https://api.osv.dev/v1/query&amp;amp;#34;&amp;lt;br&amp;gt;
&amp;amp;#39;{&amp;amp;#34;version&amp;amp;#34;: &amp;amp;#34;2.4.1&amp;amp;#34;, &amp;amp;#34;package&amp;amp;#34;: {&amp;amp;#34;name&amp;amp;#34;: &amp;amp;#34;jinja2&amp;amp;#34;, &amp;amp;#34;ecosystem&amp;amp;#34;: &amp;amp;#34;PyPI&amp;amp;#34;}}&amp;amp;#39; \&amp;lt;br&amp;gt;
Automating vulnerability database maintenance&amp;lt;br&amp;gt;
Producing quality vulnerability data is also difficult. In addition to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://opensource.googleblog.com/2021/02/launching-osv-better-vulnerability.html&amp;#34;&amp;gt;OSV’s existing automation&amp;lt;/a&amp;gt; , we built more &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/osv/tree/master/vulnfeeds&amp;#34;&amp;gt;automation tools&amp;lt;/a&amp;gt; for vulnerability database maintenance, and used these tools to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://discuss.python.org/t/proposing-a-community-maintained-database-of-pypi-package-vulnerabilities/8374/13&amp;#34;&amp;gt;bootstrap&amp;lt;/a&amp;gt; the community &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db&amp;#34;&amp;gt;Python advisory database&amp;lt;/a&amp;gt; . This automation takes existing feeds, accurately matches them to packages, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db/commit/7afe2510b693ad60a0b95da8a5b2a370a7c48997&amp;#34;&amp;gt;generates entries&amp;lt;/a&amp;gt; containing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/pypa/advisory-db/commit/e4035d8131324cf207ac9b40eacac79b97b1c6b2&amp;#34;&amp;gt;precise, validated version ranges&amp;lt;/a&amp;gt; with minimal human intervention. We plan to extend this tooling to other ecosystems for which there is no existing vulnerability database, or little support for ongoing database maintenance.&amp;lt;br&amp;gt;
Get involved&amp;lt;br&amp;gt;
Thank you to all the open source developers who have provided feedback and adopted this format. We’re continuing to work with open source communities to develop this further and earn more widespread adoption in all ecosystems. If you are interested in adopting this format, we’d appreciate any feedback on our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://tinyurl.com/vuln-json&amp;#34;&amp;gt;public spec&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Open%20Source&amp;#34;&amp;gt;Open Source&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/vulnerabilities&amp;#34;&amp;gt;vulnerabilities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210624-160647/</link>
      <pubDate>Thu, 24 Jun 2021 16:06:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210624-160647/</guid>
      <description>The shimmers were an innovation that caused concern on multiple levels. For starters, chip-based payment cards were supposed to be far more expensive and difficult for thieves to copy and clone. But these skimmers took advantage of weaknesses in the way many banks at the time implemented the new chip card standard.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-122609/</link>
      <pubDate>Thu, 24 Jun 2021 12:26:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-122609/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132286_2021-techart-gt-street-r-is-a-tuned-porsche-911-turbo-that-packs-800-hp&amp;#34;&amp;gt;2021 Techart GT Street R is a tuned Porsche 911 Turbo that packs 800 hp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1112214_2024-volkswagen-id-buzz-spy-shots&amp;#34;&amp;gt;2024 Volkswagen ID Buzz spy shots: Modern electric Bus starts testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210624-122420/</link>
      <pubDate>Thu, 24 Jun 2021 12:24:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210624-122420/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/24/types-versus-sets-in-math-and-programming-languages/&amp;#34;&amp;gt;Types versus sets in math and programming languages&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
For several years I have been designing and implementing a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/disco-lang/disco/&amp;#34;&amp;gt;functional teaching language especially for use in the context of a Discrete Mathematics course&amp;lt;/a&amp;gt; . The idea is for students to be exposed to some functional and statically-typed programming early in their computer science education, and to give them a fun and concrete way to see the connections between the concepts they learn in a Discrete Math course and computation. I am &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.wheaton.edu/~tvandrun/dmfp/&amp;#34;&amp;gt;not the first to think of combining FP &#43; Discrete Math&amp;lt;/a&amp;gt; , but I think there is an opportunity to do it really well with a language designed expressly for the purpose. (And, who am I kidding, designing and implementing a language is just plain fun.)&amp;lt;br&amp;gt;
Of course the language has an expressive static type system, with base types like natural numbers, rationals, Booleans, and Unicode characters, as well as sum and product types, lists, strings, and the ability to define arbitrary recursive types. It also has built-in types and syntax for finite sets. For example,&amp;lt;br&amp;gt;
A : Set ℕ
A = {1, 3, 6}&amp;lt;br&amp;gt;
(Incidentally, I will be using Unicode syntax since it looks nice, but there are also ASCII equivalents for everything.) Sets support the usual operations like union, intersection, and difference, as well as set comprehension notation. The intention is that this will provide a rich playground for students to play around with the basic set theory that is typically taught in a discrete math class.&amp;lt;br&amp;gt;
But wait…&amp;lt;br&amp;gt;
Hopefully the above all seems pretty normal if you are used to programming in a statically typed language. Unfortunately, there is something here that I suspect is going to be deeply confusing to students. I am so used to it that it took me a long time to realize what was wrong; maybe you have not realized it either. (Well, perhaps I gave it away with the title of the blog post…)&amp;lt;br&amp;gt;
In a math class, we typically tell students that is a set . But in Disco,&amp;lt;br&amp;gt;
ℕ&amp;lt;br&amp;gt;
is a type and something like&amp;lt;br&amp;gt;
{1,2,3}&amp;lt;br&amp;gt;
is a set. If you have been told that is a set, the distinction is going to seem very weird and artificial to you. For example, right now in Disco, you can ask whether&amp;lt;br&amp;gt;
{1,2}&amp;lt;br&amp;gt;
is a subset of&amp;lt;br&amp;gt;
:&amp;lt;br&amp;gt;
Disco&amp;amp;gt; {1,2} ⊆ {1,2,3}
true&amp;lt;br&amp;gt;
But if you try to ask whether&amp;lt;br&amp;gt;
, you get a syntax error:&amp;lt;br&amp;gt;
Disco&amp;amp;gt; {1,2} ⊆ ℕ
1:10:
  |
1 | {1,2} ⊆ ℕ
  |          ^
keyword &amp;amp;#34;ℕ&amp;amp;#34; cannot be used as an identifier&amp;lt;br&amp;gt;
Now, we could try various things to improve this particular example—at the very least, make it fail more gracefully. But the fundamental question remains: what is the distinction between types and sets, and why is it important? If it’s not important, we should get rid of it; if it is important, then I need to be able to explain it to students!&amp;lt;br&amp;gt;
We could try to completely get rid of the distinction, but this seems like it would lead directly to a dependent type system and refinement types. Refinement types &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://ucsd-progsys.github.io/liquidhaskell-blog/&amp;#34;&amp;gt;are super cool&amp;lt;/a&amp;gt; but I really don’t think I want to go there (Disco’s type system is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/disco-lang/disco/issues/207&amp;#34;&amp;gt;already complicated enough&amp;lt;/a&amp;gt; ).&amp;lt;br&amp;gt;
However, I think there actually is an important distinction; this blog post is my first attempt at crystallizing my thoughts on the distinction and how I plan to explain it to students.&amp;lt;br&amp;gt;
Types vs sets&amp;lt;br&amp;gt;
So what is the difference between sets and types? The slogan is that types are intensional , whereas sets are extensional . (I won’t actually use those words with my students.) That is:&amp;lt;br&amp;gt;
Sets are characterized by the relation: we can ask which items are elements of a set and which are not.&amp;lt;br&amp;gt;
Types, on the other hand, are characterized by how elements of the type are built: we can construct elements of a type (and deconstruct them) in certain ways specific to the type.&amp;lt;br&amp;gt;
This seems kind of symmetric, but it is not. You can’t ask whether a thing is an element of a set if you don’t know how to even make or talk about any things in the first place. So types are prior to sets: types provide a universe of values, constructed in orderly ways, that we can work with; only then can we start picking out certain values to place them in a set.&amp;lt;br&amp;gt;
Of course, this all presupposes some kind of type theory as foundational. Of course I am aware that one can instead take axiomatic set theory as a foundation and build everything up from the empty set. But I’m building a typed functional programming language, so of course I’m taking type theory as foundational! More importantly, however, it’s what almost every working mathematician does in practice . No one actually works or thinks in terms of axiomatic set theory (besides set theorists). Even in a typical math class, some sets are special. Before we can talk about the set , we have to introduce the special set so we know what , , and are. Before we can talk about the set we have to introduce the special Cartesian product operation on sets so we know what tuples are. And so on. We can think of types as a language for describing this prior class of special sets.&amp;lt;br&amp;gt;
Explaining things to students&amp;lt;br&amp;gt;
So what will I actually say to my students? First of all, when introducing the language, I will tell them about various built-in primitive types like naturals, rationals, booleans, and characters. I won’t make a big deal about it, and I don’t think I will need to: for the most part they will have already seen a language like Python or Java with types for primitive values.&amp;lt;br&amp;gt;
When we get to talking about sets, however (usually the second unit, after starting with propositional logic), we will define sets as collections of values, and I will explicitly point out the similarity to types. I will tell them that types are special built-in sets with rules for building their elements. We will go on to talk about disjoint union and Cartesian product, and practice building elements of sum and product types. (When we later get to recursion, they will therefore have the tools they need to start building recursive types such as lists and trees.)&amp;lt;br&amp;gt;
The other thing to mention will be the way that when we write the type of a set, as in,&amp;lt;br&amp;gt;
Set ℕ&amp;lt;br&amp;gt;
, we have to write down the type of the elements—in other words, the universe , or ambient set from which the elements are chosen. When introducing set theory, traditionally one mentions universe sets only when talking about the set complement operation; but the fact is that mathematicians always have some universe set in mind when describing a given set.&amp;lt;br&amp;gt;
Now, coming back to the example of&amp;lt;br&amp;gt;
{1,2} ⊆ ℕ&amp;lt;br&amp;gt;
, it would still be confusing for students if this is a syntax error, and I have some ideas about how to make it work. Briefly, the idea is to allow types to be used in expressions (but not the other way around!), with&amp;lt;br&amp;gt;
T : Set T&amp;lt;br&amp;gt;
. If I tell them that types are special sets, then logically they will expect to be able to use them as such! However, this is an extremely nontrivial change: it means that Disco would now be able to represent infinite sets, requiring sets to be internally represented via a deep embedding, rather than simply storing their elements (as is currently the case). For example,&amp;lt;br&amp;gt;
2 ∈ (ℕ \ {3,5})&amp;lt;br&amp;gt;
should evaluate to&amp;lt;br&amp;gt;
true&amp;lt;br&amp;gt;
, but we obviously can’t just enumerate all the elements of&amp;lt;br&amp;gt;
ℕ \ {3,5}&amp;lt;br&amp;gt;
since there are infinitely many. More on this in a future post, perhaps!&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/projects/&amp;#34;&amp;gt;projects&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/teaching/&amp;#34;&amp;gt;teaching&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/foundations/&amp;#34;&amp;gt;foundations&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/language/&amp;#34;&amp;gt;language&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/pedagogy/&amp;#34;&amp;gt;pedagogy&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/programming/&amp;#34;&amp;gt;programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/sets/&amp;#34;&amp;gt;sets&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/types/&amp;#34;&amp;gt;types&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/24/types-versus-sets-in-math-and-programming-languages/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-121858/</link>
      <pubDate>Thu, 24 Jun 2021 12:18:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-121858/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain-johnson/uk-pm-johnson-im-not-ruling-out-a-foreign-vacation-this-summer-idUSKCN2E01BO&amp;#34;&amp;gt;UK PM Johnson: I&amp;#39;m not ruling out a foreign vacation this summer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
British Prime Minister Boris Johnson said on Thursday he was not ruling out going abroad for his summer vacation this year as the government mulls easing restrictions on travel for those who have had two COVID-19 vaccination doses.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-britain-navy/russia-warns-britain-do-not-provoke-us-again-in-black-sea-idUSKCN2E00K3&amp;#34;&amp;gt;Russia warns Britain: Do not provoke us again in Black Sea&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210624-121826/</link>
      <pubDate>Thu, 24 Jun 2021 12:18:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210624-121826/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/24/technology/antitrust-overhaul-congress.html&amp;#34;&amp;gt;Antitrust Overhaul Passes Its First Tests. Now, the Hard Parts. When the Judiciary Committee began approving a suite of bills on Wednesday, it exposed the fault lines that could make final passage difficult. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-081835/</link>
      <pubDate>Thu, 24 Jun 2021 08:18:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210624-081835/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/emotions-run-high-as-hk-bids-farewell-to-pro-democracy-newspaper-apple-daily-idUSKCN2E0045&amp;#34;&amp;gt;Emotions run high as HK bids farewell to pro-democracy newspaper Apple Daily&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Hong Kong residents snapped up last-edition copies of the final edition of pro-democracy newspaper Apple Daily on Thursday after it was forced to end a 26-year run amid a national security crackdown that froze the company&amp;amp;#39;s funds.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-apple-daily-newsroo/heartbreak-in-newsroom-as-apple-daily-bids-farewell-to-hong-kong-idUSKCN2E00QH&amp;#34;&amp;gt;Heartbreak in newsroom as Apple Daily bids farewell to Hong Kong&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-faces-scariest-period-in-pandemic-amid-delta-outbreak-idUSKCN2DZ2RR&amp;#34;&amp;gt;Sydney faces &amp;amp;#39;scariest period&amp;amp;#39; in pandemic amid Delta outbreak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210624-081809/</link>
      <pubDate>Thu, 24 Jun 2021 08:18:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210624-081809/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/author/dan-goodin/&amp;#34;&amp;gt;Dan Goodin&amp;lt;/a&amp;gt; – 6/23/2021, 8:46 PM&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/author/dan-goodin/&amp;#34;&amp;gt;Dan Goodin&amp;lt;/a&amp;gt; – 6/4/2021, 11:55 AM&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210624-081220/</link>
      <pubDate>Thu, 24 Jun 2021 08:12:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210624-081220/</guid>
      <description>How can you be asleep at a time like this? Join us in 3 minutes! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/r7w12ewPPn&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/r7w12ewPPn&amp;#34;&amp;gt;https://t.co/r7w12ewPPn&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I&amp;#39;m discussing “ A Conversation with Marc Andreessen” with @sriramk, @stevesi, @aarthir, and Good Time. Today, Jun 23 at 10:00 PM PDT on @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/r7w12ewPPn&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/r7w12ewPPn&amp;#34;&amp;gt;https://t.co/r7w12ewPPn&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-042203/</link>
      <pubDate>Thu, 24 Jun 2021 04:22:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210624-042203/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132533_2022-honda-civic-hatchback-price-specs-review-photos-info&amp;#34;&amp;gt;US-built 2022 Honda Civic Hatchback combines sportiness and practicality&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132052_2021-ford-mustang-mach-e-gt-and-gt-performance-price-specs-review-photos-info&amp;#34;&amp;gt;2021 Ford Mustang Mach-E GT and GT Performance priced from $61,000, have up to 270 miles of range&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131252_2022-infiniti-qx60-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Infiniti QX60 coming with 295-hp V-6, 9-speed automatic, sharper looks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210624-042152/</link>
      <pubDate>Thu, 24 Jun 2021 04:21:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210624-042152/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog&amp;#34;&amp;gt;Discover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210624-041822/</link>
      <pubDate>Thu, 24 Jun 2021 04:18:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210624-041822/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/john-mcafee-the-eccentric-av-tycoon-dead-at-75-by-apparent-suicide/&amp;#34;&amp;gt;AV mogul John McAfee found dead by hanging in Spanish prison cell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
McAFee&amp;amp;#39;s larger-than-life and often illegal antics came to define his later years.&amp;lt;br&amp;gt;
Open source repositories can be vectors for maliciousness, so look before you run.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210624-041818/</link>
      <pubDate>Thu, 24 Jun 2021 04:18:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210624-041818/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/23/technology/big-tech-antitrust-bills.html&amp;#34;&amp;gt;House Lawmakers Are Considering 6 Bills Aimed at Big Tech A committee took its first vote in the early afternoon, advancing a bill that would increase the money companies pay government agencies when getting some mergers approved. By Cecilia Kang and David McCabe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/23/us/politics/biden-infrastructure-plan.html&amp;#34;&amp;gt;Biden and Senators Close In on Bipartisan Infrastructure Deal Lawmakers were set to take a tentative framework to the White House on Thursday. Administration officials signaled the president was prepared to support it, pending final details. By Jim Tankersley and Emily Cochrane&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210624-041153/</link>
      <pubDate>Thu, 24 Jun 2021 04:11:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210624-041153/</guid>
      <description>&amp;lt;p&amp;gt;By popular demand, we have @pmarca back on our show tonight at 10pm. Join @aarthir, @stevesi and me as we talk to Marc about&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;↳ the last year/aftermath of “time to build”
↳ AI
↳ Productivity, wages, the economy
↳ Impact of COVID on work
↳ And more!&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Join us at 10pm PT. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/C0wofe5gPi&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/C0wofe5gPi&amp;#34;&amp;gt;https://t.co/C0wofe5gPi&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-162137/</link>
      <pubDate>Wed, 23 Jun 2021 16:21:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-162137/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132583_midnight-purple-r34-nissan-skyline-gt-r-v-spec-sold-for-315-187&amp;#34;&amp;gt;Midnight Purple R34 Nissan Skyline GT-R V-Spec sold for $315,187&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10001739_viknesh-vijayenthiran&amp;#34;&amp;gt;Viknesh Vijayenthiran - Editor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-161808/</link>
      <pubDate>Wed, 23 Jun 2021 16:18:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-161808/</guid>
      <description>&amp;lt;p&amp;gt;Supreme Court rules in favor of teen whose profane social media post got her banished from high school cheerleading squad &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/legal/litigation/us-supreme-court-hands-victory-cheerleader-free-speech-case-2021-06-23/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-britain-navy/russia-says-it-chases-british-destroyer-out-of-crimea-waters-with-warning-shots-bombs-idUSKCN2DZ16I&amp;#34;&amp;gt;Russia says it chases British destroyer out of Crimea waters with warning shots, bombs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MOSCOW/LONDON (Reuters) -Russia said on Wednesday it had fired warning shots and dropped bombs in the path of a British warship to chase it out of waters Moscow claims in the Black Sea off the coast of the Crimea peninsula.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict/medical-official-air-strike-kills-at-least-43-in-ethiopias-tigray-idUSKCN2DZ0Y9&amp;#34;&amp;gt;Medical official: air strike kills at least 43 in Ethiopia&amp;amp;#39;s Tigray&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210623-161752/</link>
      <pubDate>Wed, 23 Jun 2021 16:17:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210623-161752/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/23/us/politics/tech-giants-are-aggressively-lobbying-washington-to-back-off-on-antitrust-rules.html&amp;#34;&amp;gt;Tech giants are aggressively lobbying Washington to back off on antitrust rules. By Cecilia Kang, David McCabe and Kenneth P. Vogel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210623-161744/</link>
      <pubDate>Wed, 23 Jun 2021 16:17:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210623-161744/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/counterfeit-pypi-packages-with-5000-downloads-installed-cryptominers/&amp;#34;&amp;gt;Ahoy, there’s malice in your repos—PyPI is the latest to be abused&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Open source repositories can be vectors for badness, so look before you run.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; : nature.com search</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210623-161703/</link>
      <pubDate>Wed, 23 Jun 2021 16:17:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210623-161703/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-01692-7&amp;#34;&amp;gt;The 2,000 stars where aliens would catch a glimpse of Earth&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/search?q=%22Alexandra&#43;Witze%22&amp;amp;order=date_desc&amp;#34;&amp;gt;Rights &amp;amp;amp; permissions for article The 2,000 stars where aliens would catch a glimpse of Earth
                        . Opens in a new window.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210623-160614/</link>
      <pubDate>Wed, 23 Jun 2021 16:06:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210623-160614/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-cyber-sleuths-cracked-an-atm-shimmer-gang/&amp;#34;&amp;gt;How Cyber Sleuths Cracked an ATM Shimmer Gang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip card transactions. Authorities in the United States and abroad had seized many of these shimmers, but for years couldn’t decrypt the data on the devices. This is a story of ingenuity and happenstance, and how one former Secret Service agent helped crack a code that revealed the contours of a global organized crime ring.&amp;lt;br&amp;gt;
Jeffrey Dant was a special agent at the U.S. Secret Service for 12 years until 2015. After that, Dant served as the global lead for the fraud fusion center at Citi , one of the largest financial institutions in the United States.&amp;lt;br&amp;gt;
Not long after joining Citi, Dant heard from industry colleagues at a bank in Mexico who reported finding one of these shimming devices inside the card acceptance slot of a local ATM. As it happens, KrebsOnSecurity &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/08/chip-card-atm-shimmer-found-in-mexico/&amp;#34;&amp;gt;wrote about that particular shimmer back in August 2015&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This card ‘shimming’ device is made to read chip-enabled cards and can be inserted directly into the ATM’s card acceptance slot.&amp;lt;br&amp;gt;
The shimmers were an innovation that caused concern on multiple levels. For starters, chip-based payment cards were supposed to make it far more expensive and difficult for thieves to copy and clone. But these skimmers took advantage of weaknesses in the way many banks at the time implemented the new chip card standard.&amp;lt;br&amp;gt;
Also, unlike traditional ATM skimmers that run on hidden cell phone batteries, the ATM shimmers found in Mexico did not require any external power source, and thus could remain in operation collecting card data until the device was removed.&amp;lt;br&amp;gt;
When a chip card is inserted, a chip-capable ATM reads the data stored on the smart card by sending an electric current through the chip. Incredibly, these shimmers were able to siphon a small amount of that power (a few milliamps) to record any data transmitted by the card. When the ATM is no longer in use, the skimming device remains dormant, storing the stolen data in an encrypted format.&amp;lt;br&amp;gt;
Dant and other investigators looking into the shimmers didn’t know at the time how the thieves who planted the devices went about gathering the stolen data. Traditional ATM skimmers are either retrieved manually, or they are programmed to transmit the stolen data wirelessly, such as via text message or Bluetooth.&amp;lt;br&amp;gt;
But recall that these shimmers don’t have anywhere near the power needed to transmit data wirelessly, and the flexible shimmers themselves tend to rip apart when retrieved from the mouth of a compromised ATM. So how were the crooks collecting the loot?&amp;lt;br&amp;gt;
“We didn’t know how they were getting the PINs at the time, either,” Dant recalled. “We found out later they were combining the skimmers with old school cameras hidden in fake overhead and side panels on the ATMs.”&amp;lt;br&amp;gt;
Investigators wanted to look at the data stored on the shimmer, but it was encrypted. So they sent it to MasterCard’s forensics lab in the United Kingdom, and to the Secret Service.&amp;lt;br&amp;gt;
“The Secret Service didn’t have any luck with it,” Dant said. “MasterCard in the U.K. was able to understand a little bit at a high level what it was doing, and they confirmed that it was powered by the chip. But the data dump from the shimmer was just encrypted gibberish.”&amp;lt;br&amp;gt;
Organized crime gangs that specialize in deploying skimmers very often will encrypt stolen card data as a way to remove the possibility that any gang members might try to personally siphon and sell the card data in underground markets.&amp;lt;br&amp;gt;
THE DOWNLOAD CARDS&amp;lt;br&amp;gt;
Then in 2017, Dant got a lucky break: Investigators had found a shimming device inside an ATM in New York City, and that device appeared identical to the shimmers found in Mexico two years earlier.&amp;lt;br&amp;gt;
“That was the first one that had showed up in the U.S. at that point,” Dant said.&amp;lt;br&amp;gt;
The Citi team suspected that if they could work backwards from the card data that was known to have been recorded by the skimmers, they might be able to crack the encryption.&amp;lt;br&amp;gt;
“We knew when the shimmer went into the ATM, thanks to closed-circuit television footage,” Dant said. “And we know when that shimmer was discovered. So between that time period of a couple of days, these are the cards that interacted with the skimmer, and so these card numbers are most likely on this device.”&amp;lt;br&amp;gt;
Based off that hunch, MasterCard’s eggheads had success decoding the encrypted gibberish. But they already knew which payment cards had been compromised, so what did investigators stand to gain from breaking the encryption?&amp;lt;br&amp;gt;
According to Dant, this is where things got interesting: They found that the same primary account number (unique 16 digits of the card) was present on the download card and on the shimmers from both New York City and Mexican ATMs.&amp;lt;br&amp;gt;
Further research revealed that account number was tied to a payment card issued years prior by an Austrian bank to a customer who reported never receiving the card in the mail.&amp;lt;br&amp;gt;
“So why is this Austrian bank card number on the download card and two different shimming devices in two different countries, years apart?” Dant said he wondered at the time.&amp;lt;br&amp;gt;
He didn’t have to wait long for an answer. Soon enough, the NYPD brought a case against a group of Romanian men suspected of planting the same shimming devices in both the U.S. and Mexico. Search warrants served against the Romanian defendants turned up multiple copies of the shimmer they’d seized from the compromised ATMs. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-cyber-sleuths-cracked-an-atm-shimmer-gang/#more-54583&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-122155/</link>
      <pubDate>Wed, 23 Jun 2021 12:21:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-122155/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132670_first-ride-2022-toyota-86-redesign-rewards-drivers&amp;#34;&amp;gt;First ride: 2022 Toyota 86 redesign rewards drivers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132680_2022-mercedes-benz-gle-class-spy-shots&amp;#34;&amp;gt;2022 Mercedes-Benz GLE-Class spy shots&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132676_bugatti-chiron-super-sport-undergoing-high-speed-testing&amp;#34;&amp;gt;Bugatti Chiron Super Sport undergoing high-speed testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132642_2022-porsche-macan-r34-nissan-gt-r-2022-toyota-tundra-this-week-s-top-photos&amp;#34;&amp;gt;2022 Porsche Macan, R34 Nissan GT-R, 2022 Toyota Tundra: This Week&amp;amp;#39;s Top Photos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-121818/</link>
      <pubDate>Wed, 23 Jun 2021 12:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-121818/</guid>
      <description>&amp;lt;p&amp;gt;Air strike kills dozens in Ethiopia&amp;#39;s Tigray region &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DZ0Y9&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-apple-daily/hong-kong-pro-democracy-paper-apple-daily-to-print-last-edition-on-thursday-idUSKCN2DZ0BR&amp;#34;&amp;gt;Hong Kong pro-democracy paper Apple Daily to print last edition on Thursday&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Hong Kong&amp;amp;#39;s pro-democracy tabloid Apple Daily announced it will print its last edition on Thursday after a stormy year in which it was raided by police and its tycoon owner and other staff were arrested under a new national security law.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-spain-politics-catalonia-prison/pardoned-catalan-separatist-leaders-walk-out-of-jail-idUSKCN2DZ12O&amp;#34;&amp;gt;Pardoned Catalan separatist leaders walk out of jail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-britain-navy/russian-forces-reportedly-fire-warning-shots-at-british-destroyer-in-black-sea-idUSKCN2DZ16I&amp;#34;&amp;gt;Russian forces reportedly fire warning shots at British destroyer in Black Sea&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210623-121748/</link>
      <pubDate>Wed, 23 Jun 2021 12:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210623-121748/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/23/us/politics/biden-infrastructure-plan.html&amp;#34;&amp;gt;Biden’s Economic Agenda Faces Familiar Hurdle With Fight Over Financing As Democrats pursue both bipartisan infrastructure negotiations and a catch-all economic package, old divisions persist on how to fund the spending. By Jim Tankersley and Emily Cochrane&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-081909/</link>
      <pubDate>Wed, 23 Jun 2021 08:19:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-081909/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-apple-daily/hong-kongs-next-digital-says-apple-daily-newspaper-to-end-by-saturday-idUSKCN2DZ0BR&amp;#34;&amp;gt;Hong Kong&amp;#39;s Next Digital says Apple Daily newspaper to end by Saturday&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-isolated-as-covid-19-clusters-build-nz-tightens-curbs-in-capital-idUSKCN2DZ001&amp;#34;&amp;gt;Sydney isolated as COVID-19 clusters build; NZ tightens curbs in capital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-041911/</link>
      <pubDate>Wed, 23 Jun 2021 04:19:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-041911/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-china-usa/china-condemns-latest-u-s-warship-transit-of-taiwan-strait-idUSKCN2DZ00F&amp;#34;&amp;gt;China condemns latest U.S. warship transit of Taiwan Strait&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIJING/TAIPEI (Reuters) -China condemned the United States on Wednesday as the region&amp;amp;#39;s greatest security &amp;amp;#34;risk creator&amp;amp;#34; after a U.S. warship again sailed through the sensitive waterway that separates Taiwan from China.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/first-person-charged-under-hong-kongs-national-security-law-pleads-not-guilty-idUSKCN2DZ06W&amp;#34;&amp;gt;First person charged under Hong Kong&amp;amp;#39;s national security law pleads not guilty&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-iran-internet/u-s-blocks-websites-linked-to-iranian-disinformation-idUSKCN2DY27X&amp;#34;&amp;gt;U.S. blocks websites linked to Iranian disinformation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210623-040649/</link>
      <pubDate>Wed, 23 Jun 2021 04:06:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210623-040649/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-cyber-safe-is-your-drinking-water-supply/&amp;#34;&amp;gt;How Cyber Safe is Your Drinking Water Supply?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven’t inventoried some or any of their information technology systems — a basic first step in protecting networks from cyberattacks.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.cisa.gov/sector-coordinating-councils&amp;#34;&amp;gt;Water Sector Coordinating Council&amp;lt;/a&amp;gt; surveyed roughly 600 employees of water and wastewater treatment facilities nationwide, and found 37.9 percent of utilities have identified all IT-networked assets, with an additional 21.7 percent working toward that goal.&amp;lt;br&amp;gt;
The Council found when it comes to IT systems tied to “operational technology” (OT) — systems responsible for monitoring and controlling the industrial operation of these utilities and their safety features — just 30.5 percent had identified all OT-networked assets, with an additional 22.5 percent working to do so.&amp;lt;br&amp;gt;
“Identifying IT and OT assets is a critical first step in improving cybersecurity,” the report concluded. “An organization cannot protect what it cannot see.”&amp;lt;br&amp;gt;
It’s also hard to see threats you’re not looking for: 67.9 percent of water systems reported no IT security incidents in the last 12 months, a somewhat unlikely scenario.&amp;lt;br&amp;gt;
Michael Arceneaux , managing director of the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.waterisac.org/&amp;#34;&amp;gt;WaterISAC&amp;lt;/a&amp;gt; — an industry group that tries to facilitate information sharing and the adoption of best practices among utilities in the water sector — said the survey shows much room for improvement and a need for support and resources.&amp;lt;br&amp;gt;
“Threats are increasing, and the sector, EPA, CISA and USDA need to collaborate to help utilities prevent and recover from compromises,” Arceneaux &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/criticalh2o/status/1405638206301868032&amp;#34;&amp;gt;said on Twitter&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
While documenting each device that needs protection is a necessary first step, a number of recent cyberattacks on water treatment systems have been blamed on a failure to properly secure water treatment employee accounts that can be used for remote access.&amp;lt;br&amp;gt;
In April, federal prosecutors unsealed an indictment against a 22-year-old from Kansas who’s accused of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vice.com/en/article/3anx79/feds-indict-kansas-man-for-allegedly-hacking-into-water-supply&amp;#34;&amp;gt;hacking into a public water system in 2019&amp;lt;/a&amp;gt; . The defendant in that case is a former employee of the water district he allegedly hacked.&amp;lt;br&amp;gt;
In February, we learned that &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/&amp;#34;&amp;gt;someone hacked into the water treatment plan in Oldsmar, Fla.&amp;lt;/a&amp;gt; and briefly increased the amount of sodium hydroxide (a.k.a. lye used to control acidity in the water) to 100 times the normal level. That incident stemmed from stolen or leaked employee credentials for TeamViewer , a popular program that lets users remotely control their computers.&amp;lt;br&amp;gt;
In January, a hacker tried to poison a water treatment plant that served parts of the San Francisco Bay Area, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nbcnews.com/tech/security/hacker-tried-poison-calif-water-supply-was-easy-entering-password-rcna1206&amp;#34;&amp;gt;reports&amp;lt;/a&amp;gt; Kevin Collier for NBCNews. The hacker in that case also had the username and password for a former employee’s TeamViewer account. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-cyber-safe-is-your-drinking-water-supply/#more-56022&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-002235/</link>
      <pubDate>Wed, 23 Jun 2021 00:22:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210623-002235/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132681_473-hp-2022-porsche-911-gts-bows-as-a-coupe-convertible-and-targa&amp;#34;&amp;gt;Porsche 911 GTS bows for 2022 as a 473-hp coupe, convertible, or targa&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-001905/</link>
      <pubDate>Wed, 23 Jun 2021 00:19:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210623-001905/</guid>
      <description>&amp;lt;p&amp;gt;U.S. Senate Republicans block Democrats&amp;#39; bid to hold debate on voting-rights legislation &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DY0XD&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-china-usa/u-s-warship-transits-taiwan-strait-a-week-after-large-chinese-air-incursion-idUSKCN2DZ00F&amp;#34;&amp;gt;U.S. warship transits Taiwan Strait a week after large Chinese air incursion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A U.S. warship has again sailed through the sensitive waterway that separates Taiwan from China, a week after the Chinese-claimed island reported the largest incursion https://www.reuters.com/world/asia-pacific/taiwan-reports-largest-incursion-yet-by-chinese-air-force-2021-06-15 to date of Chinese air force jets in Taiwan&amp;amp;#39;s air defence zone.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-iran-internet/u-s-blocks-websites-linked-to-iranian-disinformation-source-idUSKCN2DY27X&amp;#34;&amp;gt;U.S. blocks websites linked to Iranian disinformation -source&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-turing-gchq/britains-spy-agency-honours-codebreaker-turing-in-giant-artwork-idUSKCN2DY2M8&amp;#34;&amp;gt;Britain&amp;amp;#39;s spy agency honours codebreaker Turing in giant artwork&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-201857/</link>
      <pubDate>Tue, 22 Jun 2021 20:18:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-201857/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-election/officials-count-ballots-after-ethiopias-election-new-fighting-reported-in-tigray-idUSKCN2DY0RK&amp;#34;&amp;gt;Officials count ballots after Ethiopia&amp;#39;s election, new fighting reported in Tigray&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ADDIS ABABA (Reuters) -Officials in Ethiopia counted ballots on Tuesday after a parliamentary election billed as the first free vote in the country&amp;amp;#39;s history but marred by an opposition boycott, war and reports of irregularities in some areas.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-mexico/in-a-mexican-border-camp-asylum-seekers-wait-for-biden-to-end-trump-health-directive-idUSKCN2DY1KJ&amp;#34;&amp;gt;In a Mexican border camp, asylum seekers wait for Biden to end Trump health directive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-spain-politics-catalonia/lets-talk-says-spain-as-jailed-catalan-separatists-are-pardoned-idUSKCN2DY1B2&amp;#34;&amp;gt;Let&amp;amp;#39;s talk, says Spain, as jailed Catalan separatists are pardoned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210622-201849/</link>
      <pubDate>Tue, 22 Jun 2021 20:18:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210622-201849/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/a-week-after-arrests-cl0p-ransomware-group-dumps-new-tranche-of-stolen-data/&amp;#34;&amp;gt;A week after arrests, Cl0p ransomware group dumps new tranche of stolen data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Leak shows that, like the rest of the ransomware scourge, Cl0p isn&amp;amp;#39;t going away.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210622-162216/</link>
      <pubDate>Tue, 22 Jun 2021 16:22:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210622-162216/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132677_sneak-preview-2022-audi-rs-3-to-add-rear-torque-splitter-hit-62-mph-in-3-8-seconds&amp;#34;&amp;gt;Sneak preview: 2022 Audi RS 3 to add rear torque splitter, hit 62 mph in 3.8 seconds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132664_porsche-pcm-6-0-infotainment-system-adds-android-auto-hey-porsche-voice-recognition&amp;#34;&amp;gt;Porsche PCM 6.0 infotainment system adds Android Auto, &amp;amp;#34;Hey Porsche&amp;amp;#34; voice recognition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132463_deep-dive-2022-vw-golf-gti-and-r-interiors-go-digital&amp;#34;&amp;gt;Deep dive: 2022 VW Golf GTI and R interiors go digital&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132621_new-ferrari-supercar-teased-to-debut-on-june-24&amp;#34;&amp;gt;New Ferrari supercar teased, to debut on June 24&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210622-162016/</link>
      <pubDate>Tue, 22 Jun 2021 16:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210622-162016/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/2d/&amp;#34;&amp;gt;2D&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/fold/&amp;#34;&amp;gt;fold&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/geometry/&amp;#34;&amp;gt;geometry&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/line/&amp;#34;&amp;gt;line&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/origami/&amp;#34;&amp;gt;origami&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/reflect/&amp;#34;&amp;gt;reflect&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/#comments&amp;#34;&amp;gt;2 Comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-161821/</link>
      <pubDate>Tue, 22 Jun 2021 16:18:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-161821/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-spain-politics-catalonia/lets-talk-says-spain-as-jailed-catalan-separatists-pardoned-idUSKCN2DY1B2&amp;#34;&amp;gt;Let&amp;#39;s talk, says Spain, as jailed Catalan separatists pardoned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MADRID/BARCELONA (Reuters) -Spain&amp;amp;#39;s government on Tuesday pardoned all nine separatist leaders jailed for their role in Catalonia&amp;amp;#39;s failed independence bid in 2017, expressing hope that the gesture might help end a trial of strength that has sown deep divisions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-eu-hungary-germany-roth/grotesque-eu-countries-condemn-hungary-over-anti-lgbtq-law-idUSKCN2DY0L9&amp;#34;&amp;gt;&amp;amp;#39;Grotesque&amp;amp;#39;: EU countries condemn Hungary over anti-LGBTQ law&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; : nature.com search</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210622-161715/</link>
      <pubDate>Tue, 22 Jun 2021 16:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210622-161715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-01621-8&amp;#34;&amp;gt;Astronomers victimized colleagues — and put historic Swedish department in turmoil&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/search?q=%22Alexandra&#43;Witze%22&amp;amp;order=date_desc&amp;#34;&amp;gt;Rights &amp;amp;amp; permissions for article Astronomers victimized colleagues — and put historic Swedish department in turmoil
                        . Opens in a new window.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210622-161623/</link>
      <pubDate>Tue, 22 Jun 2021 16:16:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210622-161623/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/author/eben#rp-app-landmark-main&amp;#34;&amp;gt;Skip to main content&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/author/eben#rp-app-landmark-footer&amp;#34;&amp;gt;Skip to footer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/accessibility/&amp;#34;&amp;gt;Accessbility statement and help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/products/&amp;#34;&amp;gt;Hardware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Low-cost, high-performance Raspberry Pi computers and accessories&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/products/raspberry-pi-4-model-b/&amp;#34;&amp;gt;Buy Raspberry Pi 4&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/products/raspberry-pi-400/&amp;#34;&amp;gt;Buy Raspberry Pi 400&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/products/&amp;#34;&amp;gt;All products&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/for-industry/&amp;#34;&amp;gt;For industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/documentation/&amp;#34;&amp;gt;Documentation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/forums/&amp;#34;&amp;gt;Forums&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/software/&amp;#34;&amp;gt;Software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Everything you need to get started with your Raspberry Pi computer&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/software/&amp;#34;&amp;gt;Our software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/software/operating-systems/#raspberry-pi-os-32-bit&amp;#34;&amp;gt;Raspberry Pi OS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/downloads/raspberry-pi-desktop/&amp;#34;&amp;gt;Raspberry Pi Desktop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/help/&amp;#34;&amp;gt;Help&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/books-magazines/&amp;#34;&amp;gt;Books &amp;amp;amp; magazines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Books and magazines from Raspberry Pi Press&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/books-magazines/&amp;#34;&amp;gt;Explore our titles&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://magpi.raspberrypi.org/&amp;#34;&amp;gt;The MagPi&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hackspace.raspberrypi.org/&amp;#34;&amp;gt;HackSpace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wireframe.raspberrypi.org/&amp;#34;&amp;gt;Wireframe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://custompc.raspberrypi.org/&amp;#34;&amp;gt;Custom PC&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/learn/&amp;#34;&amp;gt;Learn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Free resources for young people to learn to code and become digital makers&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/learn/&amp;#34;&amp;gt;Learn at home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://projects.raspberrypi.org/&amp;#34;&amp;gt;Guided coding projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeclub.org/&amp;#34;&amp;gt;Learn at a Code Club&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://coderdojo.com/&amp;#34;&amp;gt;Learn at a CoderDojo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/teach/&amp;#34;&amp;gt;Teach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Free training, resources, and guidance to help you teach computing with confidence&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/teach/&amp;#34;&amp;gt;Support for teachers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://teachcomputing.org/&amp;#34;&amp;gt;Teach Computing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://codeclub.org/en/start-a-code-club/&amp;#34;&amp;gt;Start a Code Club&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/training/online/&amp;#34;&amp;gt;Online training courses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/about/&amp;#34;&amp;gt;About us&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
We work to put the power of computing and digital making into the hands of people all over the world&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/donate/&amp;#34;&amp;gt;Donate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/support-us/&amp;#34;&amp;gt;Support us&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/about/supporters/&amp;#34;&amp;gt;Our supporters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Raspberry Pi Blog&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog&amp;#34;&amp;gt;All blog posts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/archive/&amp;#34;&amp;gt;Archive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/feed/&amp;#34;&amp;gt;RSS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Posts by
            Eben Upton&amp;lt;br&amp;gt;
Chief Executive Raspberry Pi Trading            -
            113 posts&amp;lt;br&amp;gt;
Eben Upton - 24th May 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/announcing-the-raspberry-pi-poe-hat/#comments&amp;#34;&amp;gt;74 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/pi-day-at-the-raspberry-pi-foundation/&amp;#34;&amp;gt;Pi Day at the Raspberry Pi Foundation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Support us to give young people the tools to shape their future&amp;lt;br&amp;gt;
Eben Upton - 26th Feb 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/pi-day-at-the-raspberry-pi-foundation/#comments&amp;#34;&amp;gt;4 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/spread-the-joy-of-learning-through-making/&amp;#34;&amp;gt;Spread the joy of learning through making&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Create a spark in a young person’s life!&amp;lt;br&amp;gt;
Eben Upton - 1st Dec 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/spread-the-joy-of-learning-through-making/#comments&amp;#34;&amp;gt;2 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/new-raspberry-pi-4-case-fan/&amp;#34;&amp;gt;New product: Raspberry Pi 4 Case Fan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A $5 stocking-filler that keeps your Raspberry Pi 4 cool under stress&amp;lt;br&amp;gt;
Eben Upton - 30th Nov 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/new-raspberry-pi-4-case-fan/#comments&amp;#34;&amp;gt;81 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-were-conformant/&amp;#34;&amp;gt;Vulkan update: we’re conformant!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The V3DV Vulkan Mesa driver for Raspberry Pi 4 is conformant for Vulkan 1.0&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-400-the-70-desktop-pc/&amp;#34;&amp;gt;Raspberry Pi 400: the $70 desktop PC&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Your complete personal computer, built into a compact keyboard&amp;lt;br&amp;gt;
Eben Upton - 2nd Nov 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-400-the-70-desktop-pc/#comments&amp;#34;&amp;gt;453 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-merged-to-mesa/&amp;#34;&amp;gt;Vulkan update: merged to Mesa&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Vulkan driver for Raspberry Pi 4 becomes an official Vulkan Mesa driver, bringing many advantages&amp;lt;br&amp;gt;
Eben Upton - 20th Oct 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-merged-to-mesa/#comments&amp;#34;&amp;gt;37 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-compute-module-4/&amp;#34;&amp;gt;Raspberry Pi Compute Module 4 on sale now from $25&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Our most powerful, compact, flexible Compute Module yet&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-now-with-added-source-code/&amp;#34;&amp;gt;Vulkan update: now with added source code&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The future of 3D on Raspberry Pi&amp;lt;br&amp;gt;
Eben Upton - 9th Jun 2020 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/vulkan-update-now-with-added-source-code/#comments&amp;#34;&amp;gt;33 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/8gb-raspberry-pi-4-on-sale-now-at-75/&amp;#34;&amp;gt;8GB Raspberry Pi 4 on sale now at $75&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Surprise!&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/new-price-raspberry-pi-4-2gb/&amp;#34;&amp;gt;A birthday gift: 2GB Raspberry Pi 4 now only $35&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Happy birthday to us!&amp;lt;br&amp;gt;
Page
        1        of
        10&amp;lt;br&amp;gt;
About Us&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/about/meet-the-team&amp;#34;&amp;gt;Our team&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/about/governance&amp;#34;&amp;gt;Governance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/safeguarding&amp;#34;&amp;gt;Safeguarding&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/research-and-insights&amp;#34;&amp;gt;Research&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://raspberrypi.workable.com/&amp;#34;&amp;gt;Jobs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/contact&amp;#34;&amp;gt;Contact us&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Support&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://projects.raspberrypi.org/&amp;#34;&amp;gt;Projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/training&amp;#34;&amp;gt;Training&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/help/faqs&amp;#34;&amp;gt;FAQ&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Sign up to our newsletter&amp;lt;br&amp;gt;
Subscribe&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.facebook.com/raspberrypi&amp;#34;&amp;gt;Like Raspberry Pi on Facebook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/Raspberry_Pi&amp;#34;&amp;gt;Follow Raspberry Pi on Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.instagram.com/raspberrypi/&amp;#34;&amp;gt;Join us on Instagram&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://youtube.com/raspberrypi&amp;#34;&amp;gt;Subscribe to the Raspberry Pi YouTube channel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Raspberry Pi Foundation UK Registered Charity 1129409&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/accessibility&amp;#34;&amp;gt;Accessibility&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/privacy&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/cookies&amp;#34;&amp;gt;Cookies&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/trademark-rules&amp;#34;&amp;gt;Trademark rules and brand guidelines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Got it!&amp;lt;br&amp;gt;
We use cookies to ensure that we give you the best experience on our websites. By continuing to visit this site you agree to our use of cookies. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/cookies&amp;#34;&amp;gt;Cookie policy&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cookieinfoscript.com&amp;#34;&amp;gt;Cookie Info Script&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210622-122105/</link>
      <pubDate>Tue, 22 Jun 2021 12:21:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210622-122105/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132673_review-update-2021-dodge-durango-srt-hellcat-is-in-a-class-of-one&amp;#34;&amp;gt;Review update: 2021 Dodge Durango SRT Hellcat is in a class of one&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132663_mazda-s-next-generation-vehicle-platform-to-be-used-with-gas-diesel-evs-and-front-and-rear-wheel-drive&amp;#34;&amp;gt;Mazda&amp;amp;#39;s next-generation vehicle platform to be used with gas, diesel, EVs, and front- and rear-wheel drive&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-121725/</link>
      <pubDate>Tue, 22 Jun 2021 12:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-121725/</guid>
      <description>&amp;lt;p&amp;gt;EU antitrust regulators to investigate Google&amp;#39;s adtech business &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DY0W0&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/western-sanctions-bordering-on-a-declaration-of-economic-war-says-belarus-idUSKCN2DY105&amp;#34;&amp;gt;Western sanctions bordering on a &amp;#39;declaration of economic war&amp;#39;, says Belarus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-usa-southkorea/n-korea-warns-u-s-misinterpreting-signals-risks-disappointment-idUSKCN2DY018&amp;#34;&amp;gt;N.Korea warns U.S. misinterpreting signals risks disappointment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Error - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210622-121521/</link>
      <pubDate>Tue, 22 Jun 2021 12:15:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210622-121521/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://my.raspberrypi.org&amp;#34;&amp;gt;Raspberry Pi&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Server error&amp;lt;br&amp;gt;
A server error occured and your page could not be served, please try again in a few minutes&amp;lt;br&amp;gt;
Origin is unreachable&amp;lt;br&amp;gt;
The origin web server is not reachable.&amp;lt;br&amp;gt;
Your IP address: 143.198.58.73&amp;lt;br&amp;gt;
Error reference number: 523&amp;lt;br&amp;gt;
Cloudflare Location: San Jose&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org&amp;#34;&amp;gt;Raspberry Pi Foundation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
UK registered charity 1129409&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210622-081825/</link>
      <pubDate>Tue, 22 Jun 2021 08:18:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210622-081825/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/22/science/natural-history-museum-gems-minerals.html&amp;#34;&amp;gt;Out There Why Geology Is Our Destiny A visit to the renovated hall of gems and minerals at the American Museum of Natural History reveals how the cosmos works in the real world. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-081715/</link>
      <pubDate>Tue, 22 Jun 2021 08:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-081715/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-court-grants-bail-to-activist-charged-under-security-law-media-idUSKCN2DY0MP&amp;#34;&amp;gt;Hong Kong court grants bail to activist charged under security law -media&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hong Kong&amp;amp;#39;s High Court on Tuesday approved bail for a pro-democracy activist who is among 47 charged with conspiracy to commit subversion under a sweeping national security law Beijing imposed on its freest city last year, the city&amp;amp;#39;s public broadcaster RTHK reported.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-jury/hk-court-upholds-decision-for-no-jury-at-first-national-security-trial-idUSKCN2DY0BE&amp;#34;&amp;gt;HK court upholds decision for no jury at first national security trial&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-041743/</link>
      <pubDate>Tue, 22 Jun 2021 04:17:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-041743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/criticism-of-apple-daily-raid-is-attempt-to-beautify-security-threats-hk-leader-idUSKCN2DY06J&amp;#34;&amp;gt;Criticism of Apple Daily raid is attempt to &amp;#39;beautify&amp;#39; security threats-HK leader&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Hong Kong leader Carrie Lam hit back on Tuesday against criticism of authorities&amp;amp;#39; actions against pro-democracy tabloid Apple Daily as attempts to &amp;amp;#34;beautify&amp;amp;#34; acts that endangered national security.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-usa-southkorea/north-korea-ridicules-u-s-hopes-for-talks-as-allies-rethink-approach-idUSKCN2DY018&amp;#34;&amp;gt;North Korea ridicules U.S. hopes for talks as allies rethink approach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20210622-041702/</link>
      <pubDate>Tue, 22 Jun 2021 04:17:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20210622-041702/</guid>
      <description>Read the rules you agree to by using this website in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/tos&amp;#34;&amp;gt;Terms
of
Service&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-001818/</link>
      <pubDate>Tue, 22 Jun 2021 00:18:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210622-001818/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-election/ethiopians-vote-as-opposition-alleges-some-irregularities-idUSKCN2DW0N9&amp;#34;&amp;gt;Ethiopians vote as opposition alleges some irregularities&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
ADDIS ABABA (Reuters) -Prime Minister Abiy Ahmed said he hoped Ethiopia&amp;amp;#39;s national and regional elections on Monday would prove the success of democratic reforms, but an opposition boycott, war, ethnic violence and logistical challenges overshadowed the vote in some regions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peruvian-judge-in-keiko-fujimori-corruption-case-rejects-call-to-return-her-to-prison-idUSKCN2DX2JU&amp;#34;&amp;gt;Peruvian judge in Keiko Fujimori corruption case rejects call to return her to prison&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210622-001759/</link>
      <pubDate>Tue, 22 Jun 2021 00:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210622-001759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/connecting-to-malicious-wi-fi-networks-can-mess-with-your-iphone/&amp;#34;&amp;gt;Connecting to malicious Wi-Fi networks can mess with your iPhone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The world&amp;amp;#39;s most secure consumer OS is bitten by a garden-variety programming bug.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210621-202153/</link>
      <pubDate>Mon, 21 Jun 2021 20:21:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210621-202153/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132603_the-jerrari-is-half-jeep-wagoneer-and-half-ferrari-365-gt-and-it-s-for-sale&amp;#34;&amp;gt;The Jerrari is half Jeep Wagoneer and half Ferrari 365 GT, and it&amp;#39;s for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-201805/</link>
      <pubDate>Mon, 21 Jun 2021 20:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-201805/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-politics-raisi/irans-raisi-backs-nuclear-talks-rules-out-meeting-biden-idUSKCN2DX115&amp;#34;&amp;gt;Iran&amp;#39;s Raisi backs nuclear talks, rules out meeting Biden&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Iranian President-elect Ebrahim Raisi on Monday backed talks between Iran and six world powers to revive a 2015 nuclear deal but flatly rejected meeting U.S. President Joe Biden, even if Washington removed all sanctions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-next-digital/closure-looms-for-hong-kongs-pro-democracy-apple-daily-after-raids-idUSKCN2DX0O5&amp;#34;&amp;gt;Closure looms for Hong Kong&amp;amp;#39;s pro-democracy Apple Daily after raids&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-defense-authorization/forever-war-authorization-measure-faces-delay-in-u-s-senate-idUSKCN2DX27R&amp;#34;&amp;gt;&amp;amp;#39;Forever war&amp;amp;#39; authorization measure faces delay in U.S. Senate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210621-200831/</link>
      <pubDate>Mon, 21 Jun 2021 20:08:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210621-200831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-user-license-app/&amp;#34;&amp;gt;How Retool issues and manages user licenses using Retool An inside look at why and how we built a custom app for account managers to generate user license keys, manage trials, map account data with Salesforce, and manage feature flags.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210621-162203/</link>
      <pubDate>Mon, 21 Jun 2021 16:22:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210621-162203/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129467_2021-mercedes-benz-s-class-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Mercedes-Benz S-Class will go down in history as peak ICE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132629_ken-block-s-1977-ford-f-150-hoonitruck-for-sale-for-1-1m&amp;#34;&amp;gt;Ken Block&amp;amp;#39;s 1977 Ford F-150 Hoonitruck for sale for $1.1M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-161824/</link>
      <pubDate>Mon, 21 Jun 2021 16:18:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-161824/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-politics-analysis/iran-vote-points-to-hardline-goal-of-long-term-power-analysts-idUSKCN2DX1N7&amp;#34;&amp;gt;Iran vote points to hardline goal of long-term power - analysts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-france-election-paca/greens-candidate-quits-provence-run-off-complicating-le-pen-bid-media-idUSKCN2DX1GM&amp;#34;&amp;gt;Greens candidate quits Provence run-off, complicating Le Pen bid -media&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210621-160828/</link>
      <pubDate>Mon, 21 Jun 2021 16:08:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210621-160828/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-map-library/&amp;#34;&amp;gt;Choose one of these as the React map library for your next project We&amp;#39;re breaking down the strengths and drawbacks of the top React map libraries, as well as highlight the types of projects each library excels at so you can determine what&amp;#39;s best for you.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-121806/</link>
      <pubDate>Mon, 21 Jun 2021 12:18:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-121806/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-election/ethiopians-vote-in-what-government-bills-as-first-free-election-idUSKCN2DW0N9&amp;#34;&amp;gt;Ethiopians vote in what government bills as first free election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-081738/</link>
      <pubDate>Mon, 21 Jun 2021 08:17:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-081738/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-saudi/iran-set-to-stay-on-hardline-course-after-raisi-win-saudi-commentators-say-idUSKCN2DX0NC&amp;#34;&amp;gt;Iran set to stay on hardline course after Raisi win, Saudi commentators say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-041753/</link>
      <pubDate>Mon, 21 Jun 2021 04:17:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210621-041753/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-exclusive/exclusive-hks-apple-daily-to-shut-within-days-says-jimmy-lai-adviser-idUSKCN2DX00G&amp;#34;&amp;gt;Exclusive-HK&amp;#39;s Apple Daily to shut within days, says Jimmy Lai adviser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Hong Kong pro-democracy newspaper Apple Daily will be forced to shut &amp;amp;#34;in a matter of days&amp;amp;#34; after authorities froze the company&amp;amp;#39;s assets under a national security law, an adviser to jailed owner Jimmy Lai told Reuters on Monday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-quotes/what-people-in-hong-kong-say-about-apple-daily-idUSKCN2DX09B&amp;#34;&amp;gt;What people in Hong Kong say about Apple Daily&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-201815/</link>
      <pubDate>Sun, 20 Jun 2021 20:18:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-201815/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks/europeans-u-s-warn-iran-nuclear-talks-wont-be-open-ended-idUSKCN2DW09G&amp;#34;&amp;gt;Europeans, U.S. warn Iran nuclear talks won&amp;#39;t be open-ended&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
VIENNA/DUBAI (Reuters) -Western officials warned Tehran on Sunday that negotiations to revive its nuclear deal could not continue indefinitely, after the sides announced a break following the election of a new hardline president in Iran.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-france-election-regions/french-far-right-irked-by-election-results-southern-region-in-play-idUSKCN2DW00H&amp;#34;&amp;gt;French far right irked by election results, southern region in play&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20210620-201750/</link>
      <pubDate>Sun, 20 Jun 2021 20:17:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20210620-201750/</guid>
      <description>Read the rules you agree to by using this website in our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/tos&amp;#34;&amp;gt;Terms
of
Service&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210620-201622/</link>
      <pubDate>Sun, 20 Jun 2021 20:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210620-201622/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/07/02/beyond-public-key-encryption/&amp;#34;&amp;gt;Beyond public key encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-161809/</link>
      <pubDate>Sun, 20 Jun 2021 16:18:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-161809/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks/iran-world-powers-adjourn-nuclear-talks-resumption-date-unclear-idUSKCN2DW09G&amp;#34;&amp;gt;Iran, world powers adjourn nuclear talks, resumption date unclear&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
VIENNA/DUBAI (Reuters) -Negotiators for Iran and six world powers on Sunday adjourned talks on reviving their 2015 nuclear deal and return to respective capitals for consultations as remaining differences still need to be overcome, officials said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks-eu/iran-nuclear-deal-still-possible-after-hardliners-election-eu-says-idUSKCN2DW0DR&amp;#34;&amp;gt;Iran nuclear deal still possible after hardliner&amp;amp;#39;s election, EU says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210620-122130/</link>
      <pubDate>Sun, 20 Jun 2021 12:21:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210620-122130/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132571_ford-shelby-cobra-concept-headed-to-monterey-auction&amp;#34;&amp;gt;Ford Shelby Cobra concept headed to Monterey auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-121814/</link>
      <pubDate>Sun, 20 Jun 2021 12:18:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-121814/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-iran/israels-bennett-warns-against-nuclear-talks-with-irans-hangmen-regime-idUSKCN2DW06X&amp;#34;&amp;gt;Israel&amp;#39;s Bennett warns against nuclear talks with Iran&amp;#39;s &amp;amp;quot;hangmen regime&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israel condemned on Sunday the election of hardline judge Ebrahim Raisi as Iranian president, saying his would be a &amp;amp;#34;regime of brutal hangmen&amp;amp;#34; with which world powers should not negotiate a new nuclear deal.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks/iran-says-nuclear-talks-to-be-adjourned-for-consultations-in-capitals-idUSKCN2DW09G&amp;#34;&amp;gt;Iran says nuclear talks to be adjourned for consultations in capitals&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-taiwan-usa/taiwan-welcomes-us-vaccine-aid-bolstering-its-covid-fight-idUSKCN2DW012&amp;#34;&amp;gt;Taiwan welcomes US vaccine aid, bolstering its COVID fight&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-081725/</link>
      <pubDate>Sun, 20 Jun 2021 08:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-081725/</guid>
      <description>DUBAI (Reuters) -Gulf Arab states are unlikely to be deterred from dialogue to improve ties with Iran after a hardline judge won the presidency but their talks with Tehran might become tougher, analysts said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-hongkong/taiwanese-staff-to-leave-hong-kong-office-in-one-china-row-idUSKCN2DW02J&amp;#34;&amp;gt;Taiwanese staff to leave Hong Kong office in &amp;#39;one China&amp;#39; row&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-041928/</link>
      <pubDate>Sun, 20 Jun 2021 04:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-041928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-taiwan-usa/forces-for-good-will-prevail-taiwan-welcomes-massive-us-vaccine-aid-idUSKCN2DW012&amp;#34;&amp;gt;&amp;#39;Forces for good will prevail&amp;#39; - Taiwan welcomes massive US vaccine aid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210620-002115/</link>
      <pubDate>Sun, 20 Jun 2021 00:21:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210620-002115/</guid>
      <description>Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/2d/&amp;#34;&amp;gt;2D&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/fold/&amp;#34;&amp;gt;fold&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/geometry/&amp;#34;&amp;gt;geometry&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/line/&amp;#34;&amp;gt;line&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/origami/&amp;#34;&amp;gt;origami&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/reflect/&amp;#34;&amp;gt;reflect&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/#comments&amp;#34;&amp;gt;1 Comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-001910/</link>
      <pubDate>Sun, 20 Jun 2021 00:19:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210620-001910/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-brazil/brazil-passes-half-a-million-covid-19-deaths-experts-warn-of-worse-ahead-idUSKCN2DV0DA&amp;#34;&amp;gt;Brazil passes half a million COVID-19 deaths, experts warn of worse ahead&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210619-201956/</link>
      <pubDate>Sat, 19 Jun 2021 20:19:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210619-201956/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/&amp;#34;&amp;gt;Competitive programming in Haskell: folding folds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/08/average-and-median-via-optimization/&amp;#34;&amp;gt;Average and median via optimization&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-201743/</link>
      <pubDate>Sat, 19 Jun 2021 20:17:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-201743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-gulf/as-iran-veers-right-ties-with-gulf-arabs-may-hinge-on-nuclear-pact-idUSKCN2DV0GJ&amp;#34;&amp;gt;As Iran veers right, ties with Gulf Arabs may hinge on nuclear pact&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Gulf Arab states are unlikely to be deterred from dialogue to improve ties with Iran after a hardline judge won the presidency but their talks with Tehran might become tougher, analysts said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-raisi-newsmaker/winner-of-iran-presidency-is-hardline-judge-who-is-under-u-s-sanctions-idUSKCN2DR0GV&amp;#34;&amp;gt;Winner of Iran presidency is hardline judge who is under U.S. sanctions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210619-162103/</link>
      <pubDate>Sat, 19 Jun 2021 16:21:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210619-162103/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132650_2022-toyota-tundra-first-look&amp;#34;&amp;gt;2022 Toyota Tundra first look&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210619-161934/</link>
      <pubDate>Sat, 19 Jun 2021 16:19:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210619-161934/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/&amp;#34;&amp;gt;Competitive programming in Haskell: folding folds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Now that the semester is over—and I will be on sabbatical in the fall!—you can expect a lot more competitive programming in Haskell posts. In &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/02/23/competitive-programming-in-haskell-folding-challenge/&amp;#34;&amp;gt;a previous post&amp;lt;/a&amp;gt; , I challenged you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/origami&amp;#34;&amp;gt;Origami&amp;lt;/a&amp;gt; . &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/02/23/competitive-programming-in-haskell-folding-challenge/#comment-39466&amp;#34;&amp;gt;j0sejuan took me up on the challenge&amp;lt;/a&amp;gt; , as did Aaron Allen and Ryan Yates; if you still want to try it, go do it before reading on!&amp;lt;br&amp;gt;
In the problem, we start with a square sheet of paper and are given a series of folds to perform in sequence; each fold is specified as a line, and we fold whatever is on one side of the line across onto the other side. Given some query points, we have to compute how thick the resulting origami design is at each point.&amp;lt;br&amp;gt;
Lines&amp;lt;br&amp;gt;
The first order of business is some computational geometry relating to lines in 2D (this code can all be found in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/byorgey/comprog-hs/blob/master/Geom.hs&amp;#34;&amp;gt;Geom.hs&amp;lt;/a&amp;gt; . Here I am following &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://vlecomte.github.io/&amp;#34;&amp;gt;Victor Lecomte&amp;lt;/a&amp;gt; ’s excellent &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://vlecomte.github.io/cp-geo.pdf&amp;#34;&amp;gt;Handbook of geometry for competitive programmers&amp;lt;/a&amp;gt; , which I think I’ve mentioned before. I’ll try to give a bit of explanation, but if you want full explanations and proofs you should consult that document.&amp;lt;br&amp;gt;
The equation of a line can be thought of as the set of all points whose dot product with the vector is a constant . This will in fact be a line perpendicular to the vector , where determines the distance of the line from the origin. Alternatively, we can think of the vector , which is perpendicular to and thus parallel to the line; the line now consists of all points whose &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/07/10/competitive-programming-in-haskell-2d-cross-product-part-1/&amp;#34;&amp;gt;2D cross product&amp;lt;/a&amp;gt; with is the constant (since ; note that the order matters). Either representation would work, but I will follow Lecomte in choosing the second: we represent a line by a vector giving its direction, and a scalar offset.&amp;lt;br&amp;gt;
data L2 s = L2 { getDirection :: ! ( V2 s ) , getOffset :: ! s } type L2D = L2 Double&amp;lt;br&amp;gt;
There are a few ways to construct a line: from an equation , or from two points which lie on the line. The first is easy, given the above discussion. For the second, given points and , we can easily construct the direction of the line as . Then to get the constant , we simply use the fact that is the cross product of the direction vector with any point on the line, say, (of course would also work).&amp;lt;br&amp;gt;
lineFromEquation :: Num s =&amp;amp;gt; s -&amp;amp;gt; s -&amp;amp;gt; s -&amp;amp;gt; L2 s lineFromEquation a b c = L2 ( V2 b ( - a ) ) c lineFromPoints :: Num s =&amp;amp;gt; P2 s -&amp;amp;gt; P2 s -&amp;amp;gt; L2 s lineFromPoints p q = L2 v ( v `cross` p ) where v = q ^-^ p&amp;lt;br&amp;gt;
Now we can write some functions to decide where a given point lies with respect to a line. First, the&amp;lt;br&amp;gt;
side&amp;lt;br&amp;gt;
function computes for any point .&amp;lt;br&amp;gt;
side :: Num s =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; s side ( L2 v c ) p = cross v p - c&amp;lt;br&amp;gt;
Of course, for points that lie on the line, this quantity will be zero. We can also classify points as lying to the left or right of the line (looking in the direction of ) depending on whether&amp;lt;br&amp;gt;
side l p&amp;lt;br&amp;gt;
is positive or negative, respectively.&amp;lt;br&amp;gt;
onLine :: ( Num s , Eq s ) =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; Bool onLine l p = side l p == 0 leftOf :: ( Num s , Ord s ) =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; Bool leftOf l p = side l p &amp;amp;gt; 0 rightOf :: ( Num s , Ord s ) =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; Bool rightOf l p = side l p &amp;amp;lt; 0&amp;lt;br&amp;gt;
The last piece we will need to solve the problem is a way to reflect a point across a line.&amp;lt;br&amp;gt;
toProjection l p&amp;lt;br&amp;gt;
computes the vector perpendicular to which points from to , and&amp;lt;br&amp;gt;
reflectAcross&amp;lt;br&amp;gt;
works by adding&amp;lt;br&amp;gt;
p&amp;lt;br&amp;gt;
twice. I won’t derive the definition of&amp;lt;br&amp;gt;
toProjection&amp;lt;br&amp;gt;
, but the basic idea is to start with a vector perpendicular to the direction of the line (&amp;lt;br&amp;gt;
perp v&amp;lt;br&amp;gt;
) and scale it by a factor related to&amp;lt;br&amp;gt;
. (Intuitively, it makes sense that tells us something about the distance from to the line; the farther away is from the line, the farther is from .) See Lecomte for the full details.&amp;lt;br&amp;gt;
toProjection :: Fractional s =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; V2 s toProjection l @ ( L2 v _ ) p = ( - side l p / normSq v ) *^ perp v project :: Fractional s =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; P2 s project l p = p ^&#43;^ toProjection l p reflectAcross :: Fractional s =&amp;amp;gt; L2 s -&amp;amp;gt; P2 s -&amp;amp;gt; P2 s reflectAcross l p = p ^&#43;^ ( 2 *^ toProjection l p )&amp;lt;br&amp;gt;
Folding origami&amp;lt;br&amp;gt;
Finally we can solve the problem! First, some imports and input parsing.&amp;lt;br&amp;gt;
{-# LANGUAGE RecordWildCards #-} import Control.Arrow import qualified Data.ByteString.Lazy.Char8 as C import Geom import ScannerBS main = C.interact $ runScanner tc &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; solve &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; map ( show &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.pack ) &amp;amp;gt;&amp;amp;gt;&amp;amp;gt; C.unlines data TC = TC { steps :: [ L2D ] , holes :: [ P2D ] } tc = TC &amp;amp;lt;$&amp;amp;gt; numberOf ( lineFromPoints &amp;amp;lt;$&amp;amp;gt; p2 double &amp;amp;lt;*&amp;amp;gt; p2 double ) &amp;amp;lt;*&amp;amp;gt; numberOf ( p2 double ) solve :: TC -&amp;amp;gt; [ Int ] solve TC { .. } = map countLayers holes where&amp;lt;br&amp;gt;
For&amp;lt;br&amp;gt;
countLayers&amp;lt;br&amp;gt;
, the idea is to work backwards from a given query point to find all its preimages, that is, the points that will eventually map to that point under the folds. Then we can just count how many of those points lie (strictly) inside the original square of paper.&amp;lt;br&amp;gt;
inSquare ( V2 x y ) = 0 &amp;amp;lt; x &amp;amp;amp;&amp;amp;amp; x &amp;amp;lt; 1000 &amp;amp;amp;&amp;amp;amp; 0 &amp;amp;lt; y &amp;amp;amp;&amp;amp;amp; y &amp;amp;lt; 1000&amp;lt;br&amp;gt;
For a given point and fold, there are two possibilities, depending on which side of the fold line the point falls on. If the point falls on the fold or to the right of it, then it has no preimages (we always fold from right to left, so after the fold, there will be no paper on the right side of the line, and the problem specifies that points exactly on a folded edge do not count). Hence we can just discard such a point. On the other hand, if the point lies on the left side of the line, then the point has two preimages: the point itself, and its reflection across the fold line.&amp;lt;br&amp;gt;
preimage :: L2D -&amp;amp;gt; P2D -&amp;amp;gt; [ P2D ] preimage l p | leftOf l p = [ p , reflectAcross l p ] | otherwise = []&amp;lt;br&amp;gt;
So we keep a set of points, starting with the singleton query point, and for each fold (in order from last to first) we find the preimage of every point in the set under the fold. We actually use lists of points instead of sets, because (1) we won’t ever get any collisions (actually, the more I think about this, the less sure I am!) and (2) it lets us use the actual list monad instead of making some ad-hoc&amp;lt;br&amp;gt;
monad operations.&amp;lt;br&amp;gt;
countLayers :: P2D -&amp;amp;gt; Int countLayers q = length . filter inSquare $ foldr ( \ l -&amp;amp;gt; ( &amp;amp;gt;&amp;amp;gt;= preimage l ) ) [ q ] steps&amp;lt;br&amp;gt;
It is very satisfying to use a fold to process a list of folds!&amp;lt;br&amp;gt;
Next time: Please, Go First&amp;lt;br&amp;gt;
For next time, I invite you to solve &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://open.kattis.com/problems/pleasegofirst&amp;#34;&amp;gt;Please, Go First&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/competitive-programming/&amp;#34;&amp;gt;competitive programming&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/2d/&amp;#34;&amp;gt;2D&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/fold/&amp;#34;&amp;gt;fold&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/geometry/&amp;#34;&amp;gt;geometry&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/haskell/&amp;#34;&amp;gt;haskell&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/kattis/&amp;#34;&amp;gt;Kattis&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/line/&amp;#34;&amp;gt;line&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/origami/&amp;#34;&amp;gt;origami&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/reflect/&amp;#34;&amp;gt;reflect&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/19/competitive-programming-in-haskell-folding-folds/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-161743/</link>
      <pubDate>Sat, 19 Jun 2021 16:17:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-161743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-victory/khamenei-protege-wins-iran-election-amid-low-turnout-idUSKCN2DV05J&amp;#34;&amp;gt;Khamenei protege wins Iran election amid low turnout&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DUBAI (Reuters) -Ebrahim Raisi, a hardline judge who is under U.S. sanctions for human rights abuses, secured victory as expected on Saturday in Iran&amp;amp;#39;s presidential election after a contest marked by voter apathy over economic hardships and political restrictions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-amnesty/rights-groups-call-for-probe-into-irans-raisi-for-crimes-against-humanity-idUSKCN2DV0BB&amp;#34;&amp;gt;Rights groups call for probe into Iran&amp;amp;#39;s Raisi for crimes against humanity&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210619-122142/</link>
      <pubDate>Sat, 19 Jun 2021 12:21:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210619-122142/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132623_awkward-tesla-model-s-yoke-is-no-joke&amp;#34;&amp;gt;Awkward: Tesla Model S yoke is no joke&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-121816/</link>
      <pubDate>Sat, 19 Jun 2021 12:18:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-121816/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-victory/hardline-judge-poised-for-iran-presidency-in-landslide-election-win-idUSKCN2DV05J&amp;#34;&amp;gt;Hardline judge poised for Iran presidency in landslide election win&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hardline judge Ebrahim Raisi was heading for a landslide win in Iran&amp;amp;#39;s presidential election on Saturday, as the man he will replace pledged a smooth transition a day after millions voted in a contest that critics boycotted over economic woes and political curbs.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-usa-taiwan/exclusive-u-s-triples-vaccines-for-taiwan-with-2-5-million-dose-shipment-idUSKCN2DV0AX&amp;#34;&amp;gt;Exclusive-U.S. triples vaccines for Taiwan with 2.5 million-dose shipment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-081830/</link>
      <pubDate>Sat, 19 Jun 2021 08:18:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-081830/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election-victory/hardline-judge-raisi-leads-in-iranian-presidential-election-says-official-idUSKCN2DV05J&amp;#34;&amp;gt;Hardline judge Raisi leads in Iranian presidential election, says official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DUBAI (Reuters) -Hardline judge Ebrahim Raisi leads Iran&amp;amp;#39;s presidential election, an interior ministry official said on Saturday, a day after millions of Iranians voted in a contest that critics boycotted over economic woes and political restrictions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/apple-daily-editor-ceo-denied-bail-in-hong-kong-idUSKCN2DV011&amp;#34;&amp;gt;Apple Daily editor, CEO denied bail in Hong Kong&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210619-081642/</link>
      <pubDate>Sat, 19 Jun 2021 08:16:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210619-081642/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2017/11/08/a-few-thoughts-on-csrankings-org/&amp;#34;&amp;gt;A few thoughts on CSRankings.org&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-041812/</link>
      <pubDate>Sat, 19 Jun 2021 04:18:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-041812/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/crowds-gather-for-hearing-of-two-apple-daily-executives-on-national-security-charge-idUSKCN2DV011&amp;#34;&amp;gt;Crowds gather for hearing of two Apple Daily executives on national security charge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peru-ex-military-stir-election-tensions-with-appeal-to-armed-forces-to-remedy-poll-idUSKCN2DU2F5&amp;#34;&amp;gt;Peru ex-military stir election tensions with appeal to Armed Forces to &amp;amp;#34;remedy&amp;amp;#34; poll&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-001758/</link>
      <pubDate>Sat, 19 Jun 2021 00:17:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210619-001758/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-un/united-nations-calls-for-halt-of-weapons-to-myanmar-idUSKCN2DU1US&amp;#34;&amp;gt;United Nations calls for halt of weapons to Myanmar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-refugees/canada-vows-to-nearly-double-intake-of-protected-persons-as-refugee-family-backlog-grows-idUSKCN2DU2AO&amp;#34;&amp;gt;Canada vows to nearly double intake of &amp;amp;#39;protected persons&amp;amp;#39; as refugee family backlog grows&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-201723/</link>
      <pubDate>Fri, 18 Jun 2021 20:17:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-201723/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: Fed’s Neel Kashkari opposes rate hikes at least through 2023 as the central bank becomes more hawkish &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DU26B&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/judge-under-u-s-sanctions-set-to-take-over-iran-presidency-idUSKCN2DT2V9&amp;#34;&amp;gt;Judge under U.S. sanctions set to take over Iran presidency&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DUBAI (Reuters) -Millions of Iranians voted on Friday in a contest set to hand the presidency to a hardline judge who is subject to U.S. sanctions, though anger over economic hardship and curbs on freedoms mean many will heed calls for a boycott.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-train-accident/mexico-city-mayor-to-construction-firms-pay-up-for-collapsed-metro-line-idUSKCN2DU25V&amp;#34;&amp;gt;Mexico City mayor to construction firms: Pay up for collapsed metro line&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-venezuela-politics/venezuela-opposition-committee-to-seek-support-in-washington-brussels-idUSKCN2DU280&amp;#34;&amp;gt;Venezuela opposition committee to seek support in Washington, Brussels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210618-201556/</link>
      <pubDate>Fri, 18 Jun 2021 20:15:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210618-201556/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/dpa/&amp;#34;&amp;gt;Data Processing Addendum&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays | Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20210618-201409/</link>
      <pubDate>Fri, 18 Jun 2021 20:14:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20210618-201409/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/going-up-the-hill/&amp;#34;&amp;gt;Going up the hill&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>The Official Listen Notes Blog</title>
      <link>https://www.whatsupup.com/blog/effete/washstand/20210618-162107/</link>
      <pubDate>Fri, 18 Jun 2021 16:21:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/effete/washstand/20210618-162107/</guid>
      <description>&amp;lt;p&amp;gt;Discover&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/realtime/&amp;#34;&amp;gt;Real-Time Episodes being played now&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/explorer/&amp;#34;&amp;gt;Explorer Find similar podcasts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/best-podcasts/&amp;#34;&amp;gt;Best Podcasts Recommended by us&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/hot-podcasts/&amp;#34;&amp;gt;Hot Podcasts Popular shows today&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/curated-podcasts/&amp;#34;&amp;gt;Curated Podcasts Recommended by media&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcast-playlists/&amp;#34;&amp;gt;Playlists Playlists from our community&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/classifieds/&amp;#34;&amp;gt;Classified Ads Help needed for podcasts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcast-academy/&amp;#34;&amp;gt;Podcast Academy Learn podcasting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
☰ MORE&amp;lt;br&amp;gt;
|&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog&amp;#34;&amp;gt;Login&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/about/&amp;#34;&amp;gt;ABOUT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/business/&amp;#34;&amp;gt;BUSINESS&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/labs/&amp;#34;&amp;gt;LABS&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/help/&amp;#34;&amp;gt;HELP&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcast-stats/&amp;#34;&amp;gt;PODCAST STATS&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/blog/&amp;#34;&amp;gt;BLOG&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/contact/&amp;#34;&amp;gt;CONTACT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://listennotes.substack.com/&amp;#34;&amp;gt;Get Listen Notes Monthly Updates Email Newsletter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
SHARE&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/accounts/facebook/login/?next=%2Fblog%2F&amp;#34;&amp;gt;Continue with Facebook&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/accounts/google/login/?next=%2Fblog%2F&amp;amp;method=oauth2&amp;#34;&amp;gt;Continue with Google&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/accounts/twitter/login/?next=%2Fblog%2F&amp;amp;method=oauth2&amp;#34;&amp;gt;Continue with Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
✓ English (en)&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Put this image on your website to promote the show -&amp;lt;br&amp;gt;
Get embed code&amp;lt;br&amp;gt;
&amp;amp;lt;a href=&amp;amp;#34; &amp;amp;#34;
title=&amp;amp;#34; &amp;amp;#34;&amp;amp;gt;&amp;amp;lt;img loading=&amp;amp;#34;lazy&amp;amp;#34; src=&amp;amp;#34; &amp;amp;#34;
alt=&amp;amp;#34; &amp;amp;#34; style=&amp;amp;#34;height: 120px; max-width: 100%;&amp;amp;#34; /&amp;amp;gt;&amp;amp;lt;/a&amp;amp;gt;&amp;lt;br&amp;gt;
What is Listen Score? Listen Score (LS) is a metric that shows the estimated popularity of this podcast compared to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcast-stats/&amp;#34;&amp;gt;other rss-based public podcasts&amp;lt;/a&amp;gt; in the world on a scale from 0 to 100. The
higher, the more popular. Calculated from 1st and 3rd party data. Updated monthly.&amp;lt;br&amp;gt;
What is Global Rank? This podcast is one of the top most popular shows out of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcast-stats/&amp;#34;&amp;gt;2,500,052 podcasts&amp;lt;/a&amp;gt; globally, ranked by Listen Score (the estimated popularity score).&amp;lt;br&amp;gt;
Updated: 2021-5-5&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/listen-score/&amp;#34;&amp;gt;About Listen Score&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/listen/&amp;#34;&amp;gt;Listen Later Curate podcast playlists&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/clips/&amp;#34;&amp;gt;Listen Clips Create podcast clips&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/alerts/&amp;#34;&amp;gt;Listen Alerts Monitor podcast mentions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/api/&amp;#34;&amp;gt;Listen API Build podcast apps&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/datasets/&amp;#34;&amp;gt;Listen Datasets Batch export podcasts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/premium/&amp;#34;&amp;gt;Premium Membership Advanced search features&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/submit/&amp;#34;&amp;gt;Submit Add your podcasts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/integrations/&amp;#34;&amp;gt;Integrations Bring podcasts everywhere&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.listennotes.com/podcaster-interviews/&amp;#34;&amp;gt;Podcaster Interviews We interview podcasters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-161757/</link>
      <pubDate>Fri, 18 Jun 2021 16:17:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-161757/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/judge-sanctioned-by-u-s-set-to-take-over-iran-presidency-idUSKCN2DT2V9&amp;#34;&amp;gt;Judge sanctioned by U.S. set to take over Iran presidency&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
DUBAI (Reuters) -Iranians voted on Friday in a contest set to hand the presidency to a hardline judge subject to U.S. sanctions, though many are likely to ignore the ballot amid anger over economic hardship and calls for a boycott by critics of hardline rule.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-politics/embarrassing-defeat-uk-pm-johnsons-party-loses-out-at-election-idUSKCN2DU0KE&amp;#34;&amp;gt;Embarrassing defeat, UK PM Johnson&amp;amp;#39;s party loses out at election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/06/18/the-week-in-numbers-moving-bottles-move?videoId=731733119&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: moving bottles move markets&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210618-161651/</link>
      <pubDate>Fri, 18 Jun 2021 16:16:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210618-161651/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-bill-that-could-backfire&amp;#34;&amp;gt;The One Big Tech Bill That Could Backfire Spectacularly&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-bill-that-could-backfire&amp;#34;&amp;gt;Congress wants to stop most Big Tech acquisitions. But that won&amp;#39;t necessarily increase competition.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210618-161505/</link>
      <pubDate>Fri, 18 Jun 2021 16:15:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210618-161505/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/get-ready-for-2021-google-ctf.html&amp;#34;&amp;gt;Get ready for the 2021 Google CTF&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Kristoffer Janke, Information Security Engineer&amp;lt;br&amp;gt;
Are you ready for no sleep, no chill and a lot of hacking? Our annual Google CTF is back! The competition kicks off on Saturday July 17 00:00:01 AM UTC  and runs through Sunday July 18 23:59:59 UTC. Teams can register at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/ctf&amp;#34;&amp;gt;http://goo.gle/ctf&amp;lt;/a&amp;gt; . Just like last year, the top 16 teams will qualify for our &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://capturetheflag.withgoogle.com/hackceler8#about&amp;#34;&amp;gt;Hackceler8&amp;lt;/a&amp;gt; speed run and the chance to take home a total of $30,301.70 in prize money.&amp;lt;br&amp;gt;
As we reminisce on last years event, we’d be remiss if we didn’t recognize our 2020 winning teams:&amp;lt;br&amp;gt;
Plaid Parliament of Pwning&amp;lt;br&amp;gt;
I Use Bing&amp;lt;br&amp;gt;
pasten&amp;lt;br&amp;gt;
The Flat Network Society&amp;lt;br&amp;gt;
We are eager to see if they can defend their leet status. For those interested, we have published all 2020 Hackceler8 videos for your viewing pleasure &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/hackceler8&amp;#34;&amp;gt;here.&amp;lt;/a&amp;gt; Whether you’re a seasoned CTF player or just curious about cyber security and ethical hacking, we want you to join us. Sign up to learn skills, meet new friends in the security community and even watch the pros in action. For the latest announcements, see g.co/ctf, subscribe to our mailing list or follow us on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/GoogleVRP&amp;#34;&amp;gt;@GoogleVRP&amp;lt;/a&amp;gt; . See you there! P.S. Curious about last year’s Google CTF challenges? We open-sourced them &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/google-ctf/tree/master/2020/quals&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/CTF&amp;#34;&amp;gt;CTF&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/CTF&amp;#34;&amp;gt;CTF&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210618-160623/</link>
      <pubDate>Fri, 18 Jun 2021 16:06:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210618-160623/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/first-american-financial-pays-farcical-500k-fine/&amp;#34;&amp;gt;First American Financial Pays Farcical $500K Fine&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In May 2019, KrebsOnSecurity broke the news that the website of mortgage settlement giant &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/First_American_Corporation&amp;#34;&amp;gt;First American Financial Corp.&amp;lt;/a&amp;gt; [ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.marketbeat.com/stocks/NYSE/FAF/&amp;#34;&amp;gt;NYSE:FAF&amp;lt;/a&amp;gt; ] was &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/05/first-american-financial-corp-leaked-hundreds-of-millions-of-title-insurance-records/&amp;#34;&amp;gt;leaking more than 800 million documents&amp;lt;/a&amp;gt; — many containing sensitive financial data — related to real estate transactions dating back 16 years. This week, the U.S. Securities and Exchange Commission settled its investigation into the matter after the Fortune 500 company agreed to pay a paltry penalty of less than $500,000.&amp;lt;br&amp;gt;
First American Financial Corp.&amp;lt;br&amp;gt;
If you bought or sold a property in the last two decades or so, chances are decent that you also gave loads of personal and financial documents to First American. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.alta.org/publications/press-release.cfm?ALTA-Reports-Title-Premium-Volume-Increases-217-Percent-in-2020&amp;#34;&amp;gt;data&amp;lt;/a&amp;gt; from the American Land Title Association , First American is the second largest mortgage title and settlement company in the United States, handling nearly a quarter of all closings each year.&amp;lt;br&amp;gt;
The SEC says First American derives nearly 92 percent of its revenue from its title insurance segment, earning $7.1 billion last year.&amp;lt;br&amp;gt;
Title insurance protects homebuyers from the prospect of someone contesting their legitimacy as the new homeowner. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.simpleshowing.com/blog/who-pays-for-the-title-insurance&amp;#34;&amp;gt;SimpleShowing.com&amp;lt;/a&amp;gt; , there are actually two title insurance policies in each transaction — one for the buyer and one for the lender (the latter also needs protection as they’re providing the mortgage to purchase the home).&amp;lt;br&amp;gt;
Title insurance is not mandated by law, but most lenders require it as part of any mortgage transaction. In other words, if you wish to take out a mortgage on a home you will not be able to do so without giving companies like First American gobs of documents about your income, assets and liabilities — including quite a bit of sensitive financial data.&amp;lt;br&amp;gt;
Aside from its core business competency — checking to make sure the property at issue in any real estate transaction is unencumbered by any liens or other legal claims against it — First American basically has one job: Protect the privacy and security of all these documents.&amp;lt;br&amp;gt;
A redacted screenshot of one of many millions of sensitive records exposed by First American’s Web site.&amp;lt;br&amp;gt;
It’s easy to see why companies like First American might not view protecting this data as sacrosanct, as the entire industry’s incentive for safeguarding all those sensitive documents is somewhat misaligned.&amp;lt;br&amp;gt;
That is to say, in the title insurance industry the parties to a real estate transaction aren’t customers, but rather they are are the product . The actual customers of the title insurance companies are principally the banks which back these mortgage transactions.&amp;lt;br&amp;gt;
We see a similar dynamic with social media platforms, where the “user” is not the customer at all but the product whose data is being bought and sold by these platforms.&amp;lt;br&amp;gt;
Roughly five months before KrebsOnSecurity notified First American that anyone with a web browser could view sensitive document in its “Eagle Pro” database online just by changing some characters at the end of a link, an internal security audit at First American flagged the exact same vulnerability.&amp;lt;br&amp;gt;
But the company never acted to fix it until the news media came calling. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/first-american-financial-pays-farcical-500k-fine/#more-55971&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210618-122011/</link>
      <pubDate>Fri, 18 Jun 2021 12:20:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210618-122011/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132580_2021-kia-k5-gt-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Kia K5 GT spins the fun dial way up&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132343_1994-toyota-supra-driven-by-paul-walker-in-the-fast-and-the-furious-for-sale&amp;#34;&amp;gt;1994 Toyota Supra driven by Paul Walker in &amp;amp;#34;The Fast and the Furious&amp;amp;#34; for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132466_1987-buick-gnx-with-8-7-miles-on-it-headed-to-auction&amp;#34;&amp;gt;1987 Buick GNX with 8.7 miles on it headed to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-121705/</link>
      <pubDate>Fri, 18 Jun 2021 12:17:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-121705/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/judge-under-u-s-sanctions-set-to-win-presidency-for-irans-hardliners-idUSKCN2DT2V9&amp;#34;&amp;gt;Judge under U.S. sanctions set to win presidency for Iran&amp;#39;s hardliners&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Iranians voted on Friday in an election expected to hand the presidency to a hardline judge subject to U.S. sanctions, though many are likely to ignore the ballot amid economic hardship and calls for a boycott by critics at home and abroad.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/two-apple-daily-executives-charged-with-collusion-with-foreign-country-idUSKCN2DU04I&amp;#34;&amp;gt;Two Apple Daily executives charged with collusion with foreign country&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-081635/</link>
      <pubDate>Fri, 18 Jun 2021 08:16:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-081635/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/judge-under-u-s-sanctions-set-for-presidency-as-iranians-vote-idUSKCN2DT2V9&amp;#34;&amp;gt;Judge under U.S. sanctions set for presidency as Iranians vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-041654/</link>
      <pubDate>Fri, 18 Jun 2021 04:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-041654/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-pacific-exclusive/exclusive-pacific-undersea-cable-project-sinks-after-u-s-warns-against-chinese-participation-idUSKCN2DU06W&amp;#34;&amp;gt;Exclusive-Pacific undersea cable project sinks after U.S. warns against Chinese participation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A World Bank-led project declined to award a contract to lay sensitive undersea communications cables after Pacific island governments heeded U.S. warnings that participation of a Chinese company posed a security threat, two sources told Reuters.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hk-democracy-supporters-snap-up-apple-daily-copies-amid-anger-at-police-crackdown-idUSKCN2DU04I&amp;#34;&amp;gt;HK democracy supporters snap up Apple Daily copies amid anger at police crackdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-001706/</link>
      <pubDate>Fri, 18 Jun 2021 00:17:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210618-001706/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: Some Chinese apps could face subpoenas or bans under Biden&amp;#39;s executive order aimed at protecting Americans&amp;#39; data &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DT2RX&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/iran-election-set-to-hand-presidency-to-hardline-judge-idUSKCN2DT2V9&amp;#34;&amp;gt;Iran election set to hand presidency to hardline judge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Iranians choose a president on Friday in a contest likely to be won by a judge fiercely loyal to the religious establishment, although large numbers of people are expected to ignore the vote due to discontent with economic hardship and hardline rule.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-electoral-board-says-it-is-working-at-top-speed-to-resolve-election-questions-idUSKCN2DT2SD&amp;#34;&amp;gt;Peru&amp;amp;#39;s electoral board says it is working at top speed to resolve election questions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-usa/n-koreas-kim-says-to-prepare-for-both-dialogue-and-confrontation-with-u-s-kcna-idUSKCN2DT2TA&amp;#34;&amp;gt;N.Korea&amp;amp;#39;s Kim says to prepare for &amp;amp;#39;both dialogue and confrontation&amp;amp;#39; with U.S. -KCNA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210618-001657/</link>
      <pubDate>Fri, 18 Jun 2021 00:16:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210618-001657/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/newly-discovered-vigilante-malware-outs-software-pirates-and-blocks-them/&amp;#34;&amp;gt;Newly discovered Vigilante malware outs software pirates and blocks them&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Most malware tries to steal stuff. Vigilante, by contrast, takes aim at piracy.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210618-001600/</link>
      <pubDate>Fri, 18 Jun 2021 00:15:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210618-001600/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-bill-that-could-backfire&amp;#34;&amp;gt;The One Big Tech Bill That Could Backfire Spectacularly&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/the-big-tech-bill-that-could-backfire&amp;#34;&amp;gt;Congress wants to stop most Big Tech acquisitions. But that won&amp;#39;t neccesarily increase competition.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-is-going-to-throw-the-kitchen&amp;#34;&amp;gt;Congress Is Going To Throw The Kitchen Sink At Big Tech&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-is-going-to-throw-the-kitchen&amp;#34;&amp;gt;Big Technology obtained the five draft bills currently circulating around the House of Representatives that target Big Tech. If they’re signed into law…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jun 10 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;12&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-is-going-to-throw-the-kitchen/comments&amp;#34;&amp;gt;Comment 4&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-201739/</link>
      <pubDate>Thu, 17 Jun 2021 20:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-201739/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-researchers-focus/chinese-scientists-ensnared-in-u-s-visa-fraud-legal-battle-idUSKCN2DT2LI&amp;#34;&amp;gt;Chinese scientists ensnared in U.S. visa fraud legal battle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
For Chinese brain researcher Song Chen, a visiting scholar at Stanford University when she was arrested last July on a visa fraud charge, a court hearing last month in San Francisco brought some hope.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-train-accident/probe-finds-new-defects-after-mexico-city-metro-crash-idUSKCN2DT2KJ&amp;#34;&amp;gt;Probe finds new defects after Mexico City metro crash&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210617-201721/</link>
      <pubDate>Thu, 17 Jun 2021 20:17:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210617-201721/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/17/technology/fcc-china-technology-restrictions.html&amp;#34;&amp;gt;The F.C.C. proposes further restrictions on Chinese telecom equipment. The agency’s actions are a sign of bipartisan opposition to China’s providers of cutting-edge technology like Huawei and ZTE. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210617-162001/</link>
      <pubDate>Thu, 17 Jun 2021 16:20:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210617-162001/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130845_2021-jeep-grand-cherokee-l-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Jeep Grand Cherokee L grows up but remains playful&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-161704/</link>
      <pubDate>Thu, 17 Jun 2021 16:17:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-161704/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-apple-daily/hong-kongs-apple-daily-newsroom-raided-by-500-officers-over-national-security-law-idUSKCN2DT01I&amp;#34;&amp;gt;Hong Kong&amp;#39;s Apple Daily newsroom raided by 500 officers over national security law&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210617-122015/</link>
      <pubDate>Thu, 17 Jun 2021 12:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210617-122015/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130845_2021-jeep-grand-cherokee-l-price-specs-review-photos-info&amp;#34;&amp;gt;First Drive review: 2021 Jeep Grand Cherokee L grows up but remains playful&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10000044_motor-authority&amp;#34;&amp;gt;Motor Authority - Motor Authority Importer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210617-121807/</link>
      <pubDate>Thu, 17 Jun 2021 12:18:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210617-121807/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/17/science/betelgeuse-montarges-star-supernova.html&amp;#34;&amp;gt;Out There Betelgeuse Merely Burped, Astronomers Conclude The dramatic dimming of the red supergiant in 2019 was the product of dust, not a prelude to destruction, a new study has found. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-121650/</link>
      <pubDate>Thu, 17 Jun 2021 12:16:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-121650/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-space-exploration-china-shenzhou/chinese-astronauts-board-space-station-module-in-historic-mission-idUSKCN2DT04K&amp;#34;&amp;gt;Chinese astronauts board space station module in historic mission&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-apple-daily/hks-apple-daily-newsroom-raided-by-500-officers-over-national-security-law-idUSKCN2DT01I&amp;#34;&amp;gt;HK&amp;amp;#39;s Apple Daily newsroom raided by 500 officers over national security law&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-081800/</link>
      <pubDate>Thu, 17 Jun 2021 08:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-081800/</guid>
      <description>President Joe Biden on his first foreign foray sought to cast Russia not as a direct competitor to the United States but as a bit player in a world where Washington is increasingly pre-occupied by China.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-china-b3w/asia-has-wary-welcome-for-g7s-answer-to-belt-and-road-idUSKCN2DT0LJ&amp;#34;&amp;gt;Asia has wary welcome for G7&amp;#39;s answer to Belt and Road&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-041814/</link>
      <pubDate>Thu, 17 Jun 2021 04:18:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-041814/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit-biden/analysis-biden-talks-down-russia-spurs-allies-in-bid-to-back-putin-into-a-corner-idUSKCN2DT0B4&amp;#34;&amp;gt;Analysis-Biden talks down Russia, spurs allies in bid to back Putin into a corner&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
President Joe Biden on his first foreign foray sought to cast Russia not as a direct competitor to the United States but as a bit player in world where Washington is increasingly pre-occupied by China.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-021833/</link>
      <pubDate>Thu, 17 Jun 2021 02:18:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210617-021833/</guid>
      <description>&amp;lt;p&amp;gt;GENEVA (Reuters) -U.S. President Joe Biden and Russian President Vladimir Putin agreed on Wednesday to begin cybersecurity and arms control talks at a summit that highlighted their discord on those issues, human rights and Ukraine.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-space-exploration-china-shenzhou/china-launches-crewed-spacecraft-shenzhou-12-in-historic-mission-idUSKCN2DT04K&amp;#34;&amp;gt;China launches crewed spacecraft Shenzhou-12 in historic mission&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-train-accident-report/probe-into-mexico-city-metro-crash-blames-structural-failure-idUSKCN2DS28A&amp;#34;&amp;gt;Probe into Mexico City metro crash blames structural failure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210617-021812/</link>
      <pubDate>Thu, 17 Jun 2021 02:18:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210617-021812/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/16/technology/lina-khan-big-tech.html&amp;#34;&amp;gt;One of Big Tech’s Biggest Critics Is Now Its Regulator Lina Khan is the most progressive chair of the Federal Trade Commission in at least a generation. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-222040/</link>
      <pubDate>Wed, 16 Jun 2021 22:20:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-222040/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132630_high-performance-600-plus-hp-porsche-cayenne-coupe-sets-ring-record&amp;#34;&amp;gt;High-performance 600-plus-hp Porsche Cayenne Coupe sets &amp;#39;Ring record&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-221738/</link>
      <pubDate>Wed, 16 Jun 2021 22:17:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-221738/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/far-apart-at-first-summit-biden-and-putin-agree-to-steps-on-cybersecurity-arms-control-idUSKCN2DR2M0&amp;#34;&amp;gt;Far apart at first summit, Biden and Putin agree to steps on cybersecurity, arms control&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GENEVA (Reuters) -U.S. President Joe Biden and Russian President Vladimir Putin agreed on Wednesday to begin cybersecurity and arms control talks at a summit that laid bare their deep discord on those issues, human rights and Ukraine.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-taiwan-congress/pushing-against-china-u-s-lawmakers-plan-pro-taiwan-bill-idUSKCN2DS2BP&amp;#34;&amp;gt;Pushing against China, U.S. lawmakers plan pro-Taiwan bill&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-brazil-indigenous/firing-arrows-indigenous-people-in-brazil-protest-bill-curtailing-land-rights-idUSKCN2DS2J4&amp;#34;&amp;gt;Firing arrows, indigenous people in Brazil protest bill curtailing land rights&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210616-202018/</link>
      <pubDate>Wed, 16 Jun 2021 20:20:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210616-202018/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/10/12/competitive-programming-in-haskell-reading-large-inputs-with-bytestring/&amp;#34;&amp;gt;Competitive Programming in Haskell: reading large inputs with ByteString&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-201821/</link>
      <pubDate>Wed, 16 Jun 2021 20:18:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-201821/</guid>
      <description>Federal Reserve policymakers see the first interest rate hike in 2023, Wall Street drops &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DS0BJ&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/biden-pointedly-asks-putin-about-cyberattacks-at-summit-idUSKCN2DR2M0&amp;#34;&amp;gt;Biden pointedly asks Putin about cyberattacks at summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GENEVA (Reuters) -U.S. President Joe Biden asked Russian President Vladimir Putin on Wednesday how he would feel if someone carried out a ransomware attack on Russian oil pipelines, a pointed question during their summit that illustrated the breadth of their disagreements.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-181829/</link>
      <pubDate>Wed, 16 Jun 2021 18:18:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-181829/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/biden-calls-for-basic-rules-of-the-road-at-summit-with-putin-idUSKCN2DR2M0&amp;#34;&amp;gt;Biden calls for &amp;amp;quot;basic rules of the road&amp;amp;quot; at summit with Putin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden and Russian President Vladimir Putin decided at a &amp;amp;#34;pragmatic&amp;amp;#34; first summit on Wednesday to hold arms control and cyber-security talks and return their respective ambassadors, while agreeing to differ on other issues.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-161740/</link>
      <pubDate>Wed, 16 Jun 2021 16:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-161740/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/putin-and-biden-agree-at-summit-to-return-respective-ambassadors-idUSKCN2DR2M0&amp;#34;&amp;gt;Putin and Biden agree at summit to return respective ambassadors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GENEVA (Reuters) -U.S. President Joe Biden and Russian President Vladimir Putin agreed at their first summit on Wednesday to return ambassadors to each other&amp;amp;#39;s capitals after they were withdrawn earlier this year.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>&#34;Alexandra Witze&#34; : nature.com search</title>
      <link>https://www.whatsupup.com/blog/seer/hemisphere/20210616-161644/</link>
      <pubDate>Wed, 16 Jun 2021 16:16:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/seer/hemisphere/20210616-161644/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/articles/d41586-021-01537-3&amp;#34;&amp;gt;Mars helicopter kicks up ‘cool’ dust clouds — and unexpected science&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nature.com/search?q=%22Alexandra&#43;Witze%22&amp;amp;order=date_desc&amp;#34;&amp;gt;Rights &amp;amp;amp; permissions for article Mars helicopter kicks up ‘cool’ dust clouds — and unexpected science
                        . Opens in a new window.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210616-161504/</link>
      <pubDate>Wed, 16 Jun 2021 16:15:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210616-161504/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html&amp;#34;&amp;gt;Introducing SLSA, an End-to-End Framework for Supply Chain Integrity&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted Kim Lewandowski, Google Open Source Security Team &amp;amp;amp; Mark Lodato, Binary Authorization for Borg Team &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/introducing-slsa-end-to-end-framework.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted Kim Lewandowski, Google Open Source Security Team &amp;amp;amp; Mark Lodato, Binary Authorization for Borg Team&amp;lt;br&amp;gt;
Supply chain integrity attacks—unauthorized modifications to software packages—have been &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;on the rise&amp;lt;/a&amp;gt; in the past two years, and are proving to be common and reliable attack vectors that affect all consumers of software. The software development and deployment supply chain is quite complicated, with numerous threats along the source ➞ build ➞ publish workflow. While point solutions do exist for some specific vulnerabilities, there is no comprehensive end-to-end framework that both defines how to mitigate threats across the software supply chain, and provides reasonable security guarantees. There is an urgent need for a solution in the face of the eye-opening, multi-billion dollar attacks in recent months (e.g. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;SolarWinds&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Codecov&amp;lt;/a&amp;gt; ), some of which could have been prevented or made more difficult had such a framework been adopted by software developers and consumers. Our proposed solution is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Supply chain Levels for Software Artifacts&amp;lt;/a&amp;gt; (SLSA, pronounced “salsa”), an end-to-end framework for ensuring the integrity of software artifacts throughout the software supply chain. It is inspired by Google’s internal “ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Binary Authorization for Borg&amp;lt;/a&amp;gt; ” which has been in use for the past 8&#43; years and is mandatory for all of Google&amp;amp;#39;s production workloads. The goal of SLSA is to improve the state of the industry, particularly open source, to defend against the most pressing integrity threats. With SLSA, consumers can make informed choices about the security posture of the software they consume.&amp;lt;br&amp;gt;
How SLSA helps SLSA helps to protect against common supply chain attacks. The following image illustrates a typical software supply chain and includes examples of attacks that can occur at every link in the chain. Each type of attack has occured over the past several years and, unfortunately, is increasing as time goes on.&amp;lt;br&amp;gt;
Threat&amp;lt;br&amp;gt;
Known example&amp;lt;br&amp;gt;
How SLSA could have helped&amp;lt;br&amp;gt;
Submit bad code to the source repository&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://lore.kernel.org/lkml/202105051005.49BFABCE@keescook/&amp;#34;&amp;gt;Linux hypocrite commits&amp;lt;/a&amp;gt; : Researcher attempted to intentionally introduce vulnerabilities into the Linux kernel via patches on the mailing list.&amp;lt;br&amp;gt;
Two-person review caught most, but not all, of the vulnerabilities.&amp;lt;br&amp;gt;
B&amp;lt;br&amp;gt;
Compromise source control platform&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://news-web.php.net/php.internals/113838&amp;#34;&amp;gt;PHP&amp;lt;/a&amp;gt; : Attacker compromised PHP’s self-hosted git server and injected two malicious commits.&amp;lt;br&amp;gt;
A better-protected source code platform would have been a much harder target for the attackers.&amp;lt;br&amp;gt;
C&amp;lt;br&amp;gt;
Build with official process but from code not matching source control&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.webmin.com/exploit.html&amp;#34;&amp;gt;Webmin&amp;lt;/a&amp;gt; : Attacker modified the build infrastructure to use source files not matching source control.&amp;lt;br&amp;gt;
A SLSA-compliant build server would have produced provenance identifying the actual sources used, allowing consumers to detect such tampering.&amp;lt;br&amp;gt;
D&amp;lt;br&amp;gt;
Compromise build platform&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/&amp;#34;&amp;gt;SolarWinds&amp;lt;/a&amp;gt; : Attacker compromised the build platform and installed an implant that injected malicious behavior during each build.&amp;lt;br&amp;gt;
Higher SLSA levels require &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/slsa-framework/slsa/blob/main/build-requirements.md&amp;#34;&amp;gt;stronger security controls for the build platform&amp;lt;/a&amp;gt; , making it more difficult to compromise and gain persistence.&amp;lt;br&amp;gt;
E&amp;lt;br&amp;gt;
Use bad dependency (i.e. A-H, recursively)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://schneider.dev/blog/event-stream-vulnerability-explained/&amp;#34;&amp;gt;event-stream&amp;lt;/a&amp;gt; : Attacker added an innocuous dependency and then updated the dependency to add malicious behavior. The update did not match the code submitted to GitHub (i.e. attack F).&amp;lt;br&amp;gt;
Applying SLSA recursively to all dependencies would have prevented this particular vector, because the provenance would have indicated that it either wasn’t built from a proper builder or that the source did not come from GitHub.&amp;lt;br&amp;gt;
F&amp;lt;br&amp;gt;
Upload an artifact that was not built by the CI/CD system&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://about.codecov.io/apr-2021-post-mortem/&amp;#34;&amp;gt;CodeCov&amp;lt;/a&amp;gt; : Attacker used leaked credentials to upload a malicious artifact to a GCS bucket, from which users download directly.&amp;lt;br&amp;gt;
Provenance of the artifact in the GCS bucket would have shown that the artifact was not built in the expected manner from the expected source repo.&amp;lt;br&amp;gt;
G&amp;lt;br&amp;gt;
Compromise package repository&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://theupdateframework.io/papers/attacks-on-package-managers-ccs2008.pdf&amp;#34;&amp;gt;Attacks on Package Mirrors&amp;lt;/a&amp;gt; : Researcher ran mirrors for several popular package repositories, which could have been used to serve malicious packages.&amp;lt;br&amp;gt;
Similar to above (F), provenance of the malicious artifacts would have shown that they were not built as expected or from the expected source repo.&amp;lt;br&amp;gt;
H&amp;lt;br&amp;gt;
Trick consumer into using bad package&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.sonatype.com/damaging-linux-mac-malware-bundled-within-browserify-npm-brandjack-attempt&amp;#34;&amp;gt;Browserify typosquatting&amp;lt;/a&amp;gt; : Attacker uploaded a malicious package with a similar name as the original.&amp;lt;br&amp;gt;
SLSA does not directly address this threat, but provenance linking back to source control can enable and enhance other solutions.&amp;lt;br&amp;gt;
What is SLSA In its current state, SLSA is a set of incrementally adoptable security guidelines being established by industry consensus. In its final form, SLSA will differ from a list of best practices in its enforceability: it will support the automatic creation of auditable metadata that can be fed into policy engines to give &amp;amp;#34;SLSA certification&amp;amp;#34; to a particular package or build platform. SLSA is designed to be incremental and actionable, and to provide security benefits at every step. Once an artifact qualifies at the highest level, consumers can have confidence that it has not been tampered with and can be securely traced back to source—something that is difficult, if not impossible, to do with most software today. SLSA consists of four levels, with SLSA 4 representing the ideal end state. The lower levels represent incremental milestones with corresponding incremental integrity guarantees. The requirements are currently defined as follows.&amp;lt;br&amp;gt;
SLSA 1 requires that the build process be fully scripted/automated and generate provenance. Provenance is metadata about how an artifact was built, including the build process, top-level source, and dependencies. Knowing the provenance allows software consumers to make risk-based security decisions. Though provenance at SLSA 1 does not protect against tampering, it offers a basic level of code source identification and may aid in vulnerability management. SLSA 2 requires using version control and a hosted build service that generates authenticated provenance. These additional requirements give the consumer greater confidence in the origin of the software. At this level, the provenance prevents tampering to the extent that the build service is trusted. SLSA 2 also provides an easy upgrade path to SLSA 3. SLSA 3 further requires that the source and build platforms meet specific standards to guarantee the auditability of the source and the integrity of the provenance, respectively. We envision an accreditation process whereby auditors certify that platforms meet the requirements, which consumers can then rely on. SLSA 3 provides much stronger protections against tampering than earlier levels by preventing specific classes of threats, such as cross-build contamination. SLSA 4 is currently the highest level, requiring two-person review of all changes and a hermetic, reproducible build process. Two-person review is an industry best practice for catching mistakes and deterring bad behavior. Hermetic builds guarantee that the provenance’s list of dependencies is complete. Reproducible builds, though not strictly required, provide many auditability and reliability benefits. Overall, SLSA 4 gives the consumer a high degree of confidence that the software has not been tampered with. More details on these proposed levels can be found in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;GitHub repository&amp;lt;/a&amp;gt; , including the corresponding &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Source&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Build/Provenance&amp;lt;/a&amp;gt; requirements. We are open to feedback and suggestions for changes on these requirements.&amp;lt;br&amp;gt;
Proof of Concept Today, we are releasing a proof of concept for SLSA 1 provenance generator ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;repo&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;marketplace&amp;lt;/a&amp;gt; ). This will allow a user to create and upload provenance alongside their build artifacts, thereby achieving SLSA 1. To use it, add the following snippet to your workflow:&amp;lt;br&amp;gt;
- name : Generate provenance&amp;lt;br&amp;gt;
uses : slsa - framework / github - actions - demo@v0 . 1&amp;lt;br&amp;gt;
with :&amp;lt;br&amp;gt;
artifact_path : &amp;amp;lt; path - to - artifact/directory &amp;amp;gt;&amp;lt;br&amp;gt;
Going forward, we plan to work with popular source, build, and packaging platforms to make it as easy as possible to reach higher levels of SLSA. These plans include generating provenance automatically in build systems, propagating provenance natively in package repositories, and adding security features across the major platforms. Our long-term goal is to raise the security bar across the industry so that the default expectation is higher-level SLSA security standards, with minimal effort on the part of software producers.&amp;lt;br&amp;gt;
Summary SLSA is a practical framework for end-to-end software supply chain integrity, based on a model proven to work at scale in one of the world’s largest software engineering organizations. Achieving the highest level of SLSA for most projects may be difficult, but incremental improvements recognized by lower SLSA levels will already go a long way toward improving the security of the open source ecosystem. We look forward to working with the community on refining the levels as we begin adopting SLSA for our own open source projects. If you are a project maintainer and interested in trying to adopt and provide feedback on SLSA, please &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;reach out&amp;lt;/a&amp;gt; or come join the discussions taking place in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;OpenSSF Digital Identity Attestation Working Group&amp;lt;/a&amp;gt; . Check out the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Know, Prevent, Fix&amp;lt;/a&amp;gt; post to read more about Google’s overall approach to open source security.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Open%20Source&amp;#34;&amp;gt;Open Source&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210616-160621/</link>
      <pubDate>Wed, 16 Jun 2021 16:06:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210616-160621/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/ukrainian-police-nab-six-tied-to-clop-ransomware/&amp;#34;&amp;gt;Ukrainian Police Nab Six Tied to CLOP Ransomware&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Authorities in Ukraine this week charged six people alleged to be part of the CLOP ransomware group , a cybercriminal gang said to have extorted more than half a billion dollars from victims. Some of CLOP’s victims this year alone include Stanford University Medical School , the University of California , and University of Maryland .&amp;lt;br&amp;gt;
A still shot from a video showing Ukrainian police seizing a Tesla, one of many high-end vehicles seized in this week’s raids on the Clop gang.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.npu.gov.ua/ua/news/kiberzlochini/kiberpolicziya-vikrila-xakerske-ugrupovannya-u-rozpovsyudzhenni-virusu-shifruvalnika-ta-nanesenni-inozemnim-kompaniyam-piv-milyarda-dolariv-zbitkiv/&amp;#34;&amp;gt;a statement&amp;lt;/a&amp;gt; and videos released today, the Ukrainian Cyber Police charged six defendants with various computer crimes linked to the CLOP gang, and conducted 21 searches throughout the Kyiv region.&amp;lt;br&amp;gt;
First debuting in early 2019, CLOP is one of several ransomware groups that hack into organizations, launch ransomware that encrypts files and servers, and then demand an extortion payment in return for a digital key needed to unlock access.&amp;lt;br&amp;gt;
&amp;amp;lt;span data-mce-type=&amp;amp;#34;bookmark&amp;amp;#34; style=&amp;amp;#34;display: inline-block; width: 0px; overflow: hidden; line-height: 0;&amp;amp;#34; class=&amp;amp;#34;mce_SELRES_start&amp;amp;#34;&amp;amp;gt;﻿&amp;amp;lt;/span&amp;amp;gt;&amp;lt;br&amp;gt;
/&amp;lt;br&amp;gt;
CLOP has been especially busy over the past six months exploiting four different zero-day vulnerabilities in File Transfer Appliance (FTA), a file sharing product made by California-based &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.accellion.com/company/security-updates/mandiant-issues-final-report-regarding-accellion-fta-attack/&amp;#34;&amp;gt;Accellion&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
The CLOP gang seized on those flaws &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.recordedfuture.com/dewmode-accellion-supply-chain-impact/&amp;#34;&amp;gt;to deploy ransomware to a significant number of Accellion’s FTA customers&amp;lt;/a&amp;gt; , including U.S. grocery chain Krogers , the law firm Jones Day , security firm Qualys , and the Singaporean telecom giant Singtel .&amp;lt;br&amp;gt;
Last year, CLOP adopted the practice of attempting to extract a second ransom demand from victims in exchange for a promise not to publish or sell any stolen data. Terabytes of documents and files stolen from victim organizations that have not paid a data ransom are now available for download from CLOP’s deep web site, including Stanford, UCLA and the University of Maryland.&amp;lt;br&amp;gt;
CLOP’s victim shaming blog on the deep web.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-142142/</link>
      <pubDate>Wed, 16 Jun 2021 14:21:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-142142/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132617_2022-porsche-911-gt3-touring-price-specs-review-photos-info&amp;#34;&amp;gt;2022 Porsche 911 GT3 Touring brings the go without the show&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-141805/</link>
      <pubDate>Wed, 16 Jun 2021 14:18:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-141805/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/putin-sees-a-lot-of-issues-as-summit-with-biden-begins-idUSKCN2DR2M0&amp;#34;&amp;gt;Putin sees &amp;#39;a lot of issues&amp;#39; as summit with Biden begins&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
With deep disagreements likely and expectations of solving them low, U.S. President Joe Biden and Russian President Vladimir Putin sat down in a lakeside Geneva villa on Wednesday for their first summit since Biden took office.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-122116/</link>
      <pubDate>Wed, 16 Jun 2021 12:21:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-122116/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124655_2021-audi-rs-6-avant-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Audi RS 6 Avant blends massive performance and mass appeal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-121732/</link>
      <pubDate>Wed, 16 Jun 2021 12:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-121732/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/wide-gulf-slim-hopes-as-putin-and-biden-arrive-for-summit-idUSKCN2DR2M0&amp;#34;&amp;gt;Wide gulf, slim hopes as Putin and Biden arrive for summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Shaking hands in front of a grand Geneva villa, U.S. President Joe Biden and Russian President Vladimir Putin on Wednesday began their first summit since Biden took office, with deep disagreements likely and expectations of solving them low.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-attack/palestinian-woman-shot-after-attacking-israeli-troops-army-idUSKCN2DS119&amp;#34;&amp;gt;Palestinian woman shot after attacking Israeli troops: army&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-india-twitter/india-slams-twitter-for-not-complying-with-new-it-rules-idUSKCN2DS0L5&amp;#34;&amp;gt;India slams Twitter for not complying with new IT rules&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-102144/</link>
      <pubDate>Wed, 16 Jun 2021 10:21:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210616-102144/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132290_redesigned-2022-toyota-tundra-coming-soon-with-new-iforce-max-powertrain&amp;#34;&amp;gt;Redesigned 2022 Toyota Tundra coming soon with new iForce Max powertrain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-081742/</link>
      <pubDate>Wed, 16 Jun 2021 08:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-081742/</guid>
      <description>&amp;lt;p&amp;gt;U.S. President Joe Biden and Russian President Vladimir Putin square up on Wednesday for their first meeting since Biden took office with deep disagreements likely and expectations low for any breakthroughs.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/sydney-records-first-local-covid-19-case-in-more-than-a-month-idUSKCN2DS08N&amp;#34;&amp;gt;Sydney records first local COVID-19 case in more than a month&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-china-vaccinations/china-ramps-up-vaccinations-but-uneven-rollout-leaves-borders-closed-idUSKCN2DS0BL&amp;#34;&amp;gt;China ramps up vaccinations, but uneven rollout leaves borders closed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-061718/</link>
      <pubDate>Wed, 16 Jun 2021 06:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-061718/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-southkorea-citizenship-china/proposed-changes-to-s-korea-citizenship-law-face-anti-china-headwinds-idUSKCN2DS09F&amp;#34;&amp;gt;Proposed changes to S.Korea citizenship law face anti-China headwinds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210616-041907/</link>
      <pubDate>Wed, 16 Jun 2021 04:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210616-041907/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2019/05/14/lightweight-efficiently-sampleable-enumerations-in-haskell/&amp;#34;&amp;gt;Lightweight, efficiently sampleable enumerations in Haskell&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-041654/</link>
      <pubDate>Wed, 16 Jun 2021 04:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-041654/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australias-melbourne-to-allow-residents-to-leave-city-despite-stubborn-virus-outbreak-idUSKCN2DS08N&amp;#34;&amp;gt;Australia&amp;#39;s Melbourne to allow residents to leave city, despite stubborn virus outbreak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-001750/</link>
      <pubDate>Wed, 16 Jun 2021 00:17:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210616-001750/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/wide-disagreements-low-expectations-as-biden-putin-meet-idUSKCN2DR2M0&amp;#34;&amp;gt;Wide disagreements, low expectations as Biden, Putin meet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden and Russian President Vladimir Putin face off on Wednesday in their first meeting since Biden took office with wide disagreements likely and expectations low for any breakthroughs.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-afghanistan-visas/u-s-speeds-visas-for-vulnerable-afghans-as-pullout-looms-but-congress-wants-more-idUSKCN2DR2KG&amp;#34;&amp;gt;U.S. speeds visas for vulnerable Afghans as pullout looms, but Congress wants more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-221730/</link>
      <pubDate>Tue, 15 Jun 2021 22:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-221730/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians/israeli-nationalists-march-in-east-jerusalem-raising-tensions-with-palestinians-idUSKCN2DQ255&amp;#34;&amp;gt;Israeli nationalists march in East Jerusalem, raising tensions with Palestinians&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/castillo-ahead-in-peru-presidential-vote-as-election-tally-finishes-idUSKCN2DR2DX&amp;#34;&amp;gt;Castillo ahead in Peru presidential vote as election tally finishes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210615-221649/</link>
      <pubDate>Tue, 15 Jun 2021 22:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210615-221649/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/15/technology/lina-khan-ftc.html&amp;#34;&amp;gt;Biden Names Lina Khan, a Big-Tech Critic, as F.T.C. Chair Ms. Khan, who first attracted notice as a critic of Amazon, was confirmed by the Senate as a commissioner on the agency on Tuesday. By David McCabe and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ramblings from Jessie: Home</title>
      <link>https://www.whatsupup.com/blog/conservatorship/reemphasize/20210615-220943/</link>
      <pubDate>Tue, 15 Jun 2021 22:09:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/conservatorship/reemphasize/20210615-220943/</guid>
      <description>A New Era for Mechanical CAD&amp;lt;br&amp;gt;
Time to move forward from decades-old design.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-201109/</link>
      <pubDate>Tue, 15 Jun 2021 20:11:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-201109/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/KLPTDRn0TJ&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/KLPTDRn0TJ&amp;#34;&amp;gt;https://t.co/KLPTDRn0TJ&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Turner Novak &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/TurnerNovak&amp;#34;&amp;gt;@TurnerNovak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-200803/</link>
      <pubDate>Tue, 15 Jun 2021 20:08:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-200803/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-modern-on-prem-software-business/&amp;#34;&amp;gt;Building a modern, on-prem software business How we decided to build both a cloud and on-prem option for Retool, the challenges, and why it&amp;#39;s becoming more common to offer both.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-182040/</link>
      <pubDate>Tue, 15 Jun 2021 18:20:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-182040/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1113484_2022-maserati-grecale-spy-shots&amp;#34;&amp;gt;2022 Maserati Grecale spy shots: Stelvio-based crossover coming soon&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-181749/</link>
      <pubDate>Tue, 15 Jun 2021 18:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-181749/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-snapshot/biden-and-putin-summit-where-they-disagree-and-where-they-might-compromise-idUSKCN2DR18J&amp;#34;&amp;gt;Biden and Putin summit: Where they disagree and where they might compromise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GENEVA/MOSCOW (Reuters) -Don&amp;amp;#39;t expect a major breakthrough at a summit on Wednesday between U.S. President Joe Biden and his Russian counterpart Vladimir Putin, a U.S. official said on Tuesday, given relations between Washington and Moscow are their most strained in years.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-somalia-security/at-least-15-killed-in-somalia-suicide-bombing-claimed-by-militants-idUSKCN2DR0Y6&amp;#34;&amp;gt;At least 15 killed in Somalia suicide bombing claimed by militants&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-181137/</link>
      <pubDate>Tue, 15 Jun 2021 18:11:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-181137/</guid>
      <description>&amp;lt;p&amp;gt;a16z to change name to a15z, announces &amp;amp;quot;the countdown has begun&amp;amp;quot;&amp;lt;br&amp;gt;
a16z &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/a16z&amp;#34;&amp;gt;@a16z&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Introducing Future.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;A new site from a16z. By and for the people building the future. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/UkaC69Af8g&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/UkaC69Af8g&amp;#34;&amp;gt;https://t.co/UkaC69Af8g&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-180804/</link>
      <pubDate>Tue, 15 Jun 2021 18:08:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-180804/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-modern-on-prem-software-business/&amp;#34;&amp;gt;Building a modern, on-prem software business How we built a&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-161733/</link>
      <pubDate>Tue, 15 Jun 2021 16:17:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-161733/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians/israeli-nationalists-march-in-east-jerusalem-under-heavy-police-presence-idUSKCN2DQ255&amp;#34;&amp;gt;Israeli nationalists march in East Jerusalem under heavy police presence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210615-160544/</link>
      <pubDate>Tue, 15 Jun 2021 16:05:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210615-160544/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-does-one-get-hired-by-a-top-cybercrime-gang/&amp;#34;&amp;gt;How Does One Get Hired by a Top Cybercrime Gang?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot , a malware-as-a-service platform responsible for infecting millions of computers and seeding many of those systems with ransomware.&amp;lt;br&amp;gt;
Just how did a self-employed web site designer and mother of two come to work for one of the world’s most rapacious cybercriminal groups and then leave such an obvious trail of clues indicating her involvement with the gang? This post explores answers to those questions, as well as some of the ways Trickbot and other organized cybercrime gangs gradually recruit, groom and trust new programmers.&amp;lt;br&amp;gt;
Alla Witte’s personal website — allawitte[.]nl — circa October 2018.&amp;lt;br&amp;gt;
The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/press-release/file/1401766/download&amp;#34;&amp;gt;indictment released by the DOJ&amp;lt;/a&amp;gt; (PDF) is heavily redacted, and only one of the defendants is named: Alla “Max” Witte , a 55-year-old Latvian national who was arrested Feb. 6 in Miami, Fla.&amp;lt;br&amp;gt;
The DOJ alleges Witte was responsible for “overseeing the creation of code related to the monitoring and tracking of authorized users of the Trickbot malware, the control and deployment of ransomware, obtaining payments from ransomware victims, and developing tools and protocols for the storage of credentials stolen and exfiltrated from victims infected by Trickbot.”&amp;lt;br&amp;gt;
The indictment also says Witte provided code to the Trickbot Group for a web panel used to access victim data stored in a database. According to the government, that database contained a large number of credit card numbers and stolen credentials from the Trickbot botnet, as well as information about infected machines available as bots.&amp;lt;br&amp;gt;
“Witte provided code to this repository that showed an infected computer or ‘bot’ status in different colors based on the colors of a traffic light and allowed other Trickbot Group members to know when their co-conspirators were working on a particular infected machine,” the indictment alleges.&amp;lt;br&amp;gt;
While any law enforcement action against a crime group that has targeted hospitals, schools, public utilities and governments is good news, Witte’s indictment and arrest were probably inevitable: It is hard to think of an accused cybercriminal who has made more stunningly poor and rookie operational security mistakes than this Latvian senior citizen.&amp;lt;br&amp;gt;
For starters, it appears at one point in 2020 Witte actually &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/cybsecbot/status/1401588458666270722&amp;#34;&amp;gt;hosted Trickbot malware on a vanity website registered in her name&amp;lt;/a&amp;gt; — &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://web.archive.org/web/20170914053226/http://allawitte.nl/&amp;#34;&amp;gt;allawitte[.]nl&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
While it is generally a bad idea for cybercriminals to mix their personal life with work, Witte’s social media accounts mention a close family member (perhaps her son or husband) had the first name “Max,” which allegedly was her hacker handle.&amp;lt;br&amp;gt;
Unlike many accused cybercriminals who hail from Russia or former Soviet countries, Witte did not feel obligated to avoid traveling to areas where she might be within reach of U.S. law enforcement agencies. According to her indictment, Witte was living in the South American nation of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Suriname&amp;#34;&amp;gt;Suriname&amp;lt;/a&amp;gt; and she was arrested in Miami while flying from Suriname. It is not clear where her intended destination was.&amp;lt;br&amp;gt;
A Google-translated post Witte made to her Vkontakte page, five years before allegedly joining the Trickbot group.&amp;lt;br&amp;gt;
Alex Holden , founder of the cybersecurity intelligence firm Hold Security, said Witte’s greatest lapse in judgment came around Christmas time in 2019, when she infected one of her own computers with the Trickbot malware — allowing it to steal and log her data within the botnet interface.&amp;lt;br&amp;gt;
“On top of the password re-use, the data shows a great insight into her professional and personal Internet usage,” Holden wrote in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://holdsecurity.com/news/2021/06/trickbot-gang-arrest-story-of-alla-witte/&amp;#34;&amp;gt;a blog post on Witte’s arrest&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“Many in the gang not only knew her gender but her name too,” Holden wrote. “Several group members had AllaWitte folders with data. They refer to Alla almost like they would address their mothers.”&amp;lt;br&amp;gt;
So how did this hacker mom with apparently zero sense of self-preservation come to work for one of the world’s most predatory cybercriminal gangs? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/how-does-one-get-hired-by-a-top-cybercrime-gang/#more-55911&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-142016/</link>
      <pubDate>Tue, 15 Jun 2021 14:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-142016/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132599_2023-mercedes-benz-c-class-cabriolet-spy-shots&amp;#34;&amp;gt;2023 Mercedes-Benz C-Class Cabriolet spy shots: Redesigned convertible on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-141714/</link>
      <pubDate>Tue, 15 Jun 2021 14:17:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-141714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-china/taiwan-reports-largest-incursion-yet-by-chinese-air-force-idUSKCN2DR12V&amp;#34;&amp;gt;Taiwan reports largest incursion yet by Chinese air force&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Twenty-eight Chinese air force aircraft, including fighters and nuclear-capable bombers, entered Taiwan&amp;amp;#39;s air defence identification zone (ADIZ) on Tuesday, the island&amp;amp;#39;s government said, the largest reported incursion to date.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-141115/</link>
      <pubDate>Tue, 15 Jun 2021 14:11:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-141115/</guid>
      <description>Future from a16z&amp;lt;br&amp;gt;
A new site for understanding the future, how tech shapes it, and how we build it.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://future.a16z.com&amp;#34;&amp;gt;Go to Future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-140758/</link>
      <pubDate>Tue, 15 Jun 2021 14:07:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210615-140758/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-modern-on-prem-software-business/&amp;#34;&amp;gt;Building a modern, on-prem software business Retool is a fast way for engineers to build internal tools. Here’s a 4 minute video demo. We started building the product in 2017, and in about a year got to $1M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-121916/</link>
      <pubDate>Tue, 15 Jun 2021 12:19:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-121916/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132592_first-drive-review-2022-porsche-macan-prototype-builds-a-fun-bridge-to-an-electric-future&amp;#34;&amp;gt;First drive review: 2022 Porsche Macan prototype builds a fun bridge to an electric future&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-101934/</link>
      <pubDate>Tue, 15 Jun 2021 10:19:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210615-101934/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132598_2021-ford-bronco-production-is-underway&amp;#34;&amp;gt;2021 Ford Bronco production is underway&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132460_watch-jay-leno-set-9-24s-quarter-mile-world-record-in-the-tesla-model-s-plaid&amp;#34;&amp;gt;Watch Jay Leno set 9.24s quarter-mile world record in the Tesla Model S Plaid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-101623/</link>
      <pubDate>Tue, 15 Jun 2021 10:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-101623/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-china/china-urges-nato-to-stop-exaggerating-china-threat-theory-idUSKCN2DR0C0&amp;#34;&amp;gt;China urges NATO to stop exaggerating &amp;#39;China threat theory&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIJING (Reuters) -China&amp;amp;#39;s mission to the European Union urged NATO on Tuesday to stop exaggerating the &amp;amp;#34;China threat theory&amp;amp;#34; after the group&amp;amp;#39;s leaders warned that the country presented &amp;amp;#34;systemic challenges&amp;amp;#34;.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-081637/</link>
      <pubDate>Tue, 15 Jun 2021 08:16:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-081637/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-election/khamenei-set-to-tighten-grip-in-iran-vote-as-frustrations-grow-idUSKCN2DR0GB&amp;#34;&amp;gt;Khamenei set to tighten grip in Iran vote as frustrations grow&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Iranians elect a new president on Friday in a race dominated by hardline candidates close to Supreme Leader Ayatollah Ali Khamenei, with popular anger over economic hardship and curbs on freedoms set to keep many pro-reform Iranians at home.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-india-variant-insi/health-experts-say-india-missed-early-alarm-let-deadly-coronavirus-variant-spread-idUSKCN2DR0PP&amp;#34;&amp;gt;Health experts say India missed early alarm, let deadly coronavirus variant spread&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ivorycoast-politics/ivory-coast-hopes-to-end-a-decade-of-rancour-with-gbagbos-return-idUSKCN2DR0PL&amp;#34;&amp;gt;Ivory Coast hopes to end a decade of rancour with Gbagbo&amp;amp;#39;s return&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-081117/</link>
      <pubDate>Tue, 15 Jun 2021 08:11:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-081117/</guid>
      <description>Chuck. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/l98m7qLCpm&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/l98m7qLCpm&amp;#34;&amp;gt;https://t.co/l98m7qLCpm&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-061645/</link>
      <pubDate>Tue, 15 Jun 2021 06:16:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-061645/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-el-salvador-migration-usaid/usaid-to-grant-115-million-in-aid-to-el-salvador-to-stem-migration-idUSKCN2DR01V&amp;#34;&amp;gt;USAID to grant $115 million in aid to El Salvador to stem migration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit-agreements/kremlin-says-deals-at-putin-biden-summit-unlikely-but-talks-useful-idUSKCN2DR0G3&amp;#34;&amp;gt;Kremlin says deals at Putin-Biden summit unlikely but talks useful&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Chris Zacharias</title>
      <link>https://www.whatsupup.com/blog/gigabit/polenta/20210615-041935/</link>
      <pubDate>Tue, 15 Jun 2021 04:19:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gigabit/polenta/20210615-041935/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com#menu&amp;#34;&amp;gt;Menu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com&amp;#34;&amp;gt;Chris Zacharias is writing on the Svbtle network.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chriszacharias.com&amp;#34;&amp;gt;chriszacharias.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/zacman85&amp;#34;&amp;gt;@zacman85&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/feed&amp;#34;&amp;gt;rss feed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com/about&amp;#34;&amp;gt;about svbtle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com/signup&amp;#34;&amp;gt;sign up&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com&amp;#34;&amp;gt;Chris Zacharias&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Founder of imgix. YCombinator alum. Ex-YouTuber. Studied New Media at RIT.&amp;lt;br&amp;gt;
Read this first&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;imgix: A New Step Forward&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;Nowadays, you can take out your phone, open a user-friendly app, capture a shockingly high-quality picture, make any corrections you need, and then send that picture to your grandma, who can see it seconds later. Consumer photography is a largely solved problem. However, the same innovations that have benefited consumers - access to high quality cameras, ease of use, rapid distribution of photos - have created a multitude of complexities for businesses who are now forced to deal with both a more discerning user and a more complicated visual landscape. Delivering the highest quality, lowest latency image to your users is getting progressively harder over time as more and more factors play a role in what delivering the “perfect” image means. Nobody should have to become an imaging scientist to achieve the most with their images. We built imgix to solve this. By providing a simple URL API...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imgix-a-new-step-forward&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
May  1, 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/a-conspiracy-to-kill-ie6&amp;#34;&amp;gt;A Conspiracy To Kill IE6&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/a-conspiracy-to-kill-ie6&amp;#34;&amp;gt;The bittersweet consequence of YouTube’s incredible growth is that so many stories will be lost underneath all of the layers of new paint. This is why I wanted to tell the story of how, ten years ago, a small team of web developers conspired to kill IE6 from inside YouTube and got away with it. I do not recall the exact triggering event that led to our web development team laying out plans to kill IE6 over lunch in the YouTube cafeteria. Perhaps it was the time I pushed out a CSS stylesheet that included an attribute selector on a semi-supported HTML element. Any reasonable web developer would expect this to be ignored by browsers not up to the task. This was not the case with older flavors of IE. Under very specific conditions, an attribute selector on an unsupported HTML element in IE would create an internal recursion that would at best, cause the browser to crash and at worst...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Feb  8, 2016&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imaging-and-the-internet&amp;#34;&amp;gt;The Imaging Chain and the Internet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/imaging-and-the-internet&amp;#34;&amp;gt;Consider what taking a simple photograph meant 25 years ago. You had film cameras, negatives, dark rooms, emulsions, and paper. It would take days to produce a picture you could show to someone. Now consider what taking a photograph means today. With a smartphone that fits in our pocket, we can capture a photo, edit it, view it, and show it to anyone, all in as a little as a few seconds. These fantastic devices are simultaneously capable of capturing high resolution visuals, displaying them, and immediately distributing them to a billion other devices similarly capable of the exact same things. It is now actually perceivable that a photo you take one moment could be seen by over half of the entire human population a moment later. This power in visual expression has never existed before. We can create and express visual media so incredibly fast that it is causing new behavioral patterns...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Aug 26, 2015&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/multiplane-camera&amp;#34;&amp;gt;The Multiplane Camera&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/multiplane-camera&amp;#34;&amp;gt;During a recent trip to the Disney Museum in San Francisco, I became immediately fascinated by the multiplane camera that was on display there. The gigantic machine represents so much of what I find inspiring in graphics and technology. It is fun to get lost in thought, imagining what the modern equivalent of the multiplane camera might be and how to foster the intersection of art and technology from which the multiplane camera emerged. The multiplane camera was invented in 1933 by famous Disney animator/director Ub Iwerks. It worked by enabling animators to position their layers of acetate animation cels at varying distances and offsets in a vertical column. They could then shoot a camera downward to compose the cels into a single frame. While animators had been using acetate celluloid frames composited over painted mattes for decades prior, the technical effects that the multiplane...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Dec 21, 2012&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/page-weight-matters&amp;#34;&amp;gt;Page Weight Matters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/page-weight-matters&amp;#34;&amp;gt;Three years ago, while I was a web developer at YouTube, one of the senior engineers began a rant about the page weight of the video watch page being far too large. The page had ballooned to as high as 1.2MB and dozens of requests. This engineer openly vented that “if they can write an entire Quake clone in under 100KB, we have no excuse for this!” Given that I agreed with him and I was excited to find a new project, I decided to champion the cause of getting the YouTube watch page to weigh in under 100KB. On the shuttle home from San Bruno that night, I coded up a prototype. I decided to limit the functionality to just a basic masthead, the video player, five related videos, a sharing button, a flagging tool, and ten comments loaded in via AJAX. I code-named the project “Feather”. Even with such a limited set of features, the page was weighing in at 250KB. I dug into the code and...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;Investors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/investors&amp;#34;&amp;gt;When I was going through YCombinator in the summer of 2011, I felt like I was the only person in the entire class who knew nothing about taking investment. I remember distinctly when Jessica Livingston announced the $150K we would be getting from SV Angel and Start Fund. When she told us the terms, the room erupted in shouting and applause. I sat there Googling nervously, trying to understand what had just been said and wondering if I really belonged in YC at all. Being surrounded by such a select group of founders, each in varying stages of building their companies, you pick up the knowledge you need very quickly. This is the most valuable part of the 3-month YCombinator session. One piece of knowledge you learn very early on is that investors tend to have a herd mentality. What I would later realize through observation was that founders tend to as well. I remember getting the...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/cruise-ships&amp;#34;&amp;gt;Cruise Ships&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.chriszacharias.com/cruise-ships&amp;#34;&amp;gt;In July of 2010, I made the decision to leave YouTube. The first thoughts I had were “How am I going to explain this to anyone? How will I tell mom?” To my family, I had the greatest job in the world and the amount of money I was making was unfathomable. They were certainly not wrong in thinking this. Google is absolutely the best place in the world to work and they do pay very well. It certainly was not an easy decision on my part. About 4 months before, I was backpacking through Europe, stopping off in major cities to present our latest HTML5 work at the local Google offices. It was my first time really exploring a different part of the world. I met fascinating people and experienced many random adventures. I was trapped in Stockholm for 9 days due to the Icelandic ash cloud. I was a successful stowaway on a train from Copenhagen to Hamburg. I had a girlfriend break up with me during...&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com/terms&amp;#34;&amp;gt;Terms&amp;lt;/a&amp;gt; • &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com/privacy&amp;#34;&amp;gt;Privacy&amp;lt;/a&amp;gt; • &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com/promise&amp;#34;&amp;gt;Promise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210615-041857/</link>
      <pubDate>Tue, 15 Jun 2021 04:18:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210615-041857/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2018/02/13/a-work-in-progress-translation-of-joyals-original-paper-on-species/&amp;#34;&amp;gt;A (work in progress) translation of Joyal’s original paper on species&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/04/15/cabal-init/&amp;#34;&amp;gt;cabal init&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-041112/</link>
      <pubDate>Tue, 15 Jun 2021 04:11:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-041112/</guid>
      <description>Please join @bhorowitz and me on @Clubhouse in 15 minutes, 7PM Pacific, for our show &amp;amp;quot;One on One with A &amp;amp;amp; Z&amp;amp;quot; &amp;amp;ndash; special episode on the future of remote work in a post-COVID world!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210615-041017/</link>
      <pubDate>Tue, 15 Jun 2021 04:10:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210615-041017/</guid>
      <description>15 Jun 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-15/bpf-internals.html&amp;#34;&amp;gt;USENIX LISA2021 BPF Internals (eBPF)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-021631/</link>
      <pubDate>Tue, 15 Jun 2021 02:16:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-021631/</guid>
      <description>Peruvians were still waiting on Monday for their next president to be confirmed, more than a week after a polarizing run-off vote, with socialist Pedro Castillo clinging to a narrow lead that would tilt the country firmly to the left.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-usa-borders/u-s-canada-set-to-discuss-lifting-of-border-restrictions-sources-idUSKCN2DR012&amp;#34;&amp;gt;U.S., Canada set to discuss lifting of border restrictions -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210615-021047/</link>
      <pubDate>Tue, 15 Jun 2021 02:10:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210615-021047/</guid>
      <description>Join us live on @Clubhouse, right now, for a discussion on the future of work post-COVID, with @bhorowitz and @stevesi. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/6QFZwtcQzs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/6QFZwtcQzs&amp;#34;&amp;gt;https://t.co/6QFZwtcQzs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/6QFZwtcQzs&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/6QFZwtcQzs&amp;#34;&amp;gt;https://t.co/6QFZwtcQzs&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I&amp;#39;m discussing “One on One with A &amp;amp;amp; Z” with @bhorowitz and a16z. Today, Jun 14 at 7:00 PM PDT on @clubhouse. Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/TDJlMf891Q&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/TDJlMf891Q&amp;#34;&amp;gt;https://t.co/TDJlMf891Q&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210615-001847/</link>
      <pubDate>Tue, 15 Jun 2021 00:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210615-001847/</guid>
      <description>June 14, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/14/Provided-as-is-without-warranty.html&amp;#34;&amp;gt;Provided &amp;amp;quot;as is&amp;amp;quot;, without warranty of any kind&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-001755/</link>
      <pubDate>Tue, 15 Jun 2021 00:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210615-001755/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/a-divided-peru-waits-for-next-president-as-vote-count-nears-completion-idUSKCN2DQ14L&amp;#34;&amp;gt;A divided Peru waits for next president as vote count nears completion&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210615-001609/</link>
      <pubDate>Tue, 15 Jun 2021 00:16:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210615-001609/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2015/12/22/on-juniper-backdoor/&amp;#34;&amp;gt;On the Juniper backdoor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-221956/</link>
      <pubDate>Mon, 14 Jun 2021 22:19:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-221956/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132557_2022-mercedes-benz-amg-gt-53-4-door-coupe-becomes-more-practical-with-seating-for-five&amp;#34;&amp;gt;2022 Mercedes-Benz AMG GT 53 4-Door Coupe becomes more practical with seating for five&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-221653/</link>
      <pubDate>Mon, 14 Jun 2021 22:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-221653/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/nato-adopts-tough-line-on-china-at-bidens-debut-summit-with-alliance-idUSKCN2DQ010&amp;#34;&amp;gt;NATO adopts tough line on China at Biden&amp;#39;s debut summit with alliance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BRUSSELS (Reuters) -NATO leaders warned on Monday that China presents &amp;amp;#34;systemic challenges,&amp;amp;#34; taking a forceful stance towards Beijing in a communique at Joe Biden&amp;amp;#39;s first summit with an alliance that Donald Trump openly disparaged.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians/israeli-nationalists-to-march-in-east-jerusalem-palestinians-plan-day-of-rage-idUSKCN2DQ255&amp;#34;&amp;gt;Israeli nationalists to march in East Jerusalem, Palestinians plan &amp;amp;#39;Day of Rage&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-conflict-un/u-n-readies-for-more-displaced-afghans-after-troop-withdrawal-idUSKCN2DQ26T&amp;#34;&amp;gt;U.N. readies for more displaced Afghans after troop withdrawal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-201723/</link>
      <pubDate>Mon, 14 Jun 2021 20:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-201723/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/new-israeli-government-approves-nationalist-march-in-jerusalem-idUSKCN2DQ0HL&amp;#34;&amp;gt;New Israeli government approves nationalist march in Jerusalem&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israel&amp;amp;#39;s new government on Monday approved a Jewish nationalist march in Jerusalem, a step that risks inflaming tensions with Palestinians hours after veteran leader Benjamin Netanyahu handed over power to Prime Minister Naftali Bennett.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-attack-suspect/canadian-man-accused-of-murdering-muslim-family-members-to-face-terror-charges-idUSKCN2DQ1G3&amp;#34;&amp;gt;Canadian man accused of murdering Muslim family members to face terror charges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-181659/</link>
      <pubDate>Mon, 14 Jun 2021 18:16:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-181659/</guid>
      <description>&amp;lt;p&amp;gt;The U.S. has crossed the milestone of 600,000 dead from COVID-19, even as the country begins to return to normal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DQ1U8&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-ransomware-analysis/analysis-murkiness-of-russias-ransomware-role-complicates-biden-summit-mission-idUSKCN2DQ1UM&amp;#34;&amp;gt;Analysis: Murkiness of Russia&amp;#39;s ransomware role complicates Biden summit mission&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
As U.S. President Joe Biden prepares to confront Russian President Vladimir Putin over ransomware gangs in his country that twice recently targeted critical American infrastructure, his administration is publicly blaming the Russian government for allowing those criminals to profit without prosecution.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/nato-takes-tough-line-on-china-at-first-summit-with-biden-idUSKCN2DQ010&amp;#34;&amp;gt;NATO takes tough line on China at first summit with Biden&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
BRUSSELS (Reuters) -NATO leaders designated China as presenting &amp;amp;#34;systemic challenges&amp;amp;#34; in a summit communique on Monday, taking a forceful stance towards Beijing at Joe Biden&amp;amp;#39;s first summit with an alliance that Donald Trump openly disparaged and ridiculed.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210614-180811/</link>
      <pubDate>Mon, 14 Jun 2021 18:08:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210614-180811/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/pride-month-activities-around-discord-and-the-world-fc0eed930a?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Pride Month Activities Around Discord and The World&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/pride-month-activities-around-discord-and-the-world-fc0eed930a?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Pride Month Activities Around Discord and The World We’ve got the scoop on a ton of amazing community events, a new bot, and some appropriately proud artwork.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-162036/</link>
      <pubDate>Mon, 14 Jun 2021 16:20:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-162036/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132549_things-to-consider-when-displaying-a-classic-car-at-a-local-show&amp;#34;&amp;gt;Things to consider when displaying a classic car at a local show&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10062679_classiccars-com&amp;#34;&amp;gt;ClassicCars.com - Contributor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-161708/</link>
      <pubDate>Mon, 14 Jun 2021 16:17:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-161708/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/nato-designates-china-as-a-systemic-challenge-idUSKCN2DQ010&amp;#34;&amp;gt;NATO designates China as a &amp;#39;systemic&amp;#39; challenge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BRUSSELS (Reuters) -NATO leaders designated China as presenting &amp;amp;#34;systemic challenges&amp;amp;#34; in a summit communique on Monday that marked a forceful stance for the Western military alliance, declared a priority for U.S. President Joe Biden after the Trump years.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210614-160747/</link>
      <pubDate>Mon, 14 Jun 2021 16:07:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210614-160747/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-autocomplete-libraries/&amp;#34;&amp;gt;React autocomplete libraries: Downshift, react-select, and more We’ve researched and compared React autocomplete libraries to suss out the best React autocomplete library, and then created this simple guide to aggregate all the top options in one place.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-142032/</link>
      <pubDate>Mon, 14 Jun 2021 14:20:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-142032/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132583_there-s-a-midnight-purple-r34-nissan-skyline-gt-r-v-spec-for-sale-in-the-us&amp;#34;&amp;gt;There&amp;#39;s a Midnight Purple R34 Nissan Skyline GT-R V-Spec for sale in the US&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-141735/</link>
      <pubDate>Mon, 14 Jun 2021 14:17:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-141735/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/defense-of-europe-is-a-sacred-obligation-biden-tells-nato-idUSKCN2DQ010&amp;#34;&amp;gt;Defense of Europe is a &amp;#39;sacred obligation&amp;#39;, Biden tells NATO&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-afghanistan-nato-qatar-excusive/exclusive-nato-approaches-qatar-to-seek-training-base-for-afghan-forces-after-withdrawal-idUSKCN2DQ17N&amp;#34;&amp;gt;Exclusive: NATO approaches Qatar to seek training base for Afghan forces after withdrawal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/new-israeli-government-faces-tension-with-palestinians-over-jerusalem-idUSKCN2DQ0HL&amp;#34;&amp;gt;New Israeli government faces tension with Palestinians over Jerusalem&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-121706/</link>
      <pubDate>Mon, 14 Jun 2021 12:17:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-121706/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/at-nato-biden-says-defence-of-europe-a-sacred-obligation-idUSKCN2DQ010&amp;#34;&amp;gt;At NATO, Biden says defence of Europe a &amp;#39;sacred obligation&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden told fellow NATO leaders on Monday the defence of Europe, Turkey and Canada was a &amp;amp;#34;sacred obligation&amp;amp;#34; for the United States, a marked shift from his predecessor Donald Trump&amp;amp;#39;s threats to withdraw from the military alliance.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-trauma-helpline/the-trauma-helpline-taking-calls-from-gaza-during-conflict-and-beyond-idUSKCN2DQ0ZR&amp;#34;&amp;gt;The trauma helpline taking calls from Gaza during conflict and beyond&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-101831/</link>
      <pubDate>Mon, 14 Jun 2021 10:18:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-101831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-turkey/no-breakthroughs-expected-from-first-biden-erdogan-meeting-idUSKCN2DQ0M4&amp;#34;&amp;gt;No breakthroughs expected from first Biden-Erdogan meeting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210614-100827/</link>
      <pubDate>Mon, 14 Jun 2021 10:08:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210614-100827/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/self-hosted-retool-plans/&amp;#34;&amp;gt;Introducing a self-hosted option for our Free and Startup plans We’re excited to announce that you can deploy our Free and Startup plan on your own infra, behind your own VPN, and in your own VPC.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-082104/</link>
      <pubDate>Mon, 14 Jun 2021 08:21:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210614-082104/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132581_2023-maserati-granturismo-prototype-hits-the-road&amp;#34;&amp;gt;2023 Maserati GranTurismo prototype hits the road&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-081739/</link>
      <pubDate>Mon, 14 Jun 2021 08:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-081739/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/nato-to-toughen-g7-message-on-china-despite-beijings-cries-of-slander-idUSKCN2DQ010&amp;#34;&amp;gt;NATO to toughen G7 message on China despite Beijing&amp;#39;s cries of &amp;#39;slander&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BRUSSELS (Reuters) -NATO leaders are expected to brand China a security risk to the Western alliance when they meet on Monday, a day after the Group of Seven rich nations issued a statement on human rights in China and Taiwan that Beijing said slandered its reputation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-new-government-begins-netanyahu-era-ends-idUSKCN2DQ0HL&amp;#34;&amp;gt;Israel&amp;amp;#39;s new government begins, Netanyahu era ends&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-061823/</link>
      <pubDate>Mon, 14 Jun 2021 06:18:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210614-061823/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/suu-kyis-trial-set-to-start-in-myanmar-junta-rejects-u-n-rights-chiefs-statement-idUSKCN2DQ05L&amp;#34;&amp;gt;Suu Kyi&amp;#39;s trial set to start in Myanmar, junta rejects U.N. rights chief&amp;#39;s statement&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The trial of Myanmar&amp;amp;#39;s ousted leader Aung San Suu Kyi was set to start on Monday, as the junta that overthrew her elected government rejected criticism by the U.N. High Commissioner for Human Rights over its use of deadly force against protesters.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-newzealand-shooting-ardern/ardern-says-nz-mosque-attack-film-should-focus-on-muslim-community-not-her-idUSKCN2DQ08V&amp;#34;&amp;gt;Ardern says NZ mosque attack film should focus on Muslim community not her&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit/nato-welcomes-biden-in-pivotal-post-trump-summit-idUSKCN2DQ010&amp;#34;&amp;gt;NATO welcomes Biden in &amp;amp;#39;pivotal&amp;amp;#39; post-Trump summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210614-061644/</link>
      <pubDate>Mon, 14 Jun 2021 06:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210614-061644/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2013/04/11/zerocoin-making-bitcoin-anonymous/&amp;#34;&amp;gt;Zerocoin: making Bitcoin anonymous&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-221814/</link>
      <pubDate>Sun, 13 Jun 2021 22:18:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-221814/</guid>
      <description>JERUSALEM (Reuters) -Benjamin Netanyahu&amp;#39;s record 12-year run as Israel&amp;#39;s prime minister ended on Sunday with parliament approving a new &amp;amp;quot;government of change&amp;amp;quot; led by nationalist Naftali Bennett, an improbable scenario few Israelis once could have imagined.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-201825/</link>
      <pubDate>Sun, 13 Jun 2021 20:18:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-201825/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-out-bennett-in-as-israel-marks-end-of-an-era-idUSKCN2DP01I&amp;#34;&amp;gt;Netanyahu out, Bennett in as Israel marks end of an era&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Benjamin Netanyahu&amp;amp;#39;s record 12-year run as Israel&amp;amp;#39;s prime minister ended on Sunday with parliament approving a new &amp;amp;#34;government of change&amp;amp;#34; led by nationalist Naftali Bennett, an improbable scenario few Israelis could have imagined.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-usa/white-house-says-nato-will-launch-ambitious-security-initiatives-idUSKCN2DP0NH&amp;#34;&amp;gt;White House says NATO will launch &amp;amp;#39;ambitious&amp;amp;#39; security initiatives&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics-reaction/hope-anger-and-defiance-greet-birth-of-israels-new-government-idUSKCN2DP0LM&amp;#34;&amp;gt;Hope, anger and defiance greet birth of Israel&amp;amp;#39;s new government&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210613-182027/</link>
      <pubDate>Sun, 13 Jun 2021 18:20:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210613-182027/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2011/11/12/generating-plane-tilings-with-diagrams/&amp;#34;&amp;gt;Generating plane tilings with diagrams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-181818/</link>
      <pubDate>Sun, 13 Jun 2021 18:18:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-181818/</guid>
      <description>&amp;lt;p&amp;gt;New Israeli government wins majority vote, ending Benjamin Netanyahu&amp;#39;s 12-year tenure &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DP01I&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/new-israeli-government-wins-majority-vote-ending-netanyahu-tenure-idUSKCN2DP01I&amp;#34;&amp;gt;New Israeli government wins majority vote, ending Netanyahu tenure&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Benjamin Netanyahu&amp;amp;#39;s 12-year run as Israel&amp;amp;#39;s prime minister ended on Sunday with parliament approving a new &amp;amp;#34;government of change&amp;amp;#34; led by nationalist Naftali Bennett.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics-explainer/explainer-whos-who-in-israels-new-patchwork-coalition-government-idUSKCN2DP0EX&amp;#34;&amp;gt;Explainer-Who&amp;amp;#39;s who in Israel&amp;amp;#39;s new patchwork coalition government&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china-caution/g7-chides-china-on-rights-demands-covid-origins-investigation-idUSKCN2DP036&amp;#34;&amp;gt;G7 chides China on rights, demands COVID origins investigation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210613-122121/</link>
      <pubDate>Sun, 13 Jun 2021 12:21:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210613-122121/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132554_turn-back-time-with-this-retro-2021-ford-f-150&amp;#34;&amp;gt;Turn back time with this retro 2021 Ford F-150&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-121812/</link>
      <pubDate>Sun, 13 Jun 2021 12:18:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-121812/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-knesset-set-to-vote-on-new-government-ending-netanyahus-rule-idUSKCN2DP01I&amp;#34;&amp;gt;Israel&amp;#39;s Knesset set to vote on new government, ending Netanyahu&amp;#39;s rule&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israeli Prime Minister Benjamin Netanyahu&amp;amp;#39;s record 12-year hold on power was set to end on Sunday when parliament votes on a new government, ushering in an administration that has pledged to heal a nation bitterly divided over his departure.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china-caution/g7-calls-out-china-over-xinjiang-hong-kong-and-taiwan-draft-communique-idUSKCN2DP036&amp;#34;&amp;gt;G7 calls out China over Xinjiang, Hong Kong and Taiwan - draft communique&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-climate/g7-leaders-agree-increased-climate-finance-details-missing-idUSKCN2DO0M1&amp;#34;&amp;gt;G7 leaders agree increased climate finance, details missing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-101748/</link>
      <pubDate>Sun, 13 Jun 2021 10:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-101748/</guid>
      <description>&amp;lt;p&amp;gt;CARBIS BAY, England (Reuters) -China on Sunday pointedly cautioned Group of Seven leaders that the days when &amp;amp;quot;small&amp;amp;quot; groups of countries decided the fate of the world was long gone, hitting back at the richest democracies as they sought to act in concert to counter Beijing&amp;#39;s might.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-communique/g7-agrees-1-billion-covid-vaccine-donation-communique-idUSKCN2DP04G&amp;#34;&amp;gt;G7 agrees 1 billion COVID vaccine donation - communique&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-putin/putin-says-he-wants-biden-summit-to-help-establish-dialogue-ifax-idUSKCN2DP050&amp;#34;&amp;gt;Putin says he wants Biden summit to help establish dialogue - Ifax&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-061816/</link>
      <pubDate>Sun, 13 Jun 2021 06:18:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-061816/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-climate-analysis/analysis-with-trump-gone-nato-wages-war-on-climate-threat-idUSKCN2DP03E&amp;#34;&amp;gt;Analysis-With Trump gone, NATO wages war on climate threat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china-caution/china-cautions-g7-small-groups-dont-rule-the-world-idUSKCN2DP036&amp;#34;&amp;gt;China cautions G7: &amp;amp;#39;small&amp;amp;#39; groups don&amp;amp;#39;t rule the world&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-041839/</link>
      <pubDate>Sun, 13 Jun 2021 04:18:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-041839/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-knesset-to-vote-on-new-government-end-netanyahus-record-reign-idUSKCN2DP01I&amp;#34;&amp;gt;Israel&amp;#39;s Knesset to vote on new government, end Netanyahu&amp;#39;s record reign&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-001845/</link>
      <pubDate>Sun, 13 Jun 2021 00:18:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210613-001845/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-blinken/u-s-south-korea-reaffirm-cooperation-toward-denuclearization-of-korean-peninsula-idUSKCN2DO0N4&amp;#34;&amp;gt;U.S., South Korea reaffirm cooperation toward denuclearization of Korean Peninsula&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210613-001708/</link>
      <pubDate>Sun, 13 Jun 2021 00:17:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210613-001708/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2013/06/26/can-apple-read-your-imessages/&amp;#34;&amp;gt;Can Apple read your iMessages?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-221738/</link>
      <pubDate>Sat, 12 Jun 2021 22:17:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-221738/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china/g7-rivals-china-with-grand-infrastructure-plan-idUSKCN2DO048&amp;#34;&amp;gt;G7 rivals China with grand infrastructure plan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Group of Seven richest democracies sought on Saturday to counter China&amp;amp;#39;s growing influence by offering developing nations an infrastructure plan that could rival President Xi Jinping&amp;amp;#39;s multi-trillion-dollar Belt and Road initiative.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-climate/g7-leaders-commit-to-increasing-climate-finance-contributions-idUSKCN2DO0M1&amp;#34;&amp;gt;G7 leaders commit to increasing climate finance contributions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210612-221128/</link>
      <pubDate>Sat, 12 Jun 2021 22:11:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210612-221128/</guid>
      <description>Ben Horowitz @bhorowitz and I will be back with our Clubhouse @joinClubhouse show, &amp;amp;quot;One On One with A &amp;amp;amp; Z&amp;amp;quot;, Monday, June 14 at 7:00 PM PST. SPECIAL TOPIC the end of COVID &amp;amp;amp; the future of work. Please suggest great questions for us to answer by replying to this tweet!&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-201734/</link>
      <pubDate>Sat, 12 Jun 2021 20:17:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-201734/</guid>
      <description>&amp;lt;p&amp;gt;CARBIS BAY, England (Reuters) -The Group of Seven richest democracies sought on Saturday to counter China&amp;#39;s growing influence by offering developing nations an infrastructure plan that could rival President Xi Jinping&amp;#39;s multi-trillion-dollar Belt and Road initiative.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-trump-talks/g7-source-praises-biden-after-complete-chaos-of-trump-idUSKCN2DO0K7&amp;#34;&amp;gt;G7 source praises Biden after &amp;#39;complete chaos&amp;#39; of Trump&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-fujimori-pushes-again-to-annul-votes-as-castillo-nears-runoff-win-idUSKCN2DO0DE&amp;#34;&amp;gt;Peru&amp;amp;#39;s Fujimori pushes again to annul votes as Castillo nears runoff win&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-181731/</link>
      <pubDate>Sat, 12 Jun 2021 18:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-181731/</guid>
      <description>Denmark&amp;#39;s Christian Eriksen conscious in hospital after collapsing at Euro 2020 soccer match &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/lifestyle/sports/denmarks-eriksen-given-cpr-during-euro-2020-clash-2021-06-12/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-161725/</link>
      <pubDate>Sat, 12 Jun 2021 16:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-161725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-usa/america-is-back-with-biden-frances-macron-says-idUSKCN2DO0DN&amp;#34;&amp;gt;America is back with Biden, France&amp;#39;s Macron says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-141901/</link>
      <pubDate>Sat, 12 Jun 2021 14:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-141901/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china/anything-you-can-do-g7-rivals-china-with-grand-infrastructure-plan-idUSKCN2DO048&amp;#34;&amp;gt;Anything you can do: G7 rivals China with grand infrastructure plan&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
CARBIS BAY, England (Reuters) -The Group of Seven richest democracies on Saturday sought to counter China&amp;amp;#39;s growing influence by offering developing nations an infrastructure plan that would rival President Xi Jinping&amp;amp;#39;s multi-trillion-dollar Belt and Road initiative.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-brexit/whatever-it-takes-uks-johnson-warns-eu-over-post-brexit-trade-idUSKCN2DO088&amp;#34;&amp;gt;&amp;amp;#39;Whatever it takes&amp;amp;#39;, UK&amp;amp;#39;s Johnson warns EU over post-Brexit trade&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit/biden-to-hold-solo-news-conference-after-putin-summit-idUSKCN2DO09F&amp;#34;&amp;gt;Biden to hold solo news conference after Putin summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-121706/</link>
      <pubDate>Sat, 12 Jun 2021 12:17:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-121706/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-brexit/no-movement-uk-eu-show-little-sign-of-defusing-post-brexit-row-idUSKCN2DO088&amp;#34;&amp;gt;No movement: UK, EU show little sign of defusing post-Brexit row&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210612-102033/</link>
      <pubDate>Sat, 12 Jun 2021 10:20:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210612-102033/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132553_princess-diana-s-1981-ford-escort-heads-to-auction&amp;#34;&amp;gt;Princess Diana&amp;#39;s 1981 Ford Escort heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-101706/</link>
      <pubDate>Sat, 12 Jun 2021 10:17:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-101706/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china/g7-to-counter-chinas-clout-with-big-infrastructure-project-senior-u-s-official-idUSKCN2DO048&amp;#34;&amp;gt;G7 to counter China&amp;#39;s clout with big infrastructure project - senior U.S. official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
CARBIS BAY, England (Reuters) -The Group of Seven will seek to rival China’s multi-trillion-dollar Belt and Road initiative on Saturday by announcing a global infrastructure plan to help developing nations, a senior official in U.S. President Joe Biden&amp;amp;#39;s administration said.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-061734/</link>
      <pubDate>Sat, 12 Jun 2021 06:17:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-061734/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-china/g7-to-counter-chinas-belt-and-road-with-infrastructure-project-senior-us-official-idUSKCN2DO048&amp;#34;&amp;gt;G7 to counter China&amp;#39;s belt and road with infrastructure project - senior US official&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Group of Seven rich nations will announce on Saturday a new global infrastructure plan as a response to China&amp;amp;#39;s belt and road intiative, a senior official in U.S. President Joe Biden&amp;amp;#39;s administration said.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210612-042150/</link>
      <pubDate>Sat, 12 Jun 2021 04:21:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210612-042150/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132562_preview-2022-lexus-nx-leads-a-youth-movement-with-hybrid-options-new-infotainment&amp;#34;&amp;gt;Preview: 2022 Lexus NX leads a youth movement with hybrid options, new infotainment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Svbtle | Error 500</title>
      <link>https://www.whatsupup.com/blog/gigabit/polenta/20210612-042040/</link>
      <pubDate>Sat, 12 Jun 2021 04:20:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gigabit/polenta/20210612-042040/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com&amp;#34;&amp;gt;An error has occurred.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com&amp;#34;&amp;gt;Svbtle →&amp;lt;/a&amp;gt; System ready ▮&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://svbtle.com&amp;#34;&amp;gt;500&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-041823/</link>
      <pubDate>Sat, 12 Jun 2021 04:18:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-041823/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-democracy-activist-agnes-chow-released-from-prison-idUSKCN2DO01Z&amp;#34;&amp;gt;Hong Kong democracy activist Agnes Chow released from prison&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-001801/</link>
      <pubDate>Sat, 12 Jun 2021 00:18:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210612-001801/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-castillo-on-verge-of-being-named-president-after-last-minute-vote-wrangling-idUSKCN2DN1QW&amp;#34;&amp;gt;Peru&amp;#39;s Castillo on verge of being named President after last-minute vote wrangling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LIMA (Reuters) -Peru&amp;amp;#39;s presidential election front-runner Pedro Castillo was poised for victory on Friday night, despite legal wrangles over the ultra-close vote count that had ignited tensions in the Andean nation.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-usa-putin/putin-says-relations-with-u-s-at-lowest-point-in-years-idUSKCN2DN2JW&amp;#34;&amp;gt;Putin says relations with U.S. at lowest point in years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210612-001748/</link>
      <pubDate>Sat, 12 Jun 2021 00:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210612-001748/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/cd-projekt-red-says-its-data-is-likely-circulating-online-after-ransom-attack/&amp;#34;&amp;gt;CD Projekt Red does an about-face, says ransomware crooks are leaking data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-221652/</link>
      <pubDate>Fri, 11 Jun 2021 22:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-221652/</guid>
      <description>The northern highlands of Ethiopia became a global byword for famine in the mid-1980s, when drought and conflict combined to create a disaster that killed as many as one million people. Now hunger is stalking the Tigray region again, and a senior UN official alleges that starvation is being used as a weapon of war.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-castillo-tells-backers-to-stay-alert-as-vote-count-tensions-rise-idUSKCN2DN1QW&amp;#34;&amp;gt;Peru&amp;#39;s Castillo tells backers to &amp;#39;stay alert&amp;#39; as vote count tensions rise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210611-221635/</link>
      <pubDate>Fri, 11 Jun 2021 22:16:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210611-221635/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/cd-projekt-red-says-its-data-is-likely-circulating-online-after-ransom-attack/&amp;#34;&amp;gt;CD Project Red does an about-face, says ransomware crooks are leaking data&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Data taken in breach disclosed in February likely related to employees and contractors.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210611-221620/</link>
      <pubDate>Fri, 11 Jun 2021 22:16:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210611-221620/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/11/technology/big-tech-antitrust-bills.html&amp;#34;&amp;gt;Lawmakers, Taking Aim at Big Tech, Push Sweeping Overhaul of Antitrust A bipartisan group of House members introduced five bills targeting Amazon, Apple, Facebook and Google. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-201701/</link>
      <pubDate>Fri, 11 Jun 2021 20:17:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-201701/</guid>
      <description>Reuters wins the Pulitzer Prize for Explanatory Reporting on how qualified immunity shields cops of excessive force &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/section/usa-police-immunity/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The new Israeli government set to end Benjamin Netanyahu&amp;#39;s 12-year tenure as prime minister signed its final coalition agreements on Friday, pointedly including term limits.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-famine-exclusive/exclusive-un-official-accuses-eritrean-forces-of-deliberately-starving-tigray-idUSKCN2DN285&amp;#34;&amp;gt;Exclusive-UN official accuses Eritrean forces of deliberately starving Tigray&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210611-201630/</link>
      <pubDate>Fri, 11 Jun 2021 20:16:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210611-201630/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/11/technology/big-tech-antitrust-bills.html&amp;#34;&amp;gt;Lawmakers, Taking Aim at Big Tech, Push Sweeping Overhaul of Antitrust A bipartisan group of House members introduced five bills that take direct aim at Amazon, Apple, Facebook and Google. By Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-181648/</link>
      <pubDate>Fri, 11 Jun 2021 18:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-181648/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/new-israeli-government-seals-coalition-deals-as-netanyahu-era-approaches-its-end-idUSKCN2DN1YM&amp;#34;&amp;gt;New Israeli government seals coalition deals as Netanyahu era approaches its end&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210611-181047/</link>
      <pubDate>Fri, 11 Jun 2021 18:10:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210611-181047/</guid>
      <description>Interesting and probing response to my recent interview with @Progrockfarmer from @DouthatNYT! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/AGlPTSLSs9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/AGlPTSLSs9&amp;#34;&amp;gt;https://t.co/AGlPTSLSs9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210611-180648/</link>
      <pubDate>Fri, 11 Jun 2021 18:06:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210611-180648/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/one-thing-you-should-learn-from-david-goggins&amp;#34;&amp;gt;One thing you should learn from David Goggins&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/case-study-why-you-should-play-factorio&amp;#34;&amp;gt;Case Study: Why you should play Factorio&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-benefits-of-gaming&amp;#34;&amp;gt;The real benefits of gaming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-focus-on-work&amp;#34;&amp;gt;How to focus on work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-162005/</link>
      <pubDate>Fri, 11 Jun 2021 16:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-162005/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1084154_2022-ferrari-v-6-hybrid-supercar-spy-shots-and-video&amp;#34;&amp;gt;2022 Ferrari V-6 hybrid supercar spy shots and video: Entry-level mid-engine car coming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-161654/</link>
      <pubDate>Fri, 11 Jun 2021 16:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-161654/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit-geneva/swiss-deploy-army-repair-villa-for-biden-putin-summit-idUSKCN2DN1WX&amp;#34;&amp;gt;Swiss deploy army, repair villa for Biden-Putin summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-141714/</link>
      <pubDate>Fri, 11 Jun 2021 14:17:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-141714/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-foreign-exclusive/exclusive-chinas-attacks-on-foreign-forces-threaten-hong-kongs-global-standing-top-u-s-envoy-idUSKCN2DN0TZ&amp;#34;&amp;gt;Exclusive: China&amp;#39;s attacks on &amp;#39;foreign forces&amp;#39; threaten Hong Kong&amp;#39;s global standing - top U.S. envoy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-usa-turkey/erdogans-summit-with-biden-clouded-by-bitter-disputes-idUSKCN2DN169&amp;#34;&amp;gt;Erdogan&amp;amp;#39;s summit with Biden clouded by bitter disputes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-121719/</link>
      <pubDate>Fri, 11 Jun 2021 12:17:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-121719/</guid>
      <description>Trump-inspired death threats are terrorizing election workers &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/investigates/special-report/usa-trump-georgia-threats/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-raab-exclusive/exclusive-uks-raab-some-countries-are-using-vaccines-as-a-geopolitcal-tool-idUSKCN2DN0SQ&amp;#34;&amp;gt;Exclusive-UK&amp;#39;s Raab: Some countries are using vaccines as a geopolitcal tool&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-101945/</link>
      <pubDate>Fri, 11 Jun 2021 10:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-101945/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124807_2022-volkswagen-multivan-price-specs-review-photos-info&amp;#34;&amp;gt;Volkswagen&amp;#39;s T7-generation van debuts in Multivan guise&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132533_2022-honda-civic-hatchback-price-specs-review-photos-info&amp;#34;&amp;gt;US-built 2022 Honda Civic Hatchback teased ahead of June 23 reveal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-101655/</link>
      <pubDate>Fri, 11 Jun 2021 10:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-101655/</guid>
      <description>In 2017 the president of the United States shocked Washington&amp;#39;s Western allies during his first European trip, scolding them for failing to pay their &amp;amp;quot;fair share&amp;amp;quot; on defense, physically shoving aside one prime minister, and white-knuckling another leader in a public handshake.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-foreign-exclusive/exclusive-chinas-attacks-on-foreign-forces-threaten-hong-kongs-global-standing-top-u-s-envoy-idUSKCN2DN0TZ&amp;#34;&amp;gt;Exclusive-China&amp;#39;s attacks on &amp;#39;foreign forces&amp;#39; threaten Hong Kong&amp;#39;s global standing -top U.S. envoy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-082114/</link>
      <pubDate>Fri, 11 Jun 2021 08:21:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210611-082114/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129699_2021-tesla-model-s-plaid-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2021 Tesla Model S Plaid is world&amp;#39;s quickest car, costs $131,190&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-041739/</link>
      <pubDate>Fri, 11 Jun 2021 04:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-041739/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-india-vaccine/young-indian-unvaccinated-the-worlds-largest-inoculation-drive-falters-idUSKCN2DN06L&amp;#34;&amp;gt;Young, Indian, Unvaccinated: the world&amp;#39;s largest inoculation drive falters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
India began an inoculation drive for its 1.38 billion people in earnest in mid-January.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-allies/america-may-be-back-at-g7-but-allies-doubts-about-u-s-democracy-linger-idUSKCN2DN09Z&amp;#34;&amp;gt;America may be &amp;amp;#39;back&amp;amp;#39; at G7, but allies&amp;amp;#39; doubts about U.S. democracy linger&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/people-have-awakened-perus-castillo-closes-in-on-election-win-idUSKCN2DM1SG&amp;#34;&amp;gt;&amp;amp;#39;People have awakened&amp;amp;#39;: Peru&amp;amp;#39;s Castillo closes in on election win&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-001753/</link>
      <pubDate>Fri, 11 Jun 2021 00:17:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210611-001753/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-castillo-nears-victory-in-tight-presidential-election-idUSKCN2DM1SG&amp;#34;&amp;gt;Peru&amp;#39;s Castillo nears victory in tight presidential election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nicaragua-usa/u-s-vows-to-review-trade-cooperation-with-nicaragua-if-elections-unfair-idUSKCN2DM2T5&amp;#34;&amp;gt;U.S. vows to review trade cooperation with Nicaragua if elections unfair&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210611-001643/</link>
      <pubDate>Fri, 11 Jun 2021 00:16:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210611-001643/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-is-going-to-throw-the-kitchen&amp;#34;&amp;gt;Congress Is Going To Throw The Kitchen Sink At Big Tech&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/congress-is-going-to-throw-the-kitchen&amp;#34;&amp;gt;Big Technology obtained the five draft bills currently circulating around the House of Representatives that target Big Tech. If they’re signed into law, it will be bad news for the tech giants.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Jun 4 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;8&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitters-certainty-problem/comments&amp;#34;&amp;gt;Comment&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210611-001626/</link>
      <pubDate>Fri, 11 Jun 2021 00:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210611-001626/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/customers/&amp;#34;&amp;gt;Customers Learn how mobility businesses build and scale with Smartcar&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/blog/&amp;#34;&amp;gt;Blog Read our latest product and company updates&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/careers/&amp;#34;&amp;gt;Careers We’re hiring! Explore open positions and benefits&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/about/&amp;#34;&amp;gt;About us Meet the Smartcar team and learn about our mission&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/contact/&amp;#34;&amp;gt;Support &amp;amp;amp; live chat We’re here to help&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/press/&amp;#34;&amp;gt;Press Writing about mobility? Let’s chat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/customers/&amp;#34;&amp;gt;Customers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-221945/</link>
      <pubDate>Thu, 10 Jun 2021 22:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-221945/</guid>
      <description>On the road―or paved track—the star is something else: WTF mode&amp;amp;hellip;.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-221638/</link>
      <pubDate>Thu, 10 Jun 2021 22:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-221638/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-vaccine/biden-says-biggest-vaccine-donation-supercharges-battle-against-coronavirus-idUSKCN2DM0FE&amp;#34;&amp;gt;Biden says biggest vaccine donation &amp;#39;supercharges&amp;#39; battle against coronavirus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden said on Thursday that a donation of 500 million doses of the Pfizer COVID-19 vaccine to the world&amp;amp;#39;s poorest countries would supercharge the battle with the virus and comes with &amp;amp;#34;no strings attached.&amp;amp;#34;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-venezuela-vaccine/venezuela-says-payments-to-covax-vaccine-system-have-been-blocked-idUSKCN2DM2PV&amp;#34;&amp;gt;Venezuela says payments to COVAX vaccine system have been blocked&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210610-200736/</link>
      <pubDate>Thu, 10 Jun 2021 20:07:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210610-200736/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/on-prem-vs-cloud/&amp;#34;&amp;gt;On-prem vs cloud: Why you have more options than you think The debate between on-premise vs cloud is nothing new. We&amp;#39;ve collected deeper context and frameworks to make evaluating your options easier.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-182039/</link>
      <pubDate>Thu, 10 Jun 2021 18:20:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-182039/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1127888_2022-audi-a3-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Audi A3 lets you move up in the compact class for $34,945&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128619_2022-audi-s3-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Audi S3 will add some sport to your life for $45,945&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-181730/</link>
      <pubDate>Thu, 10 Jun 2021 18:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-181730/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/biden-meets-britains-johnson-to-warn-over-northern-irish-peace-idUSKCN2DL2NB&amp;#34;&amp;gt;Biden meets Britain&amp;#39;s Johnson, to warn over Northern Irish peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden brought a grave Brexit warning to his first meeting with British Prime Minister Boris Johnson on Thursday: Prevent a row with the European Union from imperilling the delicate peace in Northern Ireland.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-castillo-closes-in-on-victory-in-presidential-election-idUSKCN2DM1SG&amp;#34;&amp;gt;Peru&amp;amp;#39;s Castillo closes in on victory in presidential election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-mexico-cartel-wife/wife-of-el-chapo-could-face-decade-in-u-s-prison-after-guilty-plea-idUSKCN2DM110&amp;#34;&amp;gt;Wife of &amp;amp;#39;El Chapo&amp;amp;#39; could face decade in U.S. prison after guilty plea&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210610-181728/</link>
      <pubDate>Thu, 10 Jun 2021 18:17:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210610-181728/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/data-thieving-hackers-strike-again-stealing-ea-source-code-and-police-data/&amp;#34;&amp;gt;EA source code stolen by hacker claiming to sell it online&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
More organizations feel the pain as the ransomware scourge grows more pernicious.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-162130/</link>
      <pubDate>Thu, 10 Jun 2021 16:21:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-162130/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132551_geely-vision-starburst-concept-shows-off-automaker-s-new-design-direction&amp;#34;&amp;gt;Geely Vision Starburst concept shows off automaker&amp;#39;s new design direction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132495_new-jeep-grand-cherokee-to-spawn-two-row-plug-in-hybrid-options-in-2021&amp;#34;&amp;gt;New Jeep Grand Cherokee to spawn two-row, plug-in hybrid options in 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132248_deep-dive-the-yenko-camaro-and-dodge-challenger-from-2-fast-2-furious&amp;#34;&amp;gt;Deep dive: The Yenko Camaro and Dodge Challenger from &amp;amp;#34;2 Fast 2 Furious&amp;amp;#34;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-161819/</link>
      <pubDate>Thu, 10 Jun 2021 16:18:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-161819/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/biden-meets-britains-johnson-to-warn-over-n-irish-peace-idUSKCN2DL2NB&amp;#34;&amp;gt;Biden meets Britain&amp;#39;s Johnson, to warn over N.Irish peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-violence/israeli-forces-kill-palestinian-militant-two-security-officers-in-west-bank-clash-idUSKCN2DM08L&amp;#34;&amp;gt;Israeli forces kill Palestinian militant, two security officers in West Bank clash&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210610-161757/</link>
      <pubDate>Thu, 10 Jun 2021 16:17:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210610-161757/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/nameless-malware-collects-1-2tb-of-sensitive-data-and-stashes-it-online/&amp;#34;&amp;gt;Mystery malware steals 26M passwords from millions of PCs. Are you affected?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-142235/</link>
      <pubDate>Thu, 10 Jun 2021 14:22:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-142235/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131105_2021-ford-f-150-raptor-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2021 Ford F-150 Raptor comes with 450 hp, rear coil springs, $65,840 price tag&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Abby Vollmer, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/underpeopled/multichannel/20210610-141841/</link>
      <pubDate>Thu, 10 Jun 2021 14:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/underpeopled/multichannel/20210610-141841/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/customer-stories?type=enterprise&amp;#34;&amp;gt;Customer Stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Nat Friedman, Author at The GitHub Blog</title>
      <link>https://www.whatsupup.com/blog/hardened/twinkled/20210610-141832/</link>
      <pubDate>Thu, 10 Jun 2021 14:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/hardened/twinkled/20210610-141832/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/customer-stories?type=enterprise&amp;#34;&amp;gt;Customer Stories&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>privacy Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/evildoer/onionskin/20210610-140931/</link>
      <pubDate>Thu, 10 Jun 2021 14:09:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/evildoer/onionskin/20210610-140931/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/04/the-van-buren-decision-is-a-strong-step-forward-for-public-interest-research-online/&amp;#34;&amp;gt;The Van Buren decision is a strong step forward for public interest research online&amp;lt;/a&amp;gt; June 4, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Security Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/sovietizing/ohioan/20210610-140927/</link>
      <pubDate>Thu, 10 Jun 2021 14:09:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sovietizing/ohioan/20210610-140927/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/10/working-in-the-open-enhancing-privacy-and-security-in-the-dns/&amp;#34;&amp;gt;Working in the open: Enhancing privacy and security in the DNS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
In 2018, we started pioneering work on securing one of the oldest parts of the Internet, one that had till then remained largely untouched by efforts to make the web … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/10/working-in-the-open-enhancing-privacy-and-security-in-the-dns/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/10/working-in-the-open-enhancing-privacy-and-security-in-the-dns/&amp;#34;&amp;gt;Working in the open: Enhancing privacy and security in the DNS&amp;lt;/a&amp;gt; June 10, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-122051/</link>
      <pubDate>Thu, 10 Jun 2021 12:20:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-122051/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132545_2022-chevrolet-corvette-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Chevrolet Corvette receives engine tweaks, IMSA GTLM special edition&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132543_2023-kia-niro-spy-shots&amp;#34;&amp;gt;2023 Kia Niro spy shots: Radical look pegged for compact crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-121749/</link>
      <pubDate>Thu, 10 Jun 2021 12:17:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-121749/</guid>
      <description>&amp;lt;p&amp;gt;An Indian state has raised its COVID-19 death toll sharply higher after the discovery of thousands of unreported cases, lending weight to suspicion that India&amp;#39;s overall death tally is significantly more than the official figure.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/biden-warns-britain-dont-imperil-northern-irish-peace-idUSKCN2DL2NB&amp;#34;&amp;gt;Biden warns Britain: Don&amp;#39;t imperil Northern Irish peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-who-europe/who-issues-covid-19-warning-to-europe-before-summer-travels-idUSKCN2DM0XJ&amp;#34;&amp;gt;WHO issues COVID-19 warning to Europe before summer travels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/06/09/meet-grace-the-robot-spawned-from-the-he?videoId=731188958&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Meet Grace, the robot spawned from the health crisis&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-081901/</link>
      <pubDate>Thu, 10 Jun 2021 08:19:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-081901/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/biden-has-a-brexit-warning-for-britain-dont-imperil-n-irish-peace-idUSKCN2DL2NB&amp;#34;&amp;gt;Biden has a Brexit warning for Britain: Don&amp;#39;t imperil N.Irish peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
CARBIS BAY, England (Reuters) -U.S. President Joe Biden will bring a grave Brexit warning to his first meeting with British Prime Minister Boris Johnson: Prevent a row with the European Union from imperilling the delicate peace in Northern Ireland.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-india/indian-state-sharply-raises-covid-19-death-toll-prompting-call-for-wide-review-idUSKCN2DM09G&amp;#34;&amp;gt;Indian state sharply raises COVID-19 death toll prompting call for wide review&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-famine-exclusive/some-350000-people-in-ethiopias-tigray-in-famine-u-n-document-idUSKCN2DL2SS&amp;#34;&amp;gt;Some 350,000 people in Ethiopia&amp;amp;#39;s Tigray in famine -U.N. document&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-062300/</link>
      <pubDate>Thu, 10 Jun 2021 06:22:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210610-062300/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132538_next-gen-toyota-land-cruiser-debuts-with-twin-turbo-v-6-but-it-s-not-coming-to-the-u-s&amp;#34;&amp;gt;2022 Toyota Land Cruiser debuts with twin-turbo V-6, but isn&amp;#39;t coming to US&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-061932/</link>
      <pubDate>Thu, 10 Jun 2021 06:19:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-061932/</guid>
      <description>India records world’s highest single-day COVID-19 death toll with 6,148 fatalities &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DM09G&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/biden-brings-a-brexit-warning-for-britain-dont-imperil-n-irish-peace-idUSKCN2DL2NB&amp;#34;&amp;gt;Biden brings a Brexit warning for Britain: Don&amp;#39;t imperil N.Irish peace&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
CARBIS BAY, England (Reuters) -U.S. President Joe Biden brings a grave Brexit warning to his first meeting with British Prime Minister Boris Johnson: Prevent a row with the European Union from imperiling the delicate peace in Northern Ireland.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210610-061907/</link>
      <pubDate>Thu, 10 Jun 2021 06:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210610-061907/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cn.nytimes.com/usa/20210610/biden-tiktok-ban-trump/&amp;#34;&amp;gt;阅读简体中文版&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cn.nytimes.com/usa/20210610/biden-tiktok-ban-trump/zh-hant/&amp;#34;&amp;gt;閱讀繁體中文版&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-021942/</link>
      <pubDate>Thu, 10 Jun 2021 02:19:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-021942/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-guatemala-military/guatemalan-court-charges-retired-soldiers-for-civil-war-killings-disappearances-idUSKCN2DM02A&amp;#34;&amp;gt;Guatemalan court charges retired soldiers for Civil War killings, disappearances&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-002029/</link>
      <pubDate>Thu, 10 Jun 2021 00:20:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210610-002029/</guid>
      <description>President Joe Biden on Wednesday began his first trip abroad since taking office by hailing America&amp;#39;s unwavering commitment to the NATO alliance and warning Russia it faced &amp;amp;quot;robust and meaningful&amp;amp;quot; consequences if it engaged in harmful activities.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-southkorea-economy-millennial/young-voter-anger-over-housing-jobs-threatens-moons-legacy-in-south-korea-idUSKCN2DL2TL&amp;#34;&amp;gt;Young voter anger over housing, jobs threatens Moon&amp;#39;s legacy in South Korea&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210610-001845/</link>
      <pubDate>Thu, 10 Jun 2021 00:18:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210610-001845/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/&amp;#34;&amp;gt;Attack of the week: 64-bit ciphers in TLS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-222001/</link>
      <pubDate>Wed, 09 Jun 2021 22:20:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-222001/</guid>
      <description>&amp;lt;p&amp;gt;Russian court declares Navalny&amp;#39;s opposition groups &amp;#39;extremist,&amp;#39; barring members from running in a parliamentary election &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DL2II&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-departure/biden-warns-russia-it-faces-robust-response-for-harmful-actions-as-he-begins-european-visit-idUSKCN2DL0C6&amp;#34;&amp;gt;Biden warns Russia it faces &amp;#39;robust&amp;#39; response for harmful actions as he begins European visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MILDENHALL, England (Reuters) -President Joe Biden on Wednesday began his first trip abroad since taking office by hailing America&amp;amp;#39;s unwavering commitment to the NATO alliance and warning Russia it faced &amp;amp;#34;robust and meaningful&amp;amp;#34; consequences if it engaged in harmful activities.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-lawsuit/canada-proposes-to-settle-indigenous-lawsuit-after-discovery-of-childrens-remains-idUSKCN2DL2KR&amp;#34;&amp;gt;Canada proposes to settle indigenous lawsuit after discovery of children&amp;amp;#39;s remains&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-navalny/court-outlaws-kremlin-critic-navalnys-network-in-pre-election-knockout-idUSKCN2DL0RT&amp;#34;&amp;gt;Court outlaws Kremlin critic Navalny&amp;amp;#39;s network in pre-election knockout&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210609-221942/</link>
      <pubDate>Wed, 09 Jun 2021 22:19:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210609-221942/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/nameless-malware-collects-1-2tb-of-sensitive-data-and-stashes-it-online/&amp;#34;&amp;gt;Mystery malware steals 26M passwords from 3M PCs. Are you affected?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Massive trove can be used for ransomware, espionage, and more.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210609-221940/</link>
      <pubDate>Wed, 09 Jun 2021 22:19:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210609-221940/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/09/us/politics/biden-order-tiktok.html&amp;#34;&amp;gt;Biden Revokes and Replaces Trump Order That Banned TikTok The new order calls for a broader review of a number of foreign-controlled applications that could pose a security risk to Americans and their data. By Katie Rogers and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-202005/</link>
      <pubDate>Wed, 09 Jun 2021 20:20:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-202005/</guid>
      <description>&amp;lt;p&amp;gt;The U.S. plans to donate 500 million Pfizer COVID-19 vaccine doses globally over the next two years, a source says &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DL29V&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-mexico/mexico-hails-harris-after-visit-flags-more-border-talks-idUSKCN2DL1QY&amp;#34;&amp;gt;Mexico hails Harris after visit, flags more border talks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MEXICO CITY (Reuters) -Mexico&amp;amp;#39;s government on Wednesday praised U.S. Vice President Kamala Harris following talks aimed at curbing undocumented immigration, and said another top Biden administration official would visit next week for more discussions.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-turkey-biden-erdogan/turkey-optimistic-about-erdogan-biden-meeting-at-nato-summit-minister-idUSKCN2DL2HL&amp;#34;&amp;gt;Turkey optimistic about Erdogan-Biden meeting at NATO summit -minister&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election-castillo-policy/perus-castillo-to-respect-market-economy-if-declared-election-winner-says-adviser-idUSKCN2DL2EJ&amp;#34;&amp;gt;Peru&amp;amp;#39;s Castillo to respect market economy if declared election winner, says adviser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210609-201638/</link>
      <pubDate>Wed, 09 Jun 2021 20:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210609-201638/</guid>
      <description>&amp;lt;p&amp;gt;requires&amp;lt;br&amp;gt;
-clause syntax pitfall&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#compiler-diagnostics&amp;#34;&amp;gt;compiler-diagnostics&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#implementation-divergence&amp;#34;&amp;gt;implementation-divergence&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#pitfalls&amp;#34;&amp;gt;pitfalls&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#slack&amp;#34;&amp;gt;slack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In my CppCon 2018 talk &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.youtube.com/watch?v=CXn02MPkn8Y&amp;#34;&amp;gt;“Concepts As She Is Spoke,”&amp;lt;/a&amp;gt; I presented some pitfalls in&amp;lt;br&amp;gt;
-clause syntax, such as:&amp;lt;br&amp;gt;
template&amp;amp;lt;class T&amp;amp;gt;
concept HasHash = requires (const T&amp;amp;amp; t) {
t.hash() -&amp;amp;gt; std::integral;
};&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;struct X { int hash() const; };
static_assert(!HasHash&amp;amp;lt;X&amp;amp;gt;);&amp;lt;br&amp;gt;
On the cpplang Slack today, John Eivind Helset and Eugenio Bargiacchi (inadvertently)
showed me a new trap I hadn’t seen before: …&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Paul Graham</title>
      <link>https://www.whatsupup.com/blog/reigned/coffeecake/20210609-200917/</link>
      <pubDate>Wed, 09 Jun 2021 20:09:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/reigned/coffeecake/20210609-200917/</guid>
      <description>New: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/own.html&amp;#34;&amp;gt;A Project of One&amp;#39;s Own&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/fn.html&amp;#34;&amp;gt;Fierce Nerds&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://paulgraham.com/newideas.html&amp;#34;&amp;gt;Crazy Ideas&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-182150/</link>
      <pubDate>Wed, 09 Jun 2021 18:21:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-182150/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132538_next-gen-toyota-land-cruiser-debuts-with-twin-turbo-v-6-but-it-s-not-coming-to-the-u-s&amp;#34;&amp;gt;Next-gen Toyota Land Cruiser debuts with twin-turbo V-6, but it&amp;#39;s not coming to the U.S.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210609-181801/</link>
      <pubDate>Wed, 09 Jun 2021 18:17:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210609-181801/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/09/us/politics/biden-tiktok-ban.html&amp;#34;&amp;gt;Biden revokes and replaces Trump’s executive order that sought to ban TikTok. The directive replaces an order that has been tied up in litigation in favor of a broader review of foreign-controlled applications. By Katie Rogers and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210609-180855/</link>
      <pubDate>Wed, 09 Jun 2021 18:08:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210609-180855/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/neo4j-story/&amp;#34;&amp;gt;How Neo4j reduced churn by moving renewals out of Salesforce The story behind how Mike Brophy (VP of Global Renewals at Neo4J) reduced churn by built a custom internal tool to manage renewals outside of Salesforce.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/descript-story/&amp;#34;&amp;gt;How Descript gives engineers more time to build for customer impact The story behind how Andrew Mason (CEO and Founder of Descript) lifted the load off engineering teams building internal tools by moving to Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/leadgenius-story/&amp;#34;&amp;gt;How LeadGenius saved $1M with better internal tooling The story behind how Adam Louie (Senior Director of Business Operations at LeadGenius) built 3 internal applications that ended up saving LeadGenius $1M.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-162107/</link>
      <pubDate>Wed, 09 Jun 2021 16:21:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-162107/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132517_1969-dodge-charger-daytona-nascar-race-car-heads-to-auction&amp;#34;&amp;gt;1969 Dodge Charger Daytona NASCAR race car heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-161750/</link>
      <pubDate>Wed, 09 Jun 2021 16:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-161750/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-europe-drugs/illegal-drugs-trade-goes-digital-for-pandemic-idUSKCN2DL1WE&amp;#34;&amp;gt;Illegal drugs trade goes digital for pandemic&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-eu-nireland/uk-eu-sausage-war-talks-yield-threats-not-progress-idUSKCN2DK2MT&amp;#34;&amp;gt;UK-EU &amp;amp;#39;sausage war&amp;amp;#39; talks yield threats, not progress&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-142058/</link>
      <pubDate>Wed, 09 Jun 2021 14:20:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-142058/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1128600_2022-jaguar-i-pace-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Jaguar I-Pace revealed with improved charging, infotainment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-141726/</link>
      <pubDate>Wed, 09 Jun 2021 14:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-141726/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-departure/with-g7-summit-stop-first-biden-embarks-on-8-day-europe-trip-idUSKCN2DL0C6&amp;#34;&amp;gt;With G7 summit stop first, Biden embarks on 8-day Europe trip&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -U.S. President Joe Biden departs for Britain on Wednesday on his first trip abroad since taking office, an eight-day mission to rebuild trans-Atlantic ties strained during the Trump era and to reframe relations with Russia.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-children-trauma/she-screams-when-someone-comes-near-gaza-children-in-trauma-idUSKCN2DL1E6&amp;#34;&amp;gt;&amp;amp;#39;She screams when someone comes near&amp;amp;#39;: Gaza children in trauma&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-121722/</link>
      <pubDate>Wed, 09 Jun 2021 12:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-121722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-summit-venue/biden-putin-set-to-meet-in-18th-century-swiss-villa-for-summit-idUSKCN2DL1A3&amp;#34;&amp;gt;Biden, Putin set to meet in 18th-century Swiss villa for summit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210609-121709/</link>
      <pubDate>Wed, 09 Jun 2021 12:17:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210609-121709/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/hackers-can-mess-with-https-connections-by-sending-data-to-your-email-server/&amp;#34;&amp;gt;Hackers can mess with HTTPS connections by sending data to your email server&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Cross-protocol attacks could potentially steal login cookies or execute malicious code.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-102135/</link>
      <pubDate>Wed, 09 Jun 2021 10:21:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-102135/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132512_rugged-ineos-grenadier-suv-coming-to-us-in-2023&amp;#34;&amp;gt;Rugged Ineos Grenadier SUV coming to US in 2023&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132495_new-jeep-grand-cherokee-to-spawn-2-row-plug-in-hybrid-options-in-2021&amp;#34;&amp;gt;New Jeep Grand Cherokee to spawn 2-row, plug-in hybrid options in 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210609-101928/</link>
      <pubDate>Wed, 09 Jun 2021 10:19:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210609-101928/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/06/09/espanol/como-ver-eclipse-solar.html&amp;#34;&amp;gt;Allá Afuera ¿Quieres ver el eclipse del ‘anillo de fuego’? Acá te explicamos todo lo que tienes que saber Este eclipse anular solar comenzará en Canadá y terminará en una parte remota de Rusia. En algunas regiones de Estados Unidos las personas solo verán un eclipse parcial. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/09/science/solar-eclipse-june-10.html&amp;#34;&amp;gt;Out There Where to Watch the Ring of Fire Solar Eclipse at Sunrise An annular eclipse will start in Canada and end in a remote part of Russia. People in areas of the United States will see a partial eclipse. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-101826/</link>
      <pubDate>Wed, 09 Jun 2021 10:18:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-101826/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-biden-departure/with-g7-summit-the-first-stop-biden-embarks-on-8-day-trip-to-europe-idUSKCN2DL0C6&amp;#34;&amp;gt;With G7 summit the first stop, Biden embarks on 8-day trip to Europe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. President Joe Biden departs for Britain on Wednesday on his first trip abroad since taking office, an eight-day mission to rebuild trans-Atlantic ties strained during the Trump era and to reframe relations with Russia.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-japan-australia-china/japan-australia-raise-concerns-about-reported-abuses-in-china-idUSKCN2DL0RZ&amp;#34;&amp;gt;Japan, Australia raise concerns about reported abuses in China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-eu-citizens-insight/brexit-bureaucracy-creates-british-nightmare-for-dutch-boat-captain-idUSKCN2DL0PH&amp;#34;&amp;gt;Brexit bureaucracy creates British nightmare for Dutch boat captain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210609-081927/</link>
      <pubDate>Wed, 09 Jun 2021 08:19:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210609-081927/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2013/04/16/beeminding-for-fun-and-profit/&amp;#34;&amp;gt;Beeminding for fun and profit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-061807/</link>
      <pubDate>Wed, 09 Jun 2021 06:18:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-061807/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/socialist-castillo-clings-on-to-tight-lead-in-peru-election-as-count-nears-end-idUSKCN2DK1XQ&amp;#34;&amp;gt;Socialist Castillo clings on to tight lead in Peru election as count nears end&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Peruvian socialist candidate Pedro Castillo held on to a narrow lead late on Tuesday in the country&amp;amp;#39;s runoff presidential election, as tensions rose over contested ballots and accusations of fraud, which sparked protests outside the elections office.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-042128/</link>
      <pubDate>Wed, 09 Jun 2021 04:21:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210609-042128/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132513_2022-bmw-4-series-gran-coupe-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW 4-Series Gran Coupe grows in size, brawn&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132515_2022-bmw-x3-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW X3 arrives with fresh looks, mild-hybrid tech&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132519_2022-bmw-x4-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW X4 keeps sexy looks, adds tech&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132514_it-took-over-400-000-legos-to-create-this-lamborghini-sian-hypercar&amp;#34;&amp;gt;It took over 400,000 Legos to create this Lamborghini Sian hypercar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132510_arrival-of-new-astra-marks-next-step-in-opel-s-transformation&amp;#34;&amp;gt;Arrival of new Astra marks next step in Opel&amp;amp;#39;s transformation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132458_2022-ford-ranger-2022-bmw-m4-gt3-czinger-21c-car-news-headlines&amp;#34;&amp;gt;2022 Ford Ranger, 2022 BMW M4 GT3, Czinger 21C: Car News Headlines&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210609-042008/</link>
      <pubDate>Wed, 09 Jun 2021 04:20:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210609-042008/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/08/average-and-median-via-optimization/&amp;#34;&amp;gt;Average and median via optimization&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
This is certainly not a new observation, and I’m sure it is folklore and/or contained in various textbooks, but it was amusing to derive it independently.&amp;lt;br&amp;gt;
Suppose we have a finite set of real numbers , and we want to pick a value which is somehow “in the middle” of the . The punchline is that&amp;lt;br&amp;gt;
if we want to minimize the sum of the squared distances from to each , we should pick to be the average of the ;&amp;lt;br&amp;gt;
if we want to minimize the sum of the absolute distances from to each , we should pick to be the median of the .&amp;lt;br&amp;gt;
The first of these is tricky to understand intuitively but easy to derive; the second is intuitively straightforward but trying to derive it leads to an interesting twist.&amp;lt;br&amp;gt;
Average = minimizing sum of squared distances&amp;lt;br&amp;gt;
Let’s not worry about why we would want to minimize the sum of squared distances; there are good reasons and it’s not the point. I don’t know about you, but I find it difficult to reason intuitively about how and why to pick to minimize this sum of squared differences. If you know of an intuitive way to explain this, I would love to hear about it! But in any case, it is easy to derive using some strightforward calculus.&amp;lt;br&amp;gt;
Let denote the sum of squared distances from a given to each of the . Taking the derivative of with respect to , we find&amp;lt;br&amp;gt;
Setting the derivative equal to zero, we can first divide through by the factor of 2, yielding&amp;lt;br&amp;gt;
Since does not depend on , this is just copies of less the sum of the . Hence, solving for yields&amp;lt;br&amp;gt;
as expected: the value of which minimizes the sum of squared distances to the is their average, that is, the sum of the divided by the size of the set.&amp;lt;br&amp;gt;
Median = minimizing sum of absolute distances&amp;lt;br&amp;gt;
Now suppose we want to minimize the sum of absolute distances instead, that is,&amp;lt;br&amp;gt;
In this scenario, it is much easier to reason out the correct answer. Start with some arbitrary , and imagine nudging it by some small amount , say, to the right. ’s distances to any points on its left will each increase by , and its distances to any points on its right will each decrease by the same amount. Therefore, if there are more to the left of , then the overall sum of distances distances will increase; if there are more to the right, then the overall sum will decrease. So, to find which minimizes the sum of absolute differences, we want the same number of on the left and the right, that is, we want the median . Note that if is odd, then we must pick to be exactly equal to the in the middle; if is even, then we can pick to be anywhere inside the interval between the middle two .&amp;lt;br&amp;gt;
Just for fun, can we derive this answer using calculus, like we did for minimizing squared differences? There is a wrinkle, of course, which is that the absolute value function is not differentiable everywhere: it has a sharp corner at zero. But we won’t let that stop us! Clearly the derivative of is when and when . So it seems reasonable to just assign the derivative a value of at . Algebraically, we can define&amp;lt;br&amp;gt;
where is equal to when the proposition is true, and when it is false (this notation is called the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Iverson_bracket&amp;#34;&amp;gt;Iverson bracket&amp;lt;/a&amp;gt; ). So when we get ; when we get ; and when both propositions are false so we get .&amp;lt;br&amp;gt;
Armed with this definition, we can differentiate with respect to :&amp;lt;br&amp;gt;
Clearly, this is zero when , that is, when there are the same number of on either side of .&amp;lt;br&amp;gt;
The curious thing to me is that even though the derivative of is undefined when , it seems like it “wants” to be 0 here. In general, if we assign the value to the derivative at , the derivative of becomes&amp;lt;br&amp;gt;
When is nonzero and is odd, there are no values of for which this derivative is zero, making it more difficult to find the minimum.&amp;lt;br&amp;gt;
Posted in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/category/math/&amp;#34;&amp;gt;math&amp;lt;/a&amp;gt; | Tagged &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/absolute-value/&amp;#34;&amp;gt;absolute value&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/average/&amp;#34;&amp;gt;average&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/derivative/&amp;#34;&amp;gt;derivative&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/median/&amp;#34;&amp;gt;median&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/tag/optimization/&amp;#34;&amp;gt;optimization&amp;lt;/a&amp;gt; | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2021/06/08/average-and-median-via-optimization/#respond&amp;#34;&amp;gt;Leave a comment&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/03/03/deriving-pleasure-from-ghc-6-12-1/&amp;#34;&amp;gt;Deriving pleasure from GHC 6.12.1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210609-041852/</link>
      <pubDate>Wed, 09 Jun 2021 04:18:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210609-041852/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/06/implementing-private-fields-for-javascript/&amp;#34;&amp;gt;Implementing Private Fields for JavaScript →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/06/implementing-private-fields-for-javascript/&amp;#34;&amp;gt;Implementing Private Fields for JavaScript&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When implementing a language feature for JavaScript, an implementer must make decisions about how the language in the specification maps to the implementation. Private fields is an example of where the specification language and implementation reality diverge, at least in SpiderMonkey– the JavaScript engine which powers Firefox. To understand more, I’ll explain what private fields are, a couple of models for thinking about them, and explain why our implementation diverges from the specification language.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-041758/</link>
      <pubDate>Wed, 09 Jun 2021 04:17:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210609-041758/</guid>
      <description>&amp;lt;p&amp;gt;U.S. Senate passes sweeping bill to boost the country&amp;#39;s ability to compete with Chinese technology &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DK2PU&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/socialist-castillo-holds-on-to-tight-lead-in-peru-election-as-protests-break-out-idUSKCN2DK1XQ&amp;#34;&amp;gt;Socialist Castillo holds on to tight lead in Peru election as protests break out&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hundreds of Peruvians demonstrated outside the elections office in Lima on Tuesday as the presidential vote count neared its end, with socialist Pedro Castillo holding on to a narrow lead and tensions rising over contested ballots and accusations of fraud.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-attack-vigil/in-vigil-remembering-canadian-muslim-family-a-vow-that-this-is-our-city-idUSKCN2DL01C&amp;#34;&amp;gt;In vigil remembering Canadian Muslim family, a vow that &amp;amp;#39;this is our city&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-harris/harris-says-mexico-talks-candid-pledges-investment-to-stem-migration-idUSKCN2DK1BU&amp;#34;&amp;gt;Harris says Mexico talks &amp;amp;#39;candid,&amp;amp;#39; pledges investment to stem migration&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210609-041727/</link>
      <pubDate>Wed, 09 Jun 2021 04:17:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210609-041727/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/08/technology/google-ohio-public-utility.html&amp;#34;&amp;gt;Ohio’s attorney general wants Google to be declared a public utility. If Google were declared a so-called common carrier like a utility company, it would prevent the company from prioritizing its own products, services and websites in search results. By Daisuke Wakabayashi and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Internal Register | Software and hardware projects for fun from a guy who loves retro computing</title>
      <link>https://www.whatsupup.com/blog/giuseppe/fibroma/20210609-041513/</link>
      <pubDate>Wed, 09 Jun 2021 04:15:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/giuseppe/fibroma/20210609-041513/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io#content&amp;#34;&amp;gt;Skip to the content.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Internal Register&amp;lt;br&amp;gt;
Software and hardware projects for fun from a guy who loves retro computing&amp;lt;br&amp;gt;
2019-09-29 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/09/29/Console-Video.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-09-29 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/09/29/Console-PPU-Simulator.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - PPU Simulator&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-07-26 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/07/26/Console-CPU.html&amp;#34;&amp;gt;‘HomeBrew’ Video Game Console - CPU Board&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
2019-03-14 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://internalregister.github.io/2019/03/14/Homebrew-Console.html&amp;#34;&amp;gt;Building a ‘Homebrew’ Video Game Console&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
This page was generated by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://pages.github.com&amp;#34;&amp;gt;GitHub Pages&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210609-041507/</link>
      <pubDate>Wed, 09 Jun 2021 04:15:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210609-041507/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/rustc-interop-in-android-platform.html&amp;#34;&amp;gt;Rust/C&#43;&#43; interop in the Android Platform&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Joel Galenson and Matthew Maurer, Android Team&amp;lt;br&amp;gt;
One of the main challenges of evaluating Rust for use within the Android platform was ensuring we could provide sufficient interoperability with our existing codebase. If Rust is to meet its goals of improving security, stability, and quality Android-wide, we need to be able to use Rust anywhere in the codebase that native code is required. To accomplish this, we need to provide the majority of functionality platform developers use. As we discussed &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/04/rust-in-android-platform.html&amp;#34;&amp;gt;previously&amp;lt;/a&amp;gt; , we have too much C&#43;&#43; to consider ignoring it, rewriting all of it is infeasible, and rewriting older code would likely be counterproductive as the bugs in that code have largely been fixed. This means interoperability is the most practical way forward.&amp;lt;br&amp;gt;
Before introducing Rust into the Android Open Source Project (AOSP), we needed to demonstrate that Rust interoperability with C and C&#43;&#43; is sufficient for practical, convenient, and safe use within Android. Adding a new language has costs; we needed to demonstrate that Rust would be able to scale across the codebase and meet its potential in order to justify those costs. This post will cover the analysis we did more than a year ago while we evaluated Rust for use in Android. We also present a follow-up analysis with some insights into how the original analysis has held up as Android projects have adopted Rust.&amp;lt;br&amp;gt;
Language interoperability in Android&amp;lt;br&amp;gt;
Existing language interoperability in Android focuses on well defined foreign-function interface (FFI) boundaries, which is where code written in one programming language calls into code written in a different language. Rust support will likewise focus on the FFI boundary as this is consistent with how AOSP projects are developed, how code is shared, and how dependencies are managed. For Rust interoperability with C, the C application binary interface (ABI) is already sufficient.&amp;lt;br&amp;gt;
Interoperability with C&#43;&#43; is more challenging and is the focus of this post. While both Rust and C&#43;&#43; support using the C ABI, it is not sufficient for idiomatic usage of either language. Simply enumerating the features of each language results in an unsurprising conclusion: many concepts are not easily translatable, nor do we necessarily want them to be. After all, we’re introducing Rust because many features and characteristics of C&#43;&#43; make it difficult to write safe and correct code. Therefore, our goal is not to consider all language features, but rather to analyze how Android uses C&#43;&#43; and ensure that interop is convenient for the vast majority of our use cases.&amp;lt;br&amp;gt;
We analyzed code and interfaces in the Android platform specifically, not codebases in general. While this means our specific conclusions may not be accurate for other codebases, we hope the methodology can help others to make a more informed decision about introducing Rust into their large codebase. Our colleagues on the Chrome browser team have done a similar analysis, which you can find &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chromium.org/Home/chromium-security/memory-safety/rust-and-c-interoperability&amp;#34;&amp;gt;here&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This analysis was not originally intended to be published outside of Google: our goal was to make a data-driven decision on whether or not Rust was a good choice for systems development in Android. While the analysis is intended to be accurate and actionable, it was never intended to be comprehensive, and we’ve pointed out a couple of areas where it could be more complete. However, we also note that initial investigations into these areas showed that they would not significantly impact the results, which is why we decided to not invest the additional effort.&amp;lt;br&amp;gt;
Methodology&amp;lt;br&amp;gt;
Exported functions from Rust and C&#43;&#43; libraries are where we consider interop to be essential. Our goals are simple:&amp;lt;br&amp;gt;
Rust must be able to call functions from C&#43;&#43; libraries and vice versa.&amp;lt;br&amp;gt;
FFI should require a minimum of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Boilerplate_code&amp;#34;&amp;gt;boilerplate&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
FFI should not require deep expertise.&amp;lt;br&amp;gt;
While making Rust functions callable from C&#43;&#43; is a goal, this analysis focuses on making C&#43;&#43; functions available to Rust so that new Rust code can be added while taking advantage of existing implementations in C&#43;&#43;. To that end, we look at exported C&#43;&#43; functions and consider existing and planned compatibility with Rust via the C ABI and compatibility libraries. Types are extracted by running&amp;lt;br&amp;gt;
objdump&amp;lt;br&amp;gt;
on shared libraries to find external C&#43;&#43; functions they use &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com#fn1&amp;#34;&amp;gt;1&amp;lt;/a&amp;gt; and running&amp;lt;br&amp;gt;
c&#43;&#43;filt&amp;lt;br&amp;gt;
to parse the C&#43;&#43; types. This gives functions and their arguments. It does not consider return values, but a preliminary analysis &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com#fn2&amp;#34;&amp;gt;2&amp;lt;/a&amp;gt; of those revealed that they would not significantly affect the results.&amp;lt;br&amp;gt;
We then classify each of these types into one of the following buckets:&amp;lt;br&amp;gt;
Supported by bindgen&amp;lt;br&amp;gt;
These are generally simple types involving primitives (including pointers and references to them). For these types, Rust’s existing FFI will handle them correctly, and Android’s build system will &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.android.com/android/platform/superproject/&#43;/master:external/selinux/libselinux/Android.bp;l=268;drc=f30e6ff37683d72b65c160a808f87fe356c71c0b&amp;#34;&amp;gt;auto-generate the bindings&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
Supported by cxx compat crate&amp;lt;br&amp;gt;
These are handled by the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cxx.rs/&amp;#34;&amp;gt;cxx&amp;lt;/a&amp;gt; crate. This currently includes&amp;lt;br&amp;gt;
std::string&amp;lt;br&amp;gt;
,&amp;lt;br&amp;gt;
std::vector,&amp;lt;br&amp;gt;
and C&#43;&#43; methods (including pointers/references to these types). Users simply have to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cxx.rs/index.html#example&amp;#34;&amp;gt;define&amp;lt;/a&amp;gt; the types and functions they want to share across languages and cxx will generate the code to do that safely.&amp;lt;br&amp;gt;
Native support&amp;lt;br&amp;gt;
These types are not directly supported, but the interfaces that use them have been manually reworked to add Rust support. Specifically, this includes types used by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-review.googlesource.com/c/platform/system/tools/aidl/&#43;/1357705&amp;#34;&amp;gt;AIDL&amp;lt;/a&amp;gt; and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-review.googlesource.com/c/platform/build/soong/&#43;/1412889&amp;#34;&amp;gt;protobufs&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
We have also implemented a native interface for &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-review.googlesource.com/c/platform/frameworks/proto_logging/&#43;/1592771&amp;#34;&amp;gt;StatsD&amp;lt;/a&amp;gt; as the existing C&#43;&#43; interface relies on method overloading, which is not well supported by bindgen and cxx &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com#fn3&amp;#34;&amp;gt;3&amp;lt;/a&amp;gt; . Usage of this system does not show up in the analysis because the C&#43;&#43; API does not use any unique types.&amp;lt;br&amp;gt;
Potential addition to cxx&amp;lt;br&amp;gt;
This is currently common data structures such as&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/dtolnay/cxx/issues/87&amp;#34;&amp;gt;std::optional&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
and&amp;lt;br&amp;gt;
std::chrono::duration&amp;lt;br&amp;gt;
and custom string and vector implementations.&amp;lt;br&amp;gt;
These can either be supported natively by a future contribution to cxx, or by using its ExternType facilities. We have only included types in this category that we believe are relatively straightforward to implement and have a reasonable chance of being accepted into the cxx project.&amp;lt;br&amp;gt;
We don&amp;amp;#39;t need/intend to support&amp;lt;br&amp;gt;
Some types are exposed in today’s C&#43;&#43; APIs that are either an implicit part of the API, not an API we expect to want to use from Rust, or are language specific. Examples of types we do not intend to support include:&amp;lt;br&amp;gt;
Mutexes - we expect that locking will take place in one language or the other, rather than needing to pass mutexes between languages, as per our coarse-grained philosophy.&amp;lt;br&amp;gt;
native_handle&amp;lt;br&amp;gt;
- this is a JNI interface type, so it is inappropriate for use in Rust/C&#43;&#43; communication.&amp;lt;br&amp;gt;
std::locale&amp;amp;amp;&amp;lt;br&amp;gt;
- Android uses a separate locale system from C&#43;&#43; locales. This type primarily appears in output due to e.g.,&amp;lt;br&amp;gt;
cout&amp;lt;br&amp;gt;
usage, which would be inappropriate to use in Rust.&amp;lt;br&amp;gt;
Overall, this category represents types that we do not believe a Rust developer should be using.&amp;lt;br&amp;gt;
HIDL&amp;lt;br&amp;gt;
Android is in the process of deprecating &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/devices/architecture/hidl&amp;#34;&amp;gt;HIDL&amp;lt;/a&amp;gt; and migrating to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/devices/architecture/aidl/aidl-hals&amp;#34;&amp;gt;AIDL for HALs&amp;lt;/a&amp;gt; for new services.We’re also migrating some existing implementations to stable AIDL. Our current plan is to not support HIDL, preferring to migrate to stable AIDL instead. These types thus currently fall into the “We don&amp;amp;#39;t need/intend to support&amp;amp;#39;&amp;amp;#39; bucket above, but we break them out to be more specific. If there is sufficient demand for HIDL support, we may revisit this decision later.&amp;lt;br&amp;gt;
Other&amp;lt;br&amp;gt;
This contains all types that do not fit into any of the above buckets. It is currently mostly&amp;lt;br&amp;gt;
being passed by value, which is not supported by cxx.&amp;lt;br&amp;gt;
Top C&#43;&#43; libraries&amp;lt;br&amp;gt;
One of the primary reasons for supporting interop is to allow reuse of existing code. With this in mind, we determined the most commonly used C&#43;&#43; libraries in Android:&amp;lt;br&amp;gt;
liblog&amp;lt;br&amp;gt;
libbase&amp;lt;br&amp;gt;
libutils&amp;lt;br&amp;gt;
libcutils&amp;lt;br&amp;gt;
libhidlbase&amp;lt;br&amp;gt;
libbinder&amp;lt;br&amp;gt;
libhardware&amp;lt;br&amp;gt;
libz&amp;lt;br&amp;gt;
libcrypto&amp;lt;br&amp;gt;
, and&amp;lt;br&amp;gt;
libui&amp;lt;br&amp;gt;
. We then analyzed all of the external C&#43;&#43; functions used by these libraries and their arguments to determine how well they would interoperate with Rust.&amp;lt;br&amp;gt;
Overall, 81% of types are in the first three categories (which we currently fully support) and 87% are in the first four categories (which includes those we believe we can easily support). Almost all of the remaining types are those we believe we do not need to support.&amp;lt;br&amp;gt;
Mainline modules&amp;lt;br&amp;gt;
In addition to analyzing popular C&#43;&#43; libraries, we also examined &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://source.android.com/devices/architecture/modular-system&amp;#34;&amp;gt;Mainline modules&amp;lt;/a&amp;gt; . Supporting this context is critical as Android is &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://android-developers.googleblog.com/2019/05/fresher-os-with-projects-treble-and-mainline.html&amp;#34;&amp;gt;migrating some of its core functionality to Mainline&amp;lt;/a&amp;gt; , including much of the native code we hope to augment with Rust. Additionally, their modularity presents an opportunity for interop support.&amp;lt;br&amp;gt;
We analyzed 64 binaries and libraries in 21 modules. For each analyzed library we examined their used C&#43;&#43; functions and analyzed the types of their arguments to determine how well they would interoperate with Rust in the same way we did above for the top 10 libraries.&amp;lt;br&amp;gt;
Here 88% of types are in the first three categories and 90% in the first four, with almost all of the remaining being types we do not need to handle.&amp;lt;br&amp;gt;
Analysis of Rust/C&#43;&#43; Interop in AOSP&amp;lt;br&amp;gt;
With almost a year of Rust development in AOSP behind us, and more than a hundred thousand lines of code written in Rust, we can now examine how our original analysis has held up based on how C/C&#43;&#43; code is currently called from Rust in AOSP. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com#fn4&amp;#34;&amp;gt;4&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The results largely match what we expected from our analysis with bindgen handling the majority of interop needs. Extensive use of AIDL by the new Keystore2 service results in the primary difference between our original analysis and actual Rust usage in the “Native Support” category.&amp;lt;br&amp;gt;
A few current examples of interop are:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.android.com/android/platform/superproject/&#43;/master:system/bt/gd/rust/shim/src/hci.rs;l=9;drc=1417e3ea64248efebaa432d0428fce7f6c734104&amp;#34;&amp;gt;Cxx in Bluetooth&amp;lt;/a&amp;gt; - While Rust is intended to be the primary language for Bluetooth, migrating from the existing C/C&#43;&#43; implementation will happen in stages. Using cxx allows the Bluetooth team to more easily serve legacy protocols like HIDL until they are phased out by using the existing C&#43;&#43; support to incrementally migrate their service.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cs.android.com/android/platform/superproject/&#43;/master:system/security/keystore2/src/service.rs;l=343;drc=3ed5da79ae8698ded3684577b6b5094d9d596399&amp;#34;&amp;gt;AIDL in keystore&amp;lt;/a&amp;gt; - …</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210609-040820/</link>
      <pubDate>Wed, 09 Jun 2021 04:08:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210609-040820/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/pushing-the-boundaries-of-discord-sabotage-studios-server-experience-5f39da3eabbf?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Pushing the Boundaries of Discord: Sabotage Studio’s Server Experience&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/pushing-the-boundaries-of-discord-sabotage-studios-server-experience-5f39da3eabbf?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Pushing the Boundaries of Discord: Sabotage Studio’s Server Experience Sabotage Studio will take you through their journey of leveraging Discord’s toolset to build the best community experience on the platform.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Ferns</title>
      <link>https://www.whatsupup.com/blog/incremental/comte/20210609-040759/</link>
      <pubDate>Wed, 09 Jun 2021 04:07:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/incremental/comte/20210609-040759/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/&amp;#34;&amp;gt;Ferns&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/about/&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Welcome!&amp;lt;br&amp;gt;
Posts&amp;lt;br&amp;gt;
May 10, 2021&amp;lt;br&amp;gt;
Dec 26, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2020/12/26/Abstraction-20As-20Gambling.html&amp;#34;&amp;gt;Program Abstraction as Gambling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Jun 14, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2020/06/14/Idiot-20Comedy-20Steps-20Towards-20Fast-20Classical-20Shors.html&amp;#34;&amp;gt;Idiot Comedy Steps Towards Fast Classical Shor&amp;amp;#39;s&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2020/05/18/On-20The-20Deterministic-20Qubit.html&amp;#34;&amp;gt;On the Deterministic Qubit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Feb 12, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2020/02/12/I-20Add-2020-20Seconds-20of-20Latency-20to-20Every-20Website-20I-20Visit.html&amp;#34;&amp;gt;I Add 3-25 Seconds of Latency to Every Page I Visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Oct 26, 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/10/26/Listen-20To-20A-20NP-20Complete-20Problem.html&amp;#34;&amp;gt;Listen To An NP-Complete Problem&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/10/12/Literallt-20Suffocating-20In-20Meetings-20A-20Little.html&amp;#34;&amp;gt;Literally Suffocating In Meetings, A Little&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/06/30/An-20Algorithmic-20Approach-20To-20Alienation.html&amp;#34;&amp;gt;An Algorithmic Approach to Alienation&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/02/26/Fast-20Newtons-20Method-20For-20Neural-20Nets-20With-20Finite-20Difference.html&amp;#34;&amp;gt;Fast Newton&amp;amp;#39;s Method for Neural Nets, with Finite Difference&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/02/18/Two-20Strange-20Useless-20Things-20To-20Do-20With-20Neural-20Nets.html&amp;#34;&amp;gt;Two Strange and Useless Things to Do With a Neural Net&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Jan 31, 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/01/31/JR-20Bob-20Dobbs-20Fast-20Newtons-20Method.html&amp;#34;&amp;gt;J. R. &amp;amp;#34;Bob&amp;amp;#34; Dobbs Memorial Fast Finite Difference Newton&amp;amp;#39;s Method&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2019/01/07/JR-20Bob-20Dobbs-20Fast-20Hessian-20Inverse-20Multiplication-20Method.html&amp;#34;&amp;gt;J. R. &amp;amp;#34;Bob&amp;amp;#34; Dobbs Memorial Fast Hessian Inverse Multiplication Method&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2018/01/03/Your-20Market-20Can-27t-20Learn-20XOR.html&amp;#34;&amp;gt;Your Market Can&amp;amp;#39;t Learn XOR&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Nov 9, 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2017/11/09/Hard-20Problems-20Of-20Consciousness-2c-20Consciousness-20Of-20Hard-20Problems.html&amp;#34;&amp;gt;The Hard Problem of Consciousness, The Consciousness of Hard Problems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2017/05/30/Poking-20At-20Causation2c.html&amp;#34;&amp;gt;Poking At Causation 2c / 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://howonlee.github.io/2016/01/21/Poking-20At-20Causation1.html&amp;#34;&amp;gt;Poking At Causation 1 / 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Ferns&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/howonlee&amp;#34;&amp;gt;howonlee&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210609-040609/</link>
      <pubDate>Wed, 09 Jun 2021 04:06:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210609-040609/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/microsoft-patches-six-zero-day-security-holes/&amp;#34;&amp;gt;Microsoft Patches Six Zero-Day Security Holes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Microsoft today released another round of security updates for Windows operating systems and supported software, including fixes for six zero-day bugs that malicious hackers already are exploiting in active attacks.&amp;lt;br&amp;gt;
June’s Patch Tuesday addresses just 49 security holes — about half the normal number of vulnerabilities lately. But what this month lacks in volume it makes up for in urgency: Microsoft warns that bad guys are leveraging a half-dozen of those weaknesses to break into computers in targeted attacks.&amp;lt;br&amp;gt;
Among the zero-days are:&amp;lt;br&amp;gt;
– &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33742&amp;#34;&amp;gt;CVE-2021-33742&amp;lt;/a&amp;gt; , a remote code execution bug in a Windows HTML component. – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31955&amp;#34;&amp;gt;CVE-2021-31955&amp;lt;/a&amp;gt; , an information disclosure bug in the Windows Kernel – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31956&amp;#34;&amp;gt;CVE-2021-31956&amp;lt;/a&amp;gt; , an elevation of privilege flaw in Windows NTFS – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33739&amp;#34;&amp;gt;CVE-2021-33739&amp;lt;/a&amp;gt; , an elevation of privilege flaw in the Microsoft Desktop Window Manager – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31201&amp;#34;&amp;gt;CVE-2021-31201&amp;lt;/a&amp;gt; , an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31199&amp;#34;&amp;gt;CVE-2021-31199&amp;lt;/a&amp;gt; , an elevation of privilege flaw in the Microsoft Enhanced Cryptographic Provider&amp;lt;br&amp;gt;
Kevin Breen , director of cyber threat research at Immersive Labs , said elevation of privilege flaws are just as valuable to attackers as remote code execution bugs: Once the attacker has gained an initial foothold, he can move laterally across the network and uncover further ways to escalate to system or domain-level access.&amp;lt;br&amp;gt;
“This can be hugely damaging in the event of ransomware attacks, where high privileges can enable the attackers to stop or destroy backups and other security tools,” Breen said. “The ‘exploit detected’ tag means attackers are actively using them, so for me, it’s the most important piece of information we need to prioritize the patches.” &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/microsoft-patches-six-zero-day-security-holes/#more-55896&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>mtlynch.io</title>
      <link>https://www.whatsupup.com/blog/tweediest/constructed/20210608-125927/</link>
      <pubDate>Tue, 08 Jun 2021 12:59:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tweediest/constructed/20210608-125927/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/&amp;#34;&amp;gt;Michael Lynch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/posts/&amp;#34;&amp;gt;Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/retrospectives/&amp;#34;&amp;gt;Retrospectives&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/projects/&amp;#34;&amp;gt;Projects&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/book-reports/&amp;#34;&amp;gt;Book Reports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/about/&amp;#34;&amp;gt;About&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
I&amp;amp;#39;m Michael Lynch, software developer and blogger. I used to work as a software engineer at large companies, but now I run small software businesses of my own and blog about the process.&amp;lt;br&amp;gt;
Most Popular Articles&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/why-i-quit-google/&amp;#34;&amp;gt;Why I Quit Google to Work for Myself&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/tinypilot/&amp;#34;&amp;gt;TinyPilot: Build a KVM Over IP for Under $100&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/stole-siacoins/&amp;#34;&amp;gt;How I Stole Your Siacoin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/solo-developer-year-2/&amp;#34;&amp;gt;My Second Year as a Solo Developer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Articles about Software Development&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/code-review-love/&amp;#34;&amp;gt;How to Make Your Code Reviewer Fall in Love with You&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/human-code-reviews-1/&amp;#34;&amp;gt;How to Do Code Reviews Like a Human&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/good-developers-bad-tests/&amp;#34;&amp;gt;Why Good Developers Write Bad Unit Tests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/painless-web-app-testing/&amp;#34;&amp;gt;End-to-End Testing Web Apps: The Painless Way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Articles about Blogging&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/editor/&amp;#34;&amp;gt;How I Hired a Freelance Editor for My Blog&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/how-to-hire-a-cartoonist/&amp;#34;&amp;gt;How to Hire a Cartoonist to Make Your Blog Less Boring&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://mtlynch.io/hiring-content-writers/&amp;#34;&amp;gt;Hiring Content Writers: A Guide for Small Businesses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Crafted with ❤️ in Western Massachusetts.
&amp;lt;pre&amp;gt;&amp;lt;code&amp;gt;  · © 2021&amp;amp;lt;br&amp;amp;gt;
&amp;lt;/code&amp;gt;&amp;lt;/pre&amp;gt;
&amp;lt;p&amp;gt;This work is licensed under a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://creativecommons.org/licenses/by/4.0/&amp;#34;&amp;gt;Creative Commons Attribution 4.0 International License&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Home</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20210608-123319/</link>
      <pubDate>Tue, 08 Jun 2021 12:33:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20210608-123319/</guid>
      <description>&amp;lt;p&amp;gt;Articles&amp;lt;br&amp;gt;
2021/04/25&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/04/12/main-master.html&amp;#34;&amp;gt;Default branches at work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2021/02/22/cloud-services.html&amp;#34;&amp;gt;Cloud services, winter 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/10/02/scf-stuf.html&amp;#34;&amp;gt;U.S.-Distribution-of-Wealth Stuf Oreos&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/08/12/closeguard.html&amp;#34;&amp;gt;“A resource failed to call close.”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/08/10/glitch-privesc-2019.html&amp;#34;&amp;gt;Root access on Glitch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/08/03/firebase-messaging-apache.html&amp;#34;&amp;gt;Firebase Messaging open source license&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/07/17/github-indent.html&amp;#34;&amp;gt;Auto-indenting code blocks in GitHub comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/03/08/diablo3-resources.html&amp;#34;&amp;gt;Resources in Diablo 3&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/02/18/libkate.html&amp;#34;&amp;gt;The reason you need to install a karaoke captioning library if you want to change your desktop wallpaper&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/01/26/vmstat-swap-unit.html&amp;#34;&amp;gt;vmstat(8) swap unit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/01/22/bathroom-brands.html&amp;#34;&amp;gt;Brands in the bathroom&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/01/05/pandora.html&amp;#34;&amp;gt;Pandora’s track title display&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/01/04/jekyll-link.html&amp;#34;&amp;gt;How Jekyll checks if a link is valid&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2020/01/02/scissors.html&amp;#34;&amp;gt;Which emoji scissors close&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/11/16/easter-egg-inspection.html&amp;#34;&amp;gt;Android Studio’s “Code contains easter egg” inspection&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/11/05/rasterization.html&amp;#34;&amp;gt;Rasterization of coincident edges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/11/02/eoa.html&amp;#34;&amp;gt;The essence of anticipation (2016)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/10/31/intellij-desktop.html&amp;#34;&amp;gt;How IntelliJ determines if it can create a desktop entry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/09/09/idea-shellcheck.html&amp;#34;&amp;gt;How IntelliJ IDEA installs shellcheck&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2019/03/02/highlight-all-65.html&amp;#34;&amp;gt;Highlight All in Firefox 65&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/03/18/proxycommand.html&amp;#34;&amp;gt;Writing a ProxyCommand for SSH&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/03/15/windows-size.html&amp;#34;&amp;gt;Windows disk space requirements&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/02/27/ssh-protocol.html&amp;#34;&amp;gt;The SSH protocol&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/02/24/firebase-messaging-license.html&amp;#34;&amp;gt;Firebase Messaging license&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/02/17/build-file-checksums-ser.html&amp;#34;&amp;gt;build_file_checksums.ser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2018/02/06/amp.html&amp;#34;&amp;gt;Google AMP from the other side&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/12/28/language-dism.html&amp;#34;&amp;gt;Uninstalling extraneous language optional features on Windows 10&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/12/14/resource-monitor.html&amp;#34;&amp;gt;Subduing Windows machinations with Resource Monitor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/11/28/rust-pound.html&amp;#34;&amp;gt;Those pound sign thingies in Rust&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/09/07/tf-checkpoints.html&amp;#34;&amp;gt;Working with TensorFlow checkpoints&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/08/30/slf4j-just-work.html&amp;#34;&amp;gt;How to get SLF4J to just work&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/08/25/windows-transparency.html&amp;#34;&amp;gt;Transparency effects in Windows&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/08/22/getnavigationbarview-npe.html&amp;#34;&amp;gt;NullPointerException in getNavigationBarView&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/08/21/jekyll-ruby24-timezones.html&amp;#34;&amp;gt;Time zones in Jekyll on Ruby 2.4&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/07/27/safari-history.html&amp;#34;&amp;gt;History navigation in Safari&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/05/07/complete-filename.html&amp;#34;&amp;gt;How to complete a filename in Bash&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/03/09/highlight-all.html&amp;#34;&amp;gt;Highlight All in Firefox&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/02/08/monitor-black.html&amp;#34;&amp;gt;Why my monitor went black&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2017/01/19/lift-to-check-phone.html&amp;#34;&amp;gt;Lift to check phone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/12/23/ambient-display.html&amp;#34;&amp;gt;Ambient display&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/12/06/apt-sha1.html&amp;#34;&amp;gt;That thing you saw when you upgraded apt and SHA1 hashes stopped working&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/11/30/potluck.html&amp;#34;&amp;gt;Potluck&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/07/03/git-checkout-patch.html&amp;#34;&amp;gt;Hunk editing in git checkout –patch&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/07/02/cloud-services.html&amp;#34;&amp;gt;Cloud services, summer 2016&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/06/30/android-doze.html&amp;#34;&amp;gt;Android Doze inconveniences&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2016/06/12/disposal.html&amp;#34;&amp;gt;Disposal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/11/22/awkward-browsing.html&amp;#34;&amp;gt;The awkward browsing game&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/11/10/fennec.html&amp;#34;&amp;gt;Transferring your Firefox profile&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/25/suborigins.html&amp;#34;&amp;gt;Relinquishing control with suborigins&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/14/mozilla-extension-signing.html&amp;#34;&amp;gt;Extension signing requirements for Firefox&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/14/new-feature.html&amp;#34;&amp;gt;A new feature for this site&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/11/github-new.html&amp;#34;&amp;gt;GitHub’s online editing tools&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/10/modifying-gems.html&amp;#34;&amp;gt;Modifying other people’s Ruby gems&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/10/meteor-stuff.html&amp;#34;&amp;gt;Meteor stuff&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wh0.github.io/2015/10/10/windows-d.html&amp;#34;&amp;gt;Windows&#43;D&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Please do not write below this line.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210608-102213/</link>
      <pubDate>Tue, 08 Jun 2021 10:22:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210608-102213/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132503_2022-ford-maverick-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Ford Maverick compact pickup rides right out of the danger zone&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132460_tesla-model-s-plaid-reportedly-sets-quarter-mile-record-of-9-2-seconds&amp;#34;&amp;gt;Tesla Model S Plaid reportedly sets quarter-mile record of 9.2 seconds&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-101935/</link>
      <pubDate>Tue, 08 Jun 2021 10:19:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-101935/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-crime-organised-crackdown/hi-tech-sting-leads-to-global-crackdown-on-organised-crime-over-800-detained-idUSKCN2DK0K1&amp;#34;&amp;gt;Hi-tech sting leads to global crackdown on organised crime, over 800 detained&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
CANBERRA/AMSTERDAM (Reuters) -Global law enforcement agencies hacked into an app used by criminals and read millions of encrypted messages, leading to hundreds of arrests of organised crime figures in 18 countries, officials said on Tuesday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>503 Service Unavailable</title>
      <link>https://www.whatsupup.com/blog/giuseppe/fibroma/20210608-101734/</link>
      <pubDate>Tue, 08 Jun 2021 10:17:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/giuseppe/fibroma/20210608-101734/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>503 Service Unavailable</title>
      <link>https://www.whatsupup.com/blog/tweediest/constructed/20210608-101340/</link>
      <pubDate>Tue, 08 Jun 2021 10:13:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tweediest/constructed/20210608-101340/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>503 Service Unavailable</title>
      <link>https://www.whatsupup.com/blog/incremental/comte/20210608-100755/</link>
      <pubDate>Tue, 08 Jun 2021 10:07:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/incremental/comte/20210608-100755/</guid>
      <description>Error 503 Service Unavailable&amp;lt;br&amp;gt;
Service Unavailable&amp;lt;br&amp;gt;
Guru Mediation:&amp;lt;br&amp;gt;
Varnish cache server&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>503 Service Unavailable</title>
      <link>https://www.whatsupup.com/blog/palpable/mulla/20210608-100607/</link>
      <pubDate>Tue, 08 Jun 2021 10:06:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/palpable/mulla/20210608-100607/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210608-082908/</link>
      <pubDate>Tue, 08 Jun 2021 08:29:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210608-082908/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132430_2023-kia-sportage-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2023 Kia Sportage takes on dramatic look&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-082606/</link>
      <pubDate>Tue, 08 Jun 2021 08:26:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-082606/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-attack/man-suspected-of-killing-canadian-muslim-family-was-motivated-by-hate-police-idUSKCN2DJ2DU&amp;#34;&amp;gt;Man suspected of killing Canadian Muslim family was motivated by hate -police&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON, Ontario (Reuters) -A man accused of killing four members of a Canadian Muslim family by running them over in his pickup truck, targeted them in an attack motivated by hate, police said on Monday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-063001/</link>
      <pubDate>Tue, 08 Jun 2021 06:30:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-063001/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/myanmar-junta-defends-response-to-crisis-amid-southeast-asian-criticism-idUSKCN2DK0ES&amp;#34;&amp;gt;Myanmar junta defends response to crisis amid Southeast Asian criticism&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The Myanmar junta&amp;amp;#39;s foreign minister had defended its plan for restoring democracy, state media reported on Tuesday, after a meeting at which Southeast Asian counterparts pressed the army to implement a regional agreement meant to end turmoil.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-042144/</link>
      <pubDate>Tue, 08 Jun 2021 04:21:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-042144/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/foreign-judges-will-remain-part-of-hks-hard-as-a-rock-judicial-system-lam-idUSKCN2DK085&amp;#34;&amp;gt;Foreign judges will remain part of HK&amp;#39;s &amp;#39;hard as a rock&amp;#39; judicial system - Lam&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-australia-crime/australian-police-arrest-over-200-after-cracking-underworld-messaging-app-idUSKCN2DK065&amp;#34;&amp;gt;Australian police arrest over 200 after cracking underworld messaging app&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-022603/</link>
      <pubDate>Tue, 08 Jun 2021 02:26:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-022603/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/perus-castillo-builds-election-lead-but-fujimori-says-wont-concede-yet-idUSKCN2DJ0YP&amp;#34;&amp;gt;Peru&amp;#39;s Castillo builds election lead but Fujimori says won&amp;#39;t concede yet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Peruvian socialist Pedro Castillo widened his lead against right-wing rival Keiko Fujimori in the country&amp;amp;#39;s presidential vote on Monday, but she said she will not concede yet and alleged &amp;amp;#34;irregularities,&amp;amp;#34; although without showing much proof.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-attack/man-suspected-to-killing-a-canadian-muslim-family-by-truck-was-motivated-by-hate-police-idUSKCN2DJ2DU&amp;#34;&amp;gt;Man suspected to killing a Canadian Muslim family by truck was motivated by hate -police&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-colombia-protests/rights-panel-begins-colombia-visit-into-possible-abuses-during-protests-idUSKCN2DJ2KC&amp;#34;&amp;gt;Rights panel begins Colombia visit into possible abuses during protests&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210608-022438/</link>
      <pubDate>Tue, 08 Jun 2021 02:24:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210608-022438/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/03/21/attack-of-week-apple-imessage/&amp;#34;&amp;gt;Attack of the Week: Apple iMessage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-002348/</link>
      <pubDate>Tue, 08 Jun 2021 00:23:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210608-002348/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-cyber-colonial-justice/u-s-seizes-2-3-million-in-bitcoin-paid-to-colonial-pipeline-hackers-idUSKCN2DJ2BN&amp;#34;&amp;gt;U.S. seizes $2.3 million in bitcoin paid to Colonial Pipeline hackers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -The Justice Department on Monday recovered some $2.3 million in cryptocurrency ransom paid by Colonial Pipeline Co, cracking down on hackers who launched the most disruptive U.S. cyberattack on record. | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/06/07/doj-recovers-23-mln-of-colonial-pipeline?videoId=731085806&amp;amp;newsChannel=&amp;#34;&amp;gt;Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peru-socialist-castillo-extends-narrow-lead-in-polarized-vote-idUSKCN2DJ0YP&amp;#34;&amp;gt;Peru socialist Castillo extends narrow lead in polarized vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Peruvian socialist Pedro Castillo edged ahead of right-wing rival Keiko Fujimori in the country&amp;amp;#39;s presidential election vote count on Monday, taking a razor-thin but growing lead in the official tally on the back of a late surge of rural votes.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-attack/killing-of-canadian-muslim-family-with-truck-was-hate-crime-police-say-idUSKCN2DJ2DU&amp;#34;&amp;gt;Killing of Canadian Muslim family with truck was hate crime, police say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-politics/north-koreas-kim-meets-senior-officials-to-address-economy-kcna-idUSKCN2DJ2MM&amp;#34;&amp;gt;North Korea&amp;amp;#39;s Kim meets senior officials to address economy - KCNA&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210608-002331/</link>
      <pubDate>Tue, 08 Jun 2021 00:23:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210608-002331/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/us-seizes-2-3-million-colonial-pipeline-paid-to-ransomware-attackers/&amp;#34;&amp;gt;US seizes $2.3 million Colonial Pipeline paid to ransomware attackers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Funds seized after Justice Department IDs Bitcoin wallet and obtains its private key.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210608-000809/</link>
      <pubDate>Tue, 08 Jun 2021 00:08:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210608-000809/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/&amp;#34;&amp;gt;Justice Dept. Claws Back $2.3M Paid by Colonial Pipeline to Ransomware Gang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The U.S. Department of Justice said today it has recovered $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists last month. The funds had been sent to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/&amp;#34;&amp;gt;DarkSide&amp;lt;/a&amp;gt; , a ransomware-as-a-service syndicate that disbanded after a May 14 farewell message to affiliates saying its Internet servers and cryptocurrency stash were seized by unknown law enforcement entities.&amp;lt;br&amp;gt;
On May 7, the DarkSide ransomware gang sprang its attack against Colonial, which ultimately paid 75 Bitcoin (~$4.4 million) to its tormentors. The company said the attackers only hit its business IT networks — not its pipeline security and safety systems — but that it shut the pipeline down anyway as a precaution [several publications noted Colonial shut down its pipeline because its billing system was impacted, and it had no way to get paid].&amp;lt;br&amp;gt;
On or around May 14, the DarkSide representative on several Russian-language cybercrime forums &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/&amp;#34;&amp;gt;posted a message saying the group was calling it quits&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
“Servers were seized, money of advertisers and founders was transferred to an unknown account,” read the farewell message. “Hosting support, apart from information ‘at the request of law enforcement agencies,’ does not provide any other information.”&amp;lt;br&amp;gt;
A message from the DarkSide and REvil ransomware-as-a-service cybercrime affiliate programs.&amp;lt;br&amp;gt;
Many security experts said they suspected DarkSide was just laying low for a while thanks to the heat from the Colonial attack, and that the group would re-emerge under a new banner in the coming months. And while that may be true, the seizure announced today by the DOJ certainly supports the DarkSide administrator’s claims that their closure was involuntary.&amp;lt;br&amp;gt;
Security firms have suspected for months that the DarkSide gang shares some leadership with that of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/?s=revil&amp;#34;&amp;gt;REvil, a.k.a. Sodinokibi&amp;lt;/a&amp;gt; , another ransomware-as-a-service platform that closed up shop in 2019 after bragging that it had extorted more than $2 billion from victims. That suspicion was solidified further when the REvil administrator added his comments to the announcement about DarkSide’s closure (see screenshot above).&amp;lt;br&amp;gt;
First surfacing on Russian language hacking forums in August 2020, DarkSide is a ransomware-as-a-service platform that vetted cybercriminals can use to infect companies with ransomware and carry out negotiations and payments with victims. DarkSide says it targets only big companies, and forbids affiliates from dropping ransomware on organizations in several industries, including healthcare, funeral services, education, public sector and non-profits.&amp;lt;br&amp;gt;
According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.elliptic.co/blog/darkside-ransomware-has-netted-over-90-million-in-bitcoin&amp;#34;&amp;gt;an analysis&amp;lt;/a&amp;gt; published May 18 by cryptocurrency security firm Elliptic , 47 cybercrime victims paid DarkSide a total of $90 million in Bitcoin, putting the average ransom payment of DarkSide victims at just shy of $2 million. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/#more-55877&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210607-202533/</link>
      <pubDate>Mon, 07 Jun 2021 20:25:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210607-202533/</guid>
      <description>June 7, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/06/07/The-Netherlands.html&amp;#34;&amp;gt;I will be moving to the Netherlands&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-202407/</link>
      <pubDate>Mon, 07 Jun 2021 20:24:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-202407/</guid>
      <description>&amp;lt;p&amp;gt;FDA approves Biogen&amp;#39;s Alzheimer&amp;#39;s drug despite controversy over mixed clinical trial results &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DJ10U&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-opposition-gudkov/kremlin-critic-dmitry-gudkov-says-his-russia-exit-is-a-tactical-retreat-idUSKCN2DJ1SB&amp;#34;&amp;gt;Kremlin critic Dmitry Gudkov says his Russia exit is a tactical retreat&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-usa/bidens-to-do-list-on-foreign-trip-rally-allies-against-covid-putin-idUSKCN2DJ0E5&amp;#34;&amp;gt;Biden&amp;amp;#39;s to-do list on foreign trip: Rally allies against COVID, Putin&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210607-182413/</link>
      <pubDate>Mon, 07 Jun 2021 18:24:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210607-182413/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132499_1970-plymouth-aar-cuda-heads-to-auction&amp;#34;&amp;gt;1970 Plymouth AAR &amp;#39;Cuda heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-181957/</link>
      <pubDate>Mon, 07 Jun 2021 18:19:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-181957/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-election-internet/russian-accounts-still-active-on-pro-trump-sites-researchers-idUSKCN2DJ1OA&amp;#34;&amp;gt;Russian accounts still active on pro-Trump sites -researchers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO (Reuters) -A group believed to be Russian has remained active on internet services favored by far-right Americans, showing efforts to interfere in U.S. politics continue after the election, according to reports from social media research firm Graphika and nonprofit Advance Democracy Inc.&amp;lt;br&amp;gt;
SAN FRANCISCO, June 7 A group believed to be
Russian has remained active on internet services favored by
far-right Americans, showing efforts to interfere in U.S.
politics continue after the election, according to reports from
social media research firm Graphika and nonprofit Advance
Democracy Inc.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israeli-parliament-to-vote-on-approving-new-government-by-june-14-idUSKCN2DJ1JD&amp;#34;&amp;gt;Israeli parliament to vote on approving new government by June 14&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -A vote in Israel&amp;amp;#39;s legislature on approving a new government poised to unseat Prime Minister Benjamin Netanyahu will be held within a week, parliament&amp;amp;#39;s speaker said on Monday, without setting a specific date.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peruvian-leftist-castillo-inches-ahead-in-tight-presidential-vote-idUSKCN2DJ0YP&amp;#34;&amp;gt;Peruvian leftist Castillo inches ahead in tight presidential vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-election/mexico-president-says-transformation-intact-after-mixed-election-night-idUSKCN2DJ0NH&amp;#34;&amp;gt;Mexico president says &amp;amp;#39;transformation&amp;amp;#39; intact after mixed election night&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Posts by Sahas Katta · Smartcar blog</title>
      <link>https://www.whatsupup.com/blog/trifid/ragwort/20210607-181852/</link>
      <pubDate>Mon, 07 Jun 2021 18:18:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/trifid/ragwort/20210607-181852/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://smartcar.com/dpa/&amp;#34;&amp;gt;Data Privacy Addendum&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210607-181716/</link>
      <pubDate>Mon, 07 Jun 2021 18:17:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210607-181716/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#metaprogramming&amp;#34;&amp;gt;metaprogramming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#templates&amp;#34;&amp;gt;templates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
In Bjarne Stroustrup’s paper &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.stroustrup.com/good_concepts.pdf&amp;#34;&amp;gt;P0557R1 “Concepts: The Future of Generic Programming”&amp;lt;/a&amp;gt; (January 2017),
section 6 is titled “Concept Overloading,” which Stroustrup distinguishes from the
traditional approach “using helper functions and tag dispatch.”
More subtly, Stroustrup seems to distinguish between true “overloading” (asking the compiler
to resolve among multiple viable overloads) and other means of giving-two-things-the-same-name:&amp;lt;br&amp;gt;
Where we cannot overload, we need to use
workarounds (e.g., traits,&amp;lt;br&amp;gt;
enable_if&amp;lt;br&amp;gt;
, or helper functions).&amp;lt;br&amp;gt;
I’ll present two problems, each with two solutions (one in C&#43;&#43;11 and one in C&#43;&#43;20),
which I think illustrate something interesting about “concept overloading” versus…
other things. …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210607-180938/</link>
      <pubDate>Mon, 07 Jun 2021 18:09:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210607-180938/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-an-email-sender-app-with-retool-and-sendgrid/&amp;#34;&amp;gt;Building an email sender app with the SendGrid Mail Send API in under an hour This tutorial is going to walk through how to build a Retool app that uses the SendGrid API to send emails to your customers – in just under an hour (yes, one hour).&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-native-datepicker-libraries/&amp;#34;&amp;gt;The best React Native datepicker libraries that will save you time We researched and tried a handful of popular React-Native date picker libraries. In this post, we’ll walk you through our favorites and the reasoning behind each selection.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-oddbox-sped-up-customer-support/&amp;#34;&amp;gt;How Oddbox matured (and sped up) their customer service using Retool When you ship tens of thousands of boxes of produce a week, issues happen. This is the story of how the PM team helped customer service deliver better user experiences using Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/build-together-in-retool-with-cord-comments-and-annotations/&amp;#34;&amp;gt;Build together in Retool with Cord comments and annotations In this post, we’ll walk through how to use Retool with Cord. Cord lets you add comments, annotations, and guides directly in your favorite apps.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-shopify-customer-and-order-dashboard-with-graphql-in-retool/&amp;#34;&amp;gt;Building a Shopify customer and order dashboard with GraphQL in Retool We’re going to build a customer dashboard that lets you see orders and products in one view using the Shopify GraphQL API in Retool.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/isolation-levels-and-locking-in-relational-databases/&amp;#34;&amp;gt;Isolation levels and locking in relational databases The realm of database locking and isolation has an almost mystic air to it. This post will hopefully make things simpler.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-great-internal-tools-jeremy-edberg-ebay-netflix-reddit/&amp;#34;&amp;gt;How to build great internal tools: Jeremy Edberg (eBay, Reddit, Netflix) Jeremy Edberg has been working as an engineer in the Bay Area since 1998. He’s worked on great internal tools at eBay, as the first engineering hire at Reddit, and as the first reliability engineer at Netflix.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-retool-helped-run-a-presidential-campaign/&amp;#34;&amp;gt;How Retool helped run a presidential campaign Sunil Sadasivan ran tech for Cory Booker&amp;amp;#39;s 2020 presidential campaign, and talked to us about the challenges of quickly scaling a team to match.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-to-build-great-internal-tools-chad-rosen-twitter-wealthfront/&amp;#34;&amp;gt;How to build great internal tools: Chad Rosen (Twitter, Wealthfront) Chad Rosen has been working as a software engineer and engineering manager in the Bay Area since 2001. He has helped contribute to both the product and internal tools at companies like Good Technology, ClickShift, Twitter, and Wealthfront.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/whats-an-acid-compliant-database/&amp;#34;&amp;gt;What&amp;amp;#39;s an ACID compliant database? Most modern SQL DBs use transactional standards like ACID to ensure data integrity and keep your users from seeing wrong or stale data, and this post explores how they work.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/erp-for-engineers/&amp;#34;&amp;gt;What’s SAP? What&amp;amp;#39;s SAP? And why is it worth $163B?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/building-a-listing-approval-tool-in-mongodb/&amp;#34;&amp;gt;Building a listing approval tool in MongoDB In this post, we’re going to build a full featured Airbnb listing review app that reads and writes to MongoDB, with minimal code, in under an hour.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/formatting-and-dealing-with-dates-in-sql/&amp;#34;&amp;gt;Formatting and dealing with dates in SQL This post will run through how you can effectively work with dates in SQL so you can resolve your issue quickly and get back to bed.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/state-of-internal-tools-survey-announcement-2020/&amp;#34;&amp;gt;Tell us about how you build your internal tools! We&amp;amp;#39;re running a survey about how teams build internal tools, and we&amp;amp;#39;d love to hear from you about it.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210607-180730/</link>
      <pubDate>Mon, 07 Jun 2021 18:07:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210607-180730/</guid>
      <description>This appears to be the case regardless of which Russian government site you visit. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://browser.yandex.com/help/tls/tls.html&amp;#34;&amp;gt;Russian search giant Yandex&amp;lt;/a&amp;gt; , the laws of the Russian Federation demand that encrypted connections be installed according to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/GOST_(block_cipher)&amp;#34;&amp;gt;Russian GOST cryptographic algorithm&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210607-140656/</link>
      <pubDate>Mon, 07 Jun 2021 14:06:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210607-140656/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/adventures-in-contacting-the-russian-fsb/&amp;#34;&amp;gt;Adventures in Contacting the Russian FSB&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KrebsOnSecurity recently had occasion to contact the Russian Federal Security Service (FSB), the Russian equivalent of the U.S. Federal Bureau of Investigation (FBI). In the process of doing so, I encountered a small snag: The FSB’s website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware.&amp;lt;br&amp;gt;
The FSB headquarters at Lubyanka Square, Moscow. Image: Wikipedia.&amp;lt;br&amp;gt;
The reason I contacted the FSB — one of the successor agencies to the Russian KGB — ironically enough had to do with security concerns raised by an infamous Russian hacker about the FSB’s own preferred method of being contacted.&amp;lt;br&amp;gt;
KrebsOnSecurity was seeking comment from the FSB about &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cybersec.org/anews/czib-fsb-rasprostranyaet-troyan-pri-obrashheniyah-pod-vidom-generatora-sluchajnyh-chisel.html&amp;#34;&amp;gt;a blog post&amp;lt;/a&amp;gt; published by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Vladislav_Horohorin&amp;#34;&amp;gt;Vladislav “BadB” Horohorin&amp;lt;/a&amp;gt; , a former international stolen credit card trafficker who served seven years in U.S. federal prison for his role in the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.justice.gov/opa/pr/international-credit-card-trafficker-sentenced-88-months-prison&amp;#34;&amp;gt;theft of $9 million from RBS WorldPay in 2009&amp;lt;/a&amp;gt; . Horohorin, a citizen of Russia, Israel and Ukraine, is now back where he grew up in Ukraine, running a cybersecurity consulting business.&amp;lt;br&amp;gt;
Horohorin’s BadB carding store, badb[.]biz, circa 2007. Image: Archive.org.&amp;lt;br&amp;gt;
Visit the FSB’s website and you might notice its web address starts with http:// instead of https://, meaning the site is not using an encryption certificate. In practical terms, any information shared between the visitor and the website is sent in plain text and will be visible to anyone who has access to that traffic.&amp;lt;br&amp;gt;
This appears to be the case regardless of which Russian government site you visit. According to &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://browser.yandex.com/help/tls/tls.html&amp;#34;&amp;gt;Russian search giant Yandex&amp;lt;/a&amp;gt; , the laws of the Russian federation demand that encrypted connections be installed according to the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/GOST_(block_cipher)&amp;#34;&amp;gt;Russian GOST cryptographic algorithm&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
That means those who have a reason to send encrypted communications to a Russian government organization — including ordinary things like making a payment for a government license or fine, or filing legal documents — need to first install CryptoPro , a Windows-only application that loads the GOST encryption libraries on a user’s computer.&amp;lt;br&amp;gt;
But if you want to talk directly to the FSB over an encrypted connection, you can just install their own client, which bundles the CryptoPro code. Visit the FSB’s site and select the option to “transfer meaningful information to operational units,” and you’ll see a prompt to install a “random number generation” application that is needed before a specific contact form on the FSB’s website will load properly.&amp;lt;br&amp;gt;
Mind you, I’m not suggesting anyone go do that: Horohorin pointed out that this random number generator was flagged by 20 different antivirus and security products as malicious.&amp;lt;br&amp;gt;
“Think well before contacting the FSB for any questions or dealing with them, and if you nevertheless decide to do this, it is better to use a virtual machine,” Horohorin wrote. “And a spacesuit. And, preferably, while in another country.”&amp;lt;br&amp;gt;
Antivirus product detections on the FSB’s VPN software. Image: VirusTotal.&amp;lt;br&amp;gt;
It’s probably worth mentioning that the FSB is the same agency that’s been sanctioned for malicious cyber activity by the U.S. government on multiple occasions over the past five years. According to the most recent sanctions by the U.S. Treasury Department , the FSB is known for recruiting criminal hackers from underground forums and offering them legal cover for their actions.&amp;lt;br&amp;gt;
“To bolster its malicious cyber operations, the FSB cultivates and co-opts criminal hackers, including the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/12/inside-evil-corp-a-100m-cybercrime-menace/&amp;#34;&amp;gt;previously designated Evil Corp.&amp;lt;/a&amp;gt; , enabling them to engage in disruptive ransomware attacks and phishing campaigns,” reads &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://home.treasury.gov/news/press-releases/jy0127&amp;#34;&amp;gt;a Treasury assessment from April 2021&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
While Horohorin seems convinced the FSB is disseminating malware, it is not unusual for a large number of security tools used by &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.virustotal.com&amp;#34;&amp;gt;VirusTotal&amp;lt;/a&amp;gt; or other similar malware “sandbox” services to incorrectly flag safe files as bad or suspicious — an all-too-common condition known as a “false positive.”&amp;lt;br&amp;gt;
Late last year I &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/briankrebs/status/1326235217250672641&amp;#34;&amp;gt;warned my followers on Twitter&amp;lt;/a&amp;gt; to put off installing updates for their Dell products until the company could explain why a bunch of its software drivers were being detected as malware by two dozen antivirus tools. Those all turned out to be false positives.&amp;lt;br&amp;gt;
To really figure out what this FSB software was doing, I turned to Lance James , the founder of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.unit221b.com&amp;#34;&amp;gt;Unit221B&amp;lt;/a&amp;gt; , a New York City based cybersecurity firm. James said each download request generates a new executable program. That is because the uniqueness of the file itself is part of what makes the one-to-one encrypted connection possible. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/06/adventures-in-contacting-the-russian-fsb/#more-55809&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-121911/</link>
      <pubDate>Mon, 07 Jun 2021 12:19:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-121911/</guid>
      <description>Jeff Bezos to join winner of seat on Blue Origin space flight &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSL3N2NP2OD&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit/from-vaccines-to-climate-g7-hopes-to-show-the-west-is-not-over-yet-idUSKCN2DJ0SA&amp;#34;&amp;gt;From vaccines to climate, G7 hopes to show the West is not over yet&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-101953/</link>
      <pubDate>Mon, 07 Jun 2021 10:19:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-101953/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-usa/biden-g7-nato-to-do-list-unite-allies-fight-autocracy-attack-covid-19-idUSKCN2DJ0E5&amp;#34;&amp;gt;Biden G7, NATO to-do list: unite allies, fight autocracy, attack COVID-19&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peru-awakes-to-uncertain-future-with-polarized-vote-on-knife-edge-idUSKCN2DJ0YP&amp;#34;&amp;gt;Peru awakes to uncertain future with polarized vote on knife-edge&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-041847/</link>
      <pubDate>Mon, 07 Jun 2021 04:18:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-041847/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election/peru-on-edge-as-socialist-castillo-holds-razor-thin-lead-in-polarized-vote-idUSKCN2DI05G&amp;#34;&amp;gt;Peru on edge as socialist Castillo holds razor-thin lead in polarized vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210607-022146/</link>
      <pubDate>Mon, 07 Jun 2021 02:21:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210607-022146/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2014/06/16/anafunctors/&amp;#34;&amp;gt;Anafunctors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-021925/</link>
      <pubDate>Mon, 07 Jun 2021 02:19:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-021925/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-xinjiang-births-exclusive/exclusive-amid-accusations-of-genocide-from-the-west-china-policies-could-cut-millions-of-uyghur-births-in-xinjiang-report-idUSKCN2DJ02J&amp;#34;&amp;gt;Exclusive: Amid accusations of genocide from the West, China policies could cut millions of Uyghur births in Xinjiang – report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Chinese birth control policies could cut between 2.6 to 4.5 million births of the Uyghur and other ethnic minorities in southern Xinjiang within 20 years, up to a third of the region’s projected minority population, according to a new analysis by a German researcher.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210607-002104/</link>
      <pubDate>Mon, 07 Jun 2021 00:21:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210607-002104/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/09/16/the-poisson-distribution-and-sterling-numbers/&amp;#34;&amp;gt;The Poisson distribution and Stirling numbers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-001908/</link>
      <pubDate>Mon, 07 Jun 2021 00:19:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210607-001908/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-coronavirus-vaccinations/hundreds-of-former-leaders-urge-g7-to-vaccinate-poor-against-covid-19-idUSKCN2DI0NT&amp;#34;&amp;gt;Hundreds of former leaders urge G7 to vaccinate poor against COVID-19&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
One hundred former presidents, prime ministers and foreign ministers have urged the Group of Seven (G7) rich nations to pay for global coronavirus vaccinations to help stop the virus mutating and returning as a worldwide threat.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210606-221144/</link>
      <pubDate>Sun, 06 Jun 2021 22:11:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210606-221144/</guid>
      <description>&amp;lt;p&amp;gt;Sriram Krishnan &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/sriramk&amp;#34;&amp;gt;@sriramk&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
DAOs on GTS: We have a  special ep. tonight about DAOs. @aarthir and I have a star guest line up joining us
@Clubhouse.&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;↳ @Iiterature of @viamirror
↳ @WillPapper &#43; @ianIDEO of  @SyndicateDAO
↳ @pplpleasr1 of @PleasrDAO
↳ @alive_eth
↳ @avichal&amp;lt;/p&amp;gt;
&amp;lt;p&amp;gt;Join us at 9pmPT! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/0ovcYxxvB9&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/0ovcYxxvB9&amp;#34;&amp;gt;https://t.co/0ovcYxxvB9&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-201838/</link>
      <pubDate>Sun, 06 Jun 2021 20:18:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-201838/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics-netanyahu/netanyahu-alleges-israeli-election-fraud-accuses-rival-of-duplicity-idUSKCN2DI0D3&amp;#34;&amp;gt;Netanyahu alleges Israeli election fraud, accuses rival of duplicity&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Prime Minister Benjamin Netanyahu said on Sunday a newly formed Israeli coalition that is poised to unseat him was the result of &amp;amp;#34;the greatest election fraud&amp;amp;#34; in the history of democracy.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-eu/before-talks-on-n-ireland-uk-calls-for-pragmatism-and-eu-seeks-trust-idUSKCN2DI0G3&amp;#34;&amp;gt;Before talks on N.Ireland, UK calls for pragmatism and EU seeks trust&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children-pope/pope-says-canada-school-discovery-painful-but-stops-short-of-apology-idUSKCN2DI07K&amp;#34;&amp;gt;Pope says Canada school discovery painful, but stops short of apology&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-181850/</link>
      <pubDate>Sun, 06 Jun 2021 18:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-181850/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-germany-politics-election/conservative-win-in-german-state-election-boosts-laschets-chancellery-hopes-idUSKCN2DI031&amp;#34;&amp;gt;Conservative win in German state election boosts Laschet&amp;#39;s chancellery hopes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-161851/</link>
      <pubDate>Sun, 06 Jun 2021 16:18:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-161851/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics-netanyahu/israels-netanyahu-alleges-election-fraud-accuses-rival-of-duplicity-idUSKCN2DI0D3&amp;#34;&amp;gt;Israel&amp;#39;s Netanyahu alleges election fraud, accuses rival of duplicity&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Prime Minister Benjamin Netanyahu said on Sunday a newly formed Israeli coalition that is poised to unseat him was the result of &amp;amp;#34;the greatest election fraud&amp;amp;#34; in the history of democracy.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-141849/</link>
      <pubDate>Sun, 06 Jun 2021 14:18:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-141849/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children-pope/pope-calls-for-reconciliation-healing-over-canada-school-discovery-idUSKCN2DI07K&amp;#34;&amp;gt;Pope calls for reconciliation, healing over Canada school discovery&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-121914/</link>
      <pubDate>Sun, 06 Jun 2021 12:19:13 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-121914/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-germany-politics-election/east-german-state-votes-in-final-test-before-election-to-decide-who-replaces-merkel-idUSKCN2DI031&amp;#34;&amp;gt;East German state votes in final test before election to decide who replaces Merkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210606-102339/</link>
      <pubDate>Sun, 06 Jun 2021 10:23:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210606-102339/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132465_someone-paid-382-000-for-a-part-from-james-dean-s-1955-porsche-550-spyder&amp;#34;&amp;gt;Someone paid $382,000 for a part from James Dean&amp;#39;s 1955 Porsche 550 Spyder&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-081834/</link>
      <pubDate>Sun, 06 Jun 2021 08:18:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-081834/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-usa/u-s-boosts-taiwans-covid-19-fight-with-vaccines-as-senators-visit-idUSKCN2DH0OM&amp;#34;&amp;gt;U.S. boosts Taiwan&amp;#39;s COVID-19 fight with vaccines as senators visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-061823/</link>
      <pubDate>Sun, 06 Jun 2021 06:18:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-061823/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-election/mexicans-primed-to-vote-in-midterm-elections-seen-as-referendum-on-president-idUSKCN2DI03W&amp;#34;&amp;gt;Mexicans primed to vote in midterm elections seen as referendum on president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210606-042132/</link>
      <pubDate>Sun, 06 Jun 2021 04:21:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210606-042132/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2017/05/15/algorithms-lecture-notes-and-assignments/&amp;#34;&amp;gt;Algorithms lecture notes and assignments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-041908/</link>
      <pubDate>Sun, 06 Jun 2021 04:19:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-041908/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-usa/u-s-boosts-taiwans-covid-19-fight-with-750000-vaccine-doses-idUSKCN2DH0OM&amp;#34;&amp;gt;U.S. boosts Taiwan&amp;#39;s COVID-19 fight with 750,000 vaccine doses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-021855/</link>
      <pubDate>Sun, 06 Jun 2021 02:18:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-021855/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-usa/taiwan-to-get-750000-covid-19-vaccine-shots-from-u-s-idUSKCN2DH0OM&amp;#34;&amp;gt;Taiwan to get 750,000 COVID-19 vaccine shots from U.S&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
TAIPEI (Reuters) -The United States will donate 750,000 COVID-19 vaccine doses to Taiwan as part of the country&amp;amp;#39;s plan to share shots globally, U.S. Senator Tammy Duckworth said on Sunday, offering a much-needed boost to the island&amp;amp;#39;s fight against the pandemic.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210606-021731/</link>
      <pubDate>Sun, 06 Jun 2021 02:17:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210606-021731/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2016/03/01/attack-of-week-drown/&amp;#34;&amp;gt;Attack of the week: DROWN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-002024/</link>
      <pubDate>Sun, 06 Jun 2021 00:20:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210606-002024/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-usa/three-u-s-senators-arrive-in-taiwan-to-meet-president-idUSKCN2DH0OM&amp;#34;&amp;gt;Three U.S. senators arrive in Taiwan, to meet president&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Three U.S. senators arrived in Taiwan on Sunday on a U.S. Air Force freighter and will meet President Tsai Ing-wen to discuss security and other issues, a trip that will likely irritate China.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-221725/</link>
      <pubDate>Sat, 05 Jun 2021 22:17:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-221725/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians/israel-domestic-security-warns-of-violence-as-netanyahu-faces-unseating-idUSKCN2DH0L4&amp;#34;&amp;gt;Israel domestic security warns of violence as Netanyahu faces unseating&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -The head of Israel&amp;amp;#39;s domestic security service issued a rare warning on Saturday of possible violence during one of the most politically charged periods in decades, with the country on the verge of unseating Prime Minister Benjamin Netanyahu, its longest serving leader.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-johnson/uks-johnson-calls-on-g7-to-vaccinate-world-by-end-of-2022-idUSKCN2DH0MS&amp;#34;&amp;gt;UK&amp;amp;#39;s Johnson calls on G7 to vaccinate world by end of 2022&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-142000/</link>
      <pubDate>Sat, 05 Jun 2021 14:19:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-142000/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-peru-election-inequality/left-behind-in-modern-peru-rural-poor-find-a-voice-ahead-of-election-idUSKCN2DH0BB&amp;#34;&amp;gt;Left behind in modern Peru, rural poor find a voice ahead of election&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-121919/</link>
      <pubDate>Sat, 05 Jun 2021 12:19:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-121919/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-organiser-of-tiananmen-vigil-released-on-bail-idUSKCN2DH07U&amp;#34;&amp;gt;Hong Kong organiser of Tiananmen vigil released on bail&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hong Kong activist Chow Hang Tung was released on bail on Saturday, a day after she was detained on suspicion of promoting an unauthorised assembly to commemorate the 1989 Tiananmen Square crackdown on pro-democracy activists in Beijing.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-taiwan-usa/three-u-s-senators-to-visit-taiwan-trip-likely-to-irritate-china-idUSKCN2DH084&amp;#34;&amp;gt;Three U.S. senators to visit Taiwan, trip likely to irritate China&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210605-102145/</link>
      <pubDate>Sat, 05 Jun 2021 10:21:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210605-102145/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132480_trio-of-uber-rare-iconic-aston-martins-for-sale&amp;#34;&amp;gt;Trio of uber-rare iconic Aston Martins for sale&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-101831/</link>
      <pubDate>Sat, 05 Jun 2021 10:18:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-101831/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children-pope/pope-meets-canadian-cardinals-after-indigenous-school-scandal-idUSKCN2DH07N&amp;#34;&amp;gt;Pope meets Canadian cardinals after indigenous school scandal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-041717/</link>
      <pubDate>Sat, 05 Jun 2021 04:17:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-041717/</guid>
      <description>Jun 04 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-el-salvador-corruption/el-salvador-ends-anti-corruption-accord-with-oas-dismaying-u-s-idUSKCN2DG2KE&amp;#34;&amp;gt;El Salvador ends anti-corruption accord with OAS, dismaying U.S&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210605-041444/</link>
      <pubDate>Sat, 05 Jun 2021 04:14:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210605-041444/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#concepts&amp;#34;&amp;gt;concepts&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#litclub&amp;#34;&amp;gt;litclub&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#science&amp;#34;&amp;gt;science&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
A few weeks ago, I read René Daumal’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://archive.org/details/nightofseriousd000daum/&amp;#34;&amp;gt;A Night of Serious Drinking&amp;lt;/a&amp;gt; (published as La grande beuverie 1938; translated by David Coward and E.A. Lovatt 1979). I recommend it;
it’s a fun and erudite satire — sort of a less political Gulliver’s Travels or a less bitter &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Jurgen,_A_Comedy_of_Justice&amp;#34;&amp;gt;Jurgen&amp;lt;/a&amp;gt; . At times it made me think,
“This is clearly an allegory… but of what?” and at other times “Is he satirizing bad scientists, bad writers, bad artists? or all scientists, all writers, all artists?”&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-021652/</link>
      <pubDate>Sat, 05 Jun 2021 02:16:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-021652/</guid>
      <description>(Reuters) -Microsoft Corp on Friday blamed &amp;amp;quot;accidental human error&amp;amp;quot; for its Bing search engine not showing image results for the query &amp;amp;quot;tank man&amp;amp;quot; in the United States and elsewhere after users raised concerns about possible censorship around the Tiananmen Square crackdown anniversary.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-el-salvador-corruption/salvadoran-attorney-general-ends-anti-corruption-accord-with-oas-idUSKCN2DG2KE&amp;#34;&amp;gt;Salvadoran attorney general ends anti-corruption accord with OAS&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210605-021055/</link>
      <pubDate>Sat, 05 Jun 2021 02:10:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210605-021055/</guid>
      <description>Felicia Horowitz &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/FeliciaHorowitz&amp;#34;&amp;gt;@FeliciaHorowitz&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
6/5 at 5pm PT we will look into the crystal ball &amp;amp;amp; see what’s in store for us. in the future. Tech, Gov’t, Medicine, Education, and MORE! w/@balajis @bhorowitz @FABNEWYORK @cdixon @pmarca @conniechan @DoveyWan Join us! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/CFHBSqcOcH&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/CFHBSqcOcH&amp;#34;&amp;gt;https://t.co/CFHBSqcOcH&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210605-001911/</link>
      <pubDate>Sat, 05 Jun 2021 00:19:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210605-001911/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/04/technology/facebook-trump-ban.html&amp;#34;&amp;gt;Facebook Says Trump’s Ban Will Last at Least 2 Years The decision denies the former president a megaphone at least through the midterm elections. The suspension was put in place after the Capitol riot in January. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-001716/</link>
      <pubDate>Sat, 05 Jun 2021 00:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210605-001716/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-microsoft-china/microsoft-says-error-led-to-no-matching-bing-images-for-tiananmen-tank-man-idUSKCN2DG2F3&amp;#34;&amp;gt;Microsoft says error led to no matching Bing images for Tiananmen &amp;#39;tank man&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
(Reuters) -Microsoft Corp on Friday blamed &amp;amp;#34;accidental human error&amp;amp;#34; for its Bing search engine not showing results for the query &amp;amp;#34;tank man&amp;amp;#34; in the United States and elsewhere after users raised concerns about possible censorship around the Tiananmen Square crackdown anniversary.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2022-canada/chinas-2022-olympics-a-chance-to-press-beijing-on-human-rights-canada-idUSKCN2DG2K6&amp;#34;&amp;gt;China&amp;amp;#39;s 2022 Olympics a chance to press Beijing on human rights -Canada&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Security Archives - Open Policy &amp; Advocacy</title>
      <link>https://www.whatsupup.com/blog/sovietizing/ohioan/20210605-000835/</link>
      <pubDate>Sat, 05 Jun 2021 00:08:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sovietizing/ohioan/20210605-000835/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/04/the-van-buren-decision-is-a-strong-step-forward-for-public-interest-research-online/&amp;#34;&amp;gt;The Van Buren decision is a strong step forward for public interest research online&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Udbhav Tiwari&amp;lt;br&amp;gt;
In a victory for security research and other public interest work, yesterday the U.S Supreme Court held that the Computer Fraud and Abuse Act’s (CFAA) “exceeding authorized access” provision should … &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/04/the-van-buren-decision-is-a-strong-step-forward-for-public-interest-research-online/&amp;#34;&amp;gt;Read more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.mozilla.org/netpolicy/2021/06/04/the-van-buren-decision-is-a-strong-step-forward-for-public-interest-research-online/&amp;#34;&amp;gt;The Van Buren decision is a strong step forward for public interest research online&amp;lt;/a&amp;gt; June 4, 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210604-221630/</link>
      <pubDate>Fri, 04 Jun 2021 22:16:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210604-221630/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/&amp;#34;&amp;gt;This is not a drill: VMware vuln with 9.8 severity rating is under attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Code execution flaw in vCenter is exploited to install web shell on unpatched machines.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210604-201926/</link>
      <pubDate>Fri, 04 Jun 2021 20:19:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210604-201926/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/04/technology/facebook-trump-ban.html&amp;#34;&amp;gt;Facebook Says Trump’s Ban Will Last at Least 2 Years The decision denies the former president a megaphone at least through the midterm elections. The suspension was put in place after the Capitol riots in January. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-201747/</link>
      <pubDate>Fri, 04 Jun 2021 20:17:47 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-201747/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children/canadas-trudeau-blasts-catholic-church-for-ignoring-role-in-indigenous-schools-idUSKCN2DG23Y&amp;#34;&amp;gt;Canada&amp;#39;s Trudeau blasts Catholic Church for ignoring role in indigenous schools&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
OTTAWA (Reuters) -The Catholic Church must take responsibility for its role in running many of Canada&amp;amp;#39;s residential schools for indigenous children, Prime Minister Justin Trudeau said on Friday, after the discovery of the remains of 215 children at one former school last month.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nigeria-politics-twitter/nigeria-says-it-suspends-twitter-days-after-presidents-post-removed-idUSKCN2DG20V&amp;#34;&amp;gt;Nigeria says it suspends Twitter days after president&amp;amp;#39;s post removed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20210604-201641/</link>
      <pubDate>Fri, 04 Jun 2021 20:16:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20210604-201641/</guid>
      <description>Boing Boing is published under &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://creativecommons.org/licenses/by-nc-sa/3.0/deed.en_US&amp;#34;&amp;gt;a Creative Commons
license&amp;lt;/a&amp;gt; except where otherwise noted.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-182023/</link>
      <pubDate>Fri, 04 Jun 2021 18:20:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-182023/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132479_bentley-continental-gt3-to-attack-pikes-peak-with-750-hp&amp;#34;&amp;gt;Bentley Continental GT3 to attack Pikes Peak with 750 hp&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210604-181911/</link>
      <pubDate>Fri, 04 Jun 2021 18:19:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210604-181911/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/04/technology/facebook-trump-ban.html&amp;#34;&amp;gt;Facebook Says Trump’s Ban Will Last at Least 2 Years The decision puts a time frame on the former president’s suspension, which was put in place after the Capitol riots in January. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/06/04/us/biden-news-today/facebook-bans-trump-for-at-least-two-years-as-part-of-an-effort-to-curb-abuses-by-politicians&amp;#34;&amp;gt;Facebook bans Trump for at least two years as part of an effort to curb abuses by politicians. This was featured in live coverage. By Mike Isaac and Sheera Frenkel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-181720/</link>
      <pubDate>Fri, 04 Jun 2021 18:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-181720/</guid>
      <description>Live now: Health experts discuss the latest lung-cancer research during our Twitter chat &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/i/lists/1400840512370876420&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-usa-putin/putin-calls-u-s-ransomware-allegations-an-attempt-to-stir-pre-summit-trouble-idUSKCN2DG1ZV&amp;#34;&amp;gt;Putin calls U.S. ransomware allegations an attempt to stir pre-summit trouble&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
President Vladimir Putin said on Friday that suggestions the Russian state was linked to high profile ransomware attacks in the United States were absurd and an attempt to stir trouble ahead of his summit this month with U.S. President Joe Biden.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210604-181657/</link>
      <pubDate>Fri, 04 Jun 2021 18:16:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210604-181657/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/04/business/facebook-eu-uk-antitrust.html&amp;#34;&amp;gt;Facebook Faces Two Antitrust Inquiries in Europe European Union and British regulators are investigating whether Facebook’s “vast troves of data” give Facebook Marketplace an unfair advantage. By Adam Satariano&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-162104/</link>
      <pubDate>Fri, 04 Jun 2021 16:21:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-162104/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132475_inkas-makes-the-latest-cadillac-escalade-bulletproof&amp;#34;&amp;gt;Inkas makes the latest Cadillac Escalade bulletproof&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210604-161946/</link>
      <pubDate>Fri, 04 Jun 2021 16:19:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210604-161946/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/live/2021/06/04/us/biden-news-today/facebook-will-no-longer-exempt-politicians-from-rules-on-hateful-or-false-statements&amp;#34;&amp;gt;Facebook will no longer exempt politicians from rules on hateful or false statements. This was featured in live coverage. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-161742/</link>
      <pubDate>Fri, 04 Jun 2021 16:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-161742/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: JPMorgan resumes political giving, freezes out Republicans who contested the 2020 election &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DG1UC&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/myanmar-junta-opponents-say-no-faith-in-asean-as-envoys-visit-idUSKCN2DG1YG&amp;#34;&amp;gt;Myanmar junta opponents say no faith in ASEAN as envoys visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Opponents of Myanmar&amp;amp;#39;s junta said on Friday they had lost faith in Southeast Asian efforts to end the crisis in the country, as two regional envoys met the military ruler Min Aung Hlaing in the capital Naypyitaw.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-navalny-vote/putin-inks-law-to-ban-extremists-from-elections-amid-navalny-crackdown-idUSKCN2DG1A6&amp;#34;&amp;gt;Putin inks law to ban &amp;amp;#39;extremists&amp;amp;#39; from elections amid Navalny crackdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Blog by Jared Nelsen</title>
      <link>https://www.whatsupup.com/blog/baldish/wince/20210604-160817/</link>
      <pubDate>Fri, 04 Jun 2021 16:08:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/baldish/wince/20210604-160817/</guid>
      <description>&amp;lt;p&amp;gt;February 2020 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/category/industry/&amp;#34;&amp;gt;Industry&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/what-to-do-when-you-reach-number-1-on-hacker-news&amp;#34;&amp;gt;What To Do When You Reach Number 1 On Hacker News&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A reaction to having an article blasted across the entire internet&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jarednelsen.dev/posts/The-horrifically-dystopian-world-of-software-engineering-interviews&amp;#34;&amp;gt;The Horrifically Dystopian World of Software Engineering Interviews&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A Synopsis of The Current State of Software Engineering Interviews&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-141716/</link>
      <pubDate>Fri, 04 Jun 2021 14:17:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-141716/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-tiananmen/hong-kong-locks-down-tiananmen-vigil-park-amid-tight-security-arrests-organiser-idUSKCN2DF2H7&amp;#34;&amp;gt;Hong Kong locks down Tiananmen vigil park amid tight security, arrests organiser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Police blocked off a Hong Kong park to prevent people gathering to commemorate the anniversary of China&amp;amp;#39;s 1989 Tiananmen Square crackdown on Friday and arrested the planned vigil&amp;amp;#39;s organiser.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-eu/eu-to-ban-belarus-carriers-from-midnight-as-opposition-urges-g7-sanctions-idUSKCN2DG0UE&amp;#34;&amp;gt;EU to ban Belarus carriers from midnight as opposition urges G7 sanctions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/06/04/the-week-in-numbers-meme-stocks-and-old?videoId=730909121&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: meme stocks and old shoes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cory Doctorow</title>
      <link>https://www.whatsupup.com/blog/stratification/pride/20210604-141625/</link>
      <pubDate>Fri, 04 Jun 2021 14:16:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/stratification/pride/20210604-141625/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/a-magic-box.html&amp;#34;&amp;gt;&amp;amp;quot;The Art of Computer Designing&amp;amp;quot;: stark, beautiful black-and-white images from 1993&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.osamusato.net/&amp;#34;&amp;gt;Osamu Sato&amp;lt;/a&amp;gt; is a talented polymath artist from Japan, known for his psychedelic video game scores and his pioneering work on computer graphics. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/a-magic-box.html#more-765431&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/precarious-utility.html&amp;#34;&amp;gt;A vase ringed with razor-sharp knives&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Machinist-sculptor Chris Bathgate ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/?s=%22chris%20bathgate%22&amp;#34;&amp;gt;previously&amp;lt;/a&amp;gt; ) has unveiled his latest: a vase ringed with razor-sharp knives (&amp;amp;#34;an object that mischievously demands that it be appreciated for more than its precarious utility&amp;amp;#34;). &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/precarious-utility.html#more-765420&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/carrie-tolstedt.html&amp;#34;&amp;gt;&amp;amp;#34;A piece of shit&amp;amp;#34;: Government report on Wells Fargo corruption shows top executives&amp;amp;#39; direct complicity in millions of acts of fraud&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Last week, the Office of the Comptroller of the Currency &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/24/lock-him-up.html&amp;#34;&amp;gt;handed down stiff penalties&amp;lt;/a&amp;gt; for John Stumpf ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/?s=%22john%20stumpf%22&amp;#34;&amp;gt;previously&amp;lt;/a&amp;gt; ) who was CEO of Wells Fargo during its scandal-haunted decade, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2019/04/01/rip-charlie-manson.html&amp;#34;&amp;gt;during which time&amp;lt;/a&amp;gt; it stole from rich people, poor people, veterans, active-service military personnel, homeowners, small businesses, etc, as well as 2,000,000 ordinary customers who had fraudulent accounts opened in their names in order to bleed them of transaction fees, sometimes at the expense of their good credit and even their financial solvency. Under the deal, Stumpf will have to pay $17.5m in fines and cannot ever work in finance again (don&amp;amp;#39;t worry, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2017/04/10/fraud-started-in-2002.html&amp;#34;&amp;gt;he&amp;amp;#39;s still a multi-multi-multi millionaire&amp;lt;/a&amp;gt; ). &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/28/carrie-tolstedt.html#more-765414&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
3:19 pm Mon, Jan 27, 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/27/podcast-the-case-for-citi.html&amp;#34;&amp;gt;Podcast: The case for … cities that aren&amp;amp;#39;t dystopian surveillance states&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
For my latest podcast, I read my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.theguardian.com/cities/2020/jan/17/the-case-for-cities-where-youre-the-sensor-not-the-thing-being-sensed&amp;#34;&amp;gt;Guardian Cities column&amp;lt;/a&amp;gt; , &amp;amp;#34;The case for … cities that aren&amp;amp;#39;t dystopian surveillance states,&amp;amp;#34; which was the last piece ever commissioned for the section. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://boingboing.net/2020/01/27/podcast-the-case-for-citi.html#more-765329&amp;#34;&amp;gt;(more…)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Boing Boing is published under &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://creativecommons.org/licenses/by-nc-sa/3.0/deed.en_US&amp;#34;&amp;gt;a Creative Commons
 license&amp;lt;/a&amp;gt; except where otherwise noted.&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210604-141506/</link>
      <pubDate>Fri, 04 Jun 2021 14:15:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210604-141506/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/announcing-new-abuse-research-grants.html&amp;#34;&amp;gt;Announcing New Abuse Research Grants Program&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Anna Hupa,  Marc Henson, and Martin Straka, Google VRP Team &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/announcing-new-abuse-research-grants.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Anna Hupa,  Marc Henson, and Martin Straka, Google VRP Team&amp;lt;br&amp;gt;
Our Abuse Bug Bounty program has proved tremendously successful in the past three years since its introduction – thanks to our incredibly engaged community of researchers. Their contributions resulted in &#43;1,000 valid bugs, helping us raise the bar in combating &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/abuse-risk&amp;#34;&amp;gt;product abuse&amp;lt;/a&amp;gt; . As a result of this continued success, today we are announcing a new experimental Abuse Research Grants Program in addition to the already existing &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.blogger.com/&amp;#34;&amp;gt;Vulnerability Research Grants&amp;lt;/a&amp;gt; . Similar to other Research Grant Programs, these grants are up-front awards that our top researchers will receive before they ever submit a bug. Last year, we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/09/announcing-new-reward-amounts-for-abuse.html&amp;#34;&amp;gt;increased our rewards&amp;lt;/a&amp;gt; to recognize the important work of our community. The growth of this program would not have been possible without partners like David ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/xdavidhu&amp;#34;&amp;gt;@xdavidhu&amp;lt;/a&amp;gt; ), Zohar ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.ehpus.com/&amp;#34;&amp;gt;ehpus.com&amp;lt;/a&amp;gt; ), and Ademar ( &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/nowaskyjr&amp;#34;&amp;gt;@nowaskyjr&amp;lt;/a&amp;gt; ) who, on top of becoming our top research experts in &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/abuse-risk&amp;#34;&amp;gt;Product Abuse&amp;lt;/a&amp;gt; , regularly contribute to transparency by sharing their work, further inspiring and influencing our community of researchers. Despite the growth and success of this program, there remains more work to be done. With our new Abuse Research Grants Program, we hope to bring even more awareness to product abuse by connecting more closely with our experienced researchers – so we can all work together to overcome these challenges, prevent product abuse and keep our users safe. Here’s how the program works:&amp;lt;br&amp;gt;
We invite our top abuse researchers to the program.&amp;lt;br&amp;gt;
We award grants immediately before research begins, no strings attached.&amp;lt;br&amp;gt;
Bug Hunters apply for the targets we share with them and start their research.&amp;lt;br&amp;gt;
On top of the grant, researchers are eligible for regular rewards for the bugs they discover in scope of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/vrp&amp;#34;&amp;gt;our Bug Bounty program&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
To learn more about this and other grant programs, visit &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://goo.gle/grantz&amp;#34;&amp;gt;our rules page&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-122015/</link>
      <pubDate>Fri, 04 Jun 2021 12:20:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-122015/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129686_2023-bmw-x7-spy-shots&amp;#34;&amp;gt;2023 BMW X7 spy shots: 7-Series styling in the cards for flagship SUV&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210604-121643/</link>
      <pubDate>Fri, 04 Jun 2021 12:16:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210604-121643/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/justice-department-tells-prosecutors-to-closely-track-ransomware-cases/&amp;#34;&amp;gt;Ransomware will now get priority treatment at the Justice Department&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Directive comes as ransomware is exposing the fragility of critical supply chains.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-101943/</link>
      <pubDate>Fri, 04 Jun 2021 10:19:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210604-101943/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1122220_1-of-1-bugatti-la-voiture-noire-finally-ready-for-delivery&amp;#34;&amp;gt;1-of-1 Bugatti La Voiture Noire finally ready for delivery&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-101649/</link>
      <pubDate>Fri, 04 Jun 2021 10:16:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-101649/</guid>
      <description>HONG KONG (Reuters) -Hong Kong closed off a park where tens of thousands gather annually to commemorate China&amp;#39;s 1989 Tiananmen crackdown and arrested the vigil&amp;#39;s organiser, in what activists see as suppression of one of the city&amp;#39;s main symbols of democratic hope.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays | Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20210604-101358/</link>
      <pubDate>Fri, 04 Jun 2021 10:13:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20210604-101358/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/essays#content&amp;#34;&amp;gt;Skip to content&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Menu&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/essays/&amp;#34;&amp;gt;Essays&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/about/&amp;#34;&amp;gt;Moi&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/searchbound&amp;#34;&amp;gt;Twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Essays&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/part-two-i-sell-onions-on-the-internet/&amp;#34;&amp;gt;part two, I sell onions on the Internet&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/building-from-a-place-of-surrender/&amp;#34;&amp;gt;Building from a place of surrender&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/behind-the-scenes-carpet-pad-recycling-business-1997/&amp;#34;&amp;gt;Behind the scenes of a carpet pad recycling business in 1997&amp;lt;/a&amp;gt; : 2021&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/building-things-that-do-just-one-thing/&amp;#34;&amp;gt;Building things that do [ just one thing ]&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/let-go-then-go/&amp;#34;&amp;gt;Let go, then go&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/must-ride-mule-to-from-work-location/&amp;#34;&amp;gt;Must ride mule (to &amp;amp;amp; from) work location&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/benevolent-uplifting-cuss-words/&amp;#34;&amp;gt;Benevolent, uplifting cuss words&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/give-me-grunt-work/&amp;#34;&amp;gt;Give me grunt work&amp;lt;/a&amp;gt; : 2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/dude-that-built-duderanch-com/&amp;#34;&amp;gt;The dude that built DudeRanch.com&amp;lt;/a&amp;gt; : 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/i-sell-onions-on-the-internet/&amp;#34;&amp;gt;I sell onions on the Internet&amp;lt;/a&amp;gt; : 2019&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/slow-down-wander/&amp;#34;&amp;gt;Slow down &amp;amp;amp; wander&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/window-shopping-expired-domain-names/&amp;#34;&amp;gt;Window shopping for expired Domain Names&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deepsouthventures.com/build-a-side-business/&amp;#34;&amp;gt;Want to build a side business? Just buy a great Domain Name&amp;lt;/a&amp;gt; : 2017&amp;lt;br&amp;gt;
© Peter Askew &amp;amp;amp; Deep South Ventures | 2021&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-081736/</link>
      <pubDate>Fri, 04 Jun 2021 08:17:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-081736/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-tiananmen/hong-kong-cordons-off-annual-tiananmen-vigil-site-arrests-organiser-idUSKCN2DF2H7&amp;#34;&amp;gt;Hong Kong cordons off annual Tiananmen vigil site, arrests organiser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Hong Kong closed off Victoria Park where tens of thousands gather annually to commemorate China&amp;amp;#39;s 1989 Tiananmen crackdown and arrested the vigil&amp;amp;#39;s organiser, in what activists see as suppression of one of the city&amp;amp;#39;s key symbols of democratic hope.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-suukyi/lawyer-for-myanmars-suu-kyi-worried-over-representation-for-secrets-case-idUSKCN2DG0L4&amp;#34;&amp;gt;Lawyer for Myanmar&amp;amp;#39;s Suu Kyi worried over representation for secrets case&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Essays | Deep South Ventures</title>
      <link>https://www.whatsupup.com/blog/depository/unfitted/20210604-081432/</link>
      <pubDate>Fri, 04 Jun 2021 08:14:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/depository/unfitted/20210604-081432/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210604-041916/</link>
      <pubDate>Fri, 04 Jun 2021 04:19:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210604-041916/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/05/30/competitive-programming-in-haskell-permutations/&amp;#34;&amp;gt;Competitive programming in Haskell: permutations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-041723/</link>
      <pubDate>Fri, 04 Jun 2021 04:17:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-041723/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-tiananmen/hong-kong-cracks-down-on-tiananmen-commemorations-arrests-vigil-organiser-idUSKCN2DF2H7&amp;#34;&amp;gt;Hong Kong cracks down on Tiananmen commemorations, arrests vigil organiser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hong Kong police arrested on Friday an organiser of annual vigils for the victims of China&amp;amp;#39;s 1989 Tiananmen crackdown on pro-democracy protesters, in what activists see as a suppression of one of the city&amp;amp;#39;s most powerful symbols of democratic hope.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210604-041622/</link>
      <pubDate>Fri, 04 Jun 2021 04:16:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210604-041622/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitters-certainty-problem&amp;#34;&amp;gt;Twitter’s Certainty Problem&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/twitters-certainty-problem&amp;#34;&amp;gt;Definitiveness is one of Twitter&amp;#39;s core characteristics. Should it be?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-skyrocketing-import-costs-are&amp;#34;&amp;gt;Why Skyrocketing Import Costs Are Hammering Amazon Sellers (And You)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-skyrocketing-import-costs-are&amp;#34;&amp;gt;Shipping one container from China to the U.S. cost $2,000 a year ago. Now it’s up to $15,000, leaving sellers scrambling and causing product prices to …&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210604-041030/</link>
      <pubDate>Fri, 04 Jun 2021 04:10:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210604-041030/</guid>
      <description>04 Jun 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-06-04/an-unbelievable-demo.html&amp;#34;&amp;gt;An Unbelievable Demo&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
My &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/zones.html&amp;#34;&amp;gt;Solaris 10 Zones&amp;lt;/a&amp;gt; page from 2005: where I had developed models for configuring Zones (containers) with Resource Controls. This was pioneering work in the performance isolation of containers (nowadays the realm of Linux cgroups). Sun later based their official documentation on my work (without attribution! Their excuse was that company policy forbid them from listing a non-Sun source as a reference).&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210604-021854/</link>
      <pubDate>Fri, 04 Jun 2021 02:18:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210604-021854/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/03/technology/facebook-politicians-posts.html&amp;#34;&amp;gt;Facebook Plans to End Hands-Off Approach to Politicians’ Posts The social network, under pressure since barring former President Donald J. Trump, will no longer automatically give world leaders special treatment. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-021705/</link>
      <pubDate>Fri, 04 Jun 2021 02:17:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-021705/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-tiananmen/hk-police-arrest-prominent-organiser-of-tiananmen-vigils-on-crackdowns-anniversary-colleagues-idUSKCN2DF2H7&amp;#34;&amp;gt;HK police arrest prominent organiser of Tiananmen vigils on crackdown&amp;#39;s anniversary-colleagues&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Hong Kong police on Friday arrested activist Chow Hang Tung, vice-chairwoman of the group which organises annual vigils for the victims of China&amp;amp;#39;s 1989 Tiananmen crackdown on pro-democracy protesters, two of her colleagues said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-australia-abuse-pell-media/australian-media-fined-840000-for-gag-order-breach-in-pell-sex-assault-case-idUSKCN2DG02H&amp;#34;&amp;gt;Australian media fined $840,000 for gag order breach in Pell sex assault case&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-001721/</link>
      <pubDate>Fri, 04 Jun 2021 00:17:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210604-001721/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-india-witness-wide/witnessing-covid-chaos-in-indias-hospitals-graveyards-and-crematoriums-idUSKCN2DF2IE&amp;#34;&amp;gt;Witnessing COVID chaos in India&amp;#39;s hospitals, graveyards and crematoriums&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-tiananmen/hong-kong-police-to-try-to-stifle-any-commemoration-of-tiananmen-crackdown-idUSKCN2DF2H7&amp;#34;&amp;gt;Hong Kong police to try to stifle any commemoration of Tiananmen crackdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-221742/</link>
      <pubDate>Thu, 03 Jun 2021 22:17:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-221742/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-blogger/opposition-decries-hostage-video-as-belarus-airs-confession-of-detained-journalist-idUSKCN2DF2DB&amp;#34;&amp;gt;Opposition decries &amp;#39;hostage&amp;#39; video as Belarus airs confession of detained journalist&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mali-politics-france/pressuring-junta-france-suspends-joint-military-operations-with-malian-forces-idUSKCN2DF28T&amp;#34;&amp;gt;Pressuring junta, France suspends joint military operations with Malian forces&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210603-221733/</link>
      <pubDate>Thu, 03 Jun 2021 22:17:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210603-221733/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang/&amp;#34;&amp;gt;Attack on meat supplier came from REvil, ransomware’s most cutthroat gang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210603-220811/</link>
      <pubDate>Thu, 03 Jun 2021 22:08:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210603-220811/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-oddbox-sped-up-customer-support/&amp;#34;&amp;gt;How Oddbox matured (and sped up) their customer service using Retool According to Oddbox, over 3 million tons of fruits and vegetables are wasted before they even leave the farm. In fact, that’s why Oddbox exists: their mission is to fix the UK’&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-202049/</link>
      <pubDate>Thu, 03 Jun 2021 20:20:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-202049/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131018_2022-buick-enclave-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Buick Enclave brings a prettier face, added safety&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-201739/</link>
      <pubDate>Thu, 03 Jun 2021 20:17:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-201739/</guid>
      <description>&amp;lt;p&amp;gt;Exclusive: U.S. Justice Department to elevate investigations of ransomware attacks to a similar priority as terrorism &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DF26G&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
JERUSALEM (Reuters) -Israeli Prime Minister Benjamin Netanyahu on Thursday scorned as &amp;amp;quot;dangerous&amp;amp;quot; and &amp;amp;quot;left-wing&amp;amp;quot; a cross-partisan coalition cobbled together by his rivals to unseat him, even as the nationalist named to lead it echoed his hard line on the Palestinians.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks-usa/u-s-sees-sixth-round-of-iran-nuclear-talks-and-likely-more-idUSKCN2DF28D&amp;#34;&amp;gt;U.S. sees sixth round of Iran nuclear talks and likely more&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-opposition-gudkov/police-free-kremlin-critic-dmitry-gudkov-but-keep-him-as-suspect-lawyers-idUSKCN2DF1X3&amp;#34;&amp;gt;Police free Kremlin critic Dmitry Gudkov but keep him as suspect - lawyers&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210603-201555/</link>
      <pubDate>Thu, 03 Jun 2021 20:15:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210603-201555/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/06/new-protections-for-enhanced-safe.html&amp;#34;&amp;gt;New protections for Enhanced Safe Browsing users in Chrome&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Badr Salmi, Google Safe Browsing &amp;amp;amp; Varun Khaneja, Chrome Security&amp;lt;br&amp;gt;
In 2020 we &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2020/05/enhanced-safe-browsing-protection-now.html&amp;#34;&amp;gt;launched Enhanced Safe Browsing&amp;lt;/a&amp;gt; , which you can turn on in your Chrome security &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://support.google.com/chrome/answer/9890866&amp;#34;&amp;gt;settings&amp;lt;/a&amp;gt; , with the goal of substantially increasing safety on the web. These improvements are being built on top of existing security mechanisms that already protect billions of devices. Since the initial launch, we have continuously worked behind the scenes to improve our real-time URL checks and apply machine learning models to warn on previously-unknown attacks. As a result, Enhanced Safe Browsing users are successfully phished 35% less than other users.  Starting with Chrome 91, we will roll out new features to help Enhanced Safe Browsing users better choose their extensions, as well as offer additional protections against downloading malicious files on the web.&amp;lt;br&amp;gt;
Chrome extensions - Better protection before installation&amp;lt;br&amp;gt;
Every day millions of people rely on Chrome extensions to help them be more productive, save money, shop or simply improve their browser experience. This is why it is important for us to continuously improve the safety of extensions published in the Chrome Web Store. For instance, through our integration with Google Safe Browsing in 2020, the number of malicious extensions that Chrome disabled to protect users grew by 81%. This comes on top of a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.google/products/chrome/making-chrome-extensions-more-private-and-secure/&amp;#34;&amp;gt;number of improvements&amp;lt;/a&amp;gt; for more peace of mind when it comes to privacy and security.&amp;lt;br&amp;gt;
Enhanced Safe Browsing will now offer additional protection when you install a new extension from the Chrome Web Store. A dialog will inform you if an extension you’re about to install is not a part of the list of extensions trusted by Enhanced Safe Browsing.&amp;lt;br&amp;gt;
Any extensions built by a developer who follows the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.chrome.com/docs/webstore/program_policies/&amp;#34;&amp;gt;Chrome Web Store Developer Program Policies&amp;lt;/a&amp;gt; , will be considered trusted by Enhanced Safe Browsing.  For new developers, it will take at least a few months of respecting these conditions to become trusted. Eventually, we strive for all developers with compliant extensions to reach this status upon meeting these criteria. Today, this represents nearly 75% of all extensions in the Chrome Web Store and we expect this number to keep growing as new developers become trusted.&amp;lt;br&amp;gt;
Improved download protection&amp;lt;br&amp;gt;
Enhanced Safe Browsing will now offer you even better protection against risky files.&amp;lt;br&amp;gt;
When you download a file, Chrome performs a first level check with Google Safe Browsing using metadata about the downloaded file, such as the digest of the contents and the source of the file, to determine whether it’s potentially suspicious. For any downloads that Safe Browsing deems risky, but not clearly unsafe, Enhanced Safe Browsing users will be presented with a warning and the ability to send the file to be scanned for a more in depth analysis (pictured above).&amp;lt;br&amp;gt;
If you choose to send the file, Chrome will upload it to Google Safe Browsing, which will scan it using its static and dynamic analysis classifiers in real time. After a short wait, if Safe Browsing determines the file is unsafe, Chrome will display a warning. As always, you can bypass the warning and open the file without scanning. Uploaded files are deleted from Safe Browsing a short time after scanning.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-161708/</link>
      <pubDate>Thu, 03 Jun 2021 16:17:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-161708/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-turkey-usa/millions-in-syria-face-disaster-if-aid-crossing-is-shut-un-idUSKCN2DF1E8&amp;#34;&amp;gt;Millions in Syria face disaster if aid crossing is shut - UN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-rohingya-island/rohingya-muslim-refugees-injured-in-protests-on-isolated-island-during-unhcr-visit-idUSKCN2DF1NS&amp;#34;&amp;gt;Rohingya Muslim refugees &amp;amp;#39;injured in protests&amp;amp;#39; on isolated island during UNHCR visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-142044/</link>
      <pubDate>Thu, 03 Jun 2021 14:20:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-142044/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132457_2022-ford-maverick-price-specs-review-photos-info&amp;#34;&amp;gt;Gabrielle Union to help unveil 2022 Ford Maverick on June 8&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-141723/</link>
      <pubDate>Thu, 03 Jun 2021 14:17:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-141723/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-battling-for-political-life-attacks-deal-to-unseat-him-idUSKCN2DE0K6&amp;#34;&amp;gt;Netanyahu, battling for political life, attacks deal to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israeli Prime Minister Benjamin Netanyahu on Thursday fought back against an agreement by his political opponents for a government of left-wing, centrist and right-wing parties aimed at unseating him.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210603-141712/</link>
      <pubDate>Thu, 03 Jun 2021 14:17:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210603-141712/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang/&amp;#34;&amp;gt;Attack on meat supplier came from REvil, ransomware’s most cut-throat gang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Criminals use high-pressure tactics to extort victims.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-121906/</link>
      <pubDate>Thu, 03 Jun 2021 12:19:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210603-121906/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126358_2022-bmw-m4-gt3-customer-race-car-ready-to-hit-the-track&amp;#34;&amp;gt;2022 BMW M4 GT3 customer race car ready to hit the track&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130930_2022-ford-ranger-spy-shots&amp;#34;&amp;gt;2022 Ford Ranger spy shots: Single and Super Cab join the party&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-121606/</link>
      <pubDate>Thu, 03 Jun 2021 12:16:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-121606/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-fighting-for-political-life-lashes-out-at-deal-to-unseat-him-idUSKCN2DE0K6&amp;#34;&amp;gt;Netanyahu, fighting for political life, lashes out at deal to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-royals/uks-queen-elizabeth-to-meet-president-biden-at-windsor-castle-idUSKCN2DF13T&amp;#34;&amp;gt;UK&amp;amp;#39;s Queen Elizabeth to meet President Biden at Windsor Castle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-italy-migrants-workers-analysis/analysis-for-migrants-red-tape-turns-italian-work-permit-scheme-into-mirage-idUSKCN2DF11G&amp;#34;&amp;gt;Analysis-For migrants, red tape turns Italian work permit scheme into mirage&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210603-101801/</link>
      <pubDate>Thu, 03 Jun 2021 10:18:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210603-101801/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/06/03/technology/india-israel-facebook-employees.html&amp;#34;&amp;gt;India and Israel Inflame Facebook’s Fights With Its Own Employees The social network wrongly bowed to government demands to take down content in the countries, employees said, in more signs of internal dissent. By Sheera Frenkel and Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-101615/</link>
      <pubDate>Thu, 03 Jun 2021 10:16:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-101615/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-fighting-for-political-life-hits-back-at-deal-to-unseat-him-idUSKCN2DE0K6&amp;#34;&amp;gt;Netanyahu, fighting for political life, hits back at deal to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israeli Prime Minister Benjamin Netanyahu on Thursday fought back against an agreement by his political opponents for a government of left-wing, centrist and right-wing parties aimed at unseating him.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-081751/</link>
      <pubDate>Thu, 03 Jun 2021 08:17:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-081751/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-sri-lanka-ship/sri-lanka-readies-for-oil-spill-from-sunken-cargo-ship-idUSKCN2DF0FC&amp;#34;&amp;gt;Sri Lanka readies for oil spill from sunken cargo ship&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mexico-election-lgbt-candidates/eager-to-represent-gay-and-trans-mexican-candidates-running-in-key-vote-idUSKCN2DF0DA&amp;#34;&amp;gt;Eager to represent: Gay and trans Mexican candidates running in key vote&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-061551/</link>
      <pubDate>Thu, 03 Jun 2021 06:15:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-061551/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-olympics-2020-japan-politics/japan-pm-suga-seen-calling-snap-election-after-tokyo-games-asahi-idUSKCN2DE2YH&amp;#34;&amp;gt;Japan PM Suga seen calling snap election after Tokyo Games - Asahi&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210603-041842/</link>
      <pubDate>Thu, 03 Jun 2021 04:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210603-041842/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2020/06/09/anyone-willing-to-help-me-get-set-up-with-something-like-miso/&amp;#34;&amp;gt;Anyone willing to help me get set up with something like miso?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-001651/</link>
      <pubDate>Thu, 03 Jun 2021 00:16:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210603-001651/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-opposition-declares-new-government-set-to-unseat-netanyahu-idUSKCN2DE0K6&amp;#34;&amp;gt;Israel&amp;#39;s opposition declares new government, set to unseat Netanyahu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israel&amp;amp;#39;s opposition leader moved closer to unseating Prime Minister Benjamin Netanyahu when he officially told the country&amp;amp;#39;s president that he has reached agreements with political allies to form a new government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-summit-coronavirus/britain-hosts-g7-health-summit-amid-pressure-to-broaden-covid-vaccine-access-idUSKCN2DE2WY&amp;#34;&amp;gt;Britain hosts G7 health summit amid pressure to broaden COVID vaccine access&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-climate-change-china-forest-wider-ima/china-farmers-push-back-the-desert-one-tree-at-a-time-idUSKCN2DE2WL&amp;#34;&amp;gt;China farmers push back the desert - one tree at a time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210603-001532/</link>
      <pubDate>Thu, 03 Jun 2021 00:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210603-001532/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/02/28/how-to-fix-internet/&amp;#34;&amp;gt;The Internet is broken: could we please fix it?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-221637/</link>
      <pubDate>Wed, 02 Jun 2021 22:16:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-221637/</guid>
      <description>&amp;lt;p&amp;gt;Israel’s opposition leader Lapid has formed a coalition deal that could unseat Prime Minister Netanyahu&amp;#39;s 12-year run&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-lapid-set-to-unseat-netanyahu-form-new-government-idUSKCN2DE0K6&amp;#34;&amp;gt;Israel&amp;#39;s Lapid set to unseat Netanyahu, form new government&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israel&amp;amp;#39;s opposition leader moved closer to unseating Prime Minister Benjamin Netanyahu on Wednesday when he officially informed the country&amp;amp;#39;s president that he has reached agreements with political allies to form a new government.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nicaragua-politics/nicaraguan-police-raid-opposition-leaders-home-idUSKCN2DE2L2&amp;#34;&amp;gt;Nicaraguan police raid opposition leader&amp;amp;#39;s home&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-201731/</link>
      <pubDate>Wed, 02 Jun 2021 20:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-201731/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children/mass-grave-reopens-wounds-among-indigenous-survivors-of-colonial-canadian-school-system-idUSKCN2DE2IU&amp;#34;&amp;gt;Mass grave reopens wounds among indigenous survivors of colonial Canadian school system&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The discovery of the remains of 215 children at a former residential school in Canada has reopened wounds for survivors of the system, they said, as the government pledged to spend previously promised money to search for more unmarked graves.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-lapid-clinches-deals-to-unseat-netanyahu-radio-idUSKCN2DE0K6&amp;#34;&amp;gt;Israel&amp;amp;#39;s Lapid clinches deals to unseat Netanyahu -radio&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-harris-guatemala-excl/exclusive-guatemalan-president-says-graft-fighter-biased-ahead-of-harris-visit-idUSKCN2DE2KE&amp;#34;&amp;gt;Exclusive-Guatemalan president says graft fighter biased, ahead of Harris visit&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-182050/</link>
      <pubDate>Wed, 02 Jun 2021 18:20:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-182050/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132448_ford-bronco-off-roadeo-school-announced-to-teach-owners-off-roading-skills&amp;#34;&amp;gt;Ford Bronco Off-Roadeo school announced to teach owners off-roading skills&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-181723/</link>
      <pubDate>Wed, 02 Jun 2021 18:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-181723/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks/iran-nuclear-deal-talks-set-to-break-for-a-week-diplomats-say-idUSKCN2DE0U5&amp;#34;&amp;gt;Iran nuclear deal talks set to break for a week, diplomats say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-colombia-protests/in-colombia-protesters-march-on-as-talks-stall-and-blockades-remain-idUSKCN2DE1YG&amp;#34;&amp;gt;In Colombia, protesters march on as talks stall and blockades remain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-162025/</link>
      <pubDate>Wed, 02 Jun 2021 16:20:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-162025/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1127964_czinger-ups-specs-for-21c-3d-printed-hypercar-promises-8-1s-quarter-mile-time&amp;#34;&amp;gt;Czinger ups specs for 21C 3D-printed hypercar, promises 8.1s quarter-mile time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-161711/</link>
      <pubDate>Wed, 02 Jun 2021 16:17:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-161711/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-birdflu-china-explainer/explainer-so-far-low-risk-of-human-spread-of-h10n3-bird-flu-idUSKCN2DE0YJ&amp;#34;&amp;gt;Explainer: So far, low risk of human spread of H10N3 bird flu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-141941/</link>
      <pubDate>Wed, 02 Jun 2021 14:19:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-141941/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132446_2022-toyota-supra-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Toyota Supra spawns A91-CF Edition limited to 600 cars&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132445_2022-jaguar-f-type-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Jaguar F-Type is V-8 only and priced to start from $71,050&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-141716/</link>
      <pubDate>Wed, 02 Jun 2021 14:17:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-141716/</guid>
      <description>Boeing&amp;#39;s CEO faces a $15 billion dilemma over how to rebuild airliner sales &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DE0IZ&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-121837/</link>
      <pubDate>Wed, 02 Jun 2021 12:18:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-121837/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126101_2021-aston-martin-dbx-price-specs-review-photos-info&amp;#34;&amp;gt;First drive review: 2021 Aston Martin DBX is a necessary good&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132444_2022-toyota-tacoma-trail-edition-and-trd-pro-revealed-with-fresh-updates&amp;#34;&amp;gt;2022 Toyota Tacoma Trail Edition and TRD Pro revealed with fresh updates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131809_2022-toyota-86-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Toyota 86 redesign brings more power, more mature styling&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-121550/</link>
      <pubDate>Wed, 02 Jun 2021 12:15:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-121550/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-eu-travel/eu-agrees-to-add-japan-to-safe-travel-list-holds-off-on-britain-idUSKCN2DE1AJ&amp;#34;&amp;gt;EU agrees to add Japan to safe travel list, holds off on Britain&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
European Union governments agreed on Wednesday to add Japan to their small list of countries from which they will allow non-essential travel, while holding off until at least mid-June for British tourists, EU sources said on Tuesday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-sri-lanka-ship/chemical-cargo-ship-sinks-off-sri-lanka-fouling-rich-fishing-waters-idUSKCN2DE0JG&amp;#34;&amp;gt;Chemical cargo ship sinks off Sri Lanka, fouling rich fishing waters&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-talks/iran-nuclear-deal-parties-to-wrap-up-latest-round-of-talks-in-vienna-idUSKCN2DE0U5&amp;#34;&amp;gt;Iran nuclear deal parties to wrap up latest round of talks in Vienna&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-101854/</link>
      <pubDate>Wed, 02 Jun 2021 10:18:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210602-101854/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132125_touring-superleggera-unveils-first-mid-engine-car&amp;#34;&amp;gt;Touring Superleggera unveils first mid-engine car&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132174_5-ford-bronco-sport-easter-eggs&amp;#34;&amp;gt;5 Ford Bronco Sport Easter eggs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-101601/</link>
      <pubDate>Wed, 02 Jun 2021 10:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-101601/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/israels-lapid-enlists-gantz-moves-closer-to-unseating-netanyahu-idUSKCN2DE0K6&amp;#34;&amp;gt;Israel&amp;#39;s Lapid enlists Gantz, moves closer to unseating Netanyahu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israel&amp;amp;#39;s opposition leader moved closer to unseating Prime Minister Benjamin Netanyahu on Wednesday and forming a new government after agreeing terms with several parties including one led by Defence Minister Benny Gantz, a spokesman said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-sri-lanka-ship/disaster-feared-as-chemical-cargo-ship-sinks-off-sri-lanka-idUSKCN2DE0JG&amp;#34;&amp;gt;Disaster feared as chemical cargo ship sinks off Sri Lanka&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-081557/</link>
      <pubDate>Wed, 02 Jun 2021 08:15:57 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-081557/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-israel-pfizer/israel-sees-probable-link-between-pfizer-vaccine-and-myocarditis-cases-idUSKCN2DD4R1&amp;#34;&amp;gt;Israel sees probable link between Pfizer vaccine and myocarditis cases&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israel&amp;amp;#39;s Health Ministry said on Tuesday it had found the small number of heart inflammation cases observed mainly in young men who received Pfizer&amp;amp;#39;s  COVID-19 vaccine in Israel were likely linked to their vaccination.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-041626/</link>
      <pubDate>Wed, 02 Jun 2021 04:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-041626/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australias-victoria-extends-melbourne-covid-19-lockdown-for-2nd-week-idUSKCN2DE05P&amp;#34;&amp;gt;Australia&amp;#39;s Victoria extends Melbourne COVID-19 lockdown for 2nd week&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hks-june-4th-museum-temporarily-closes-over-licensing-probe-idUSKCN2DE088&amp;#34;&amp;gt;HK&amp;amp;#39;s June 4th museum temporarily closes over licensing probe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-021633/</link>
      <pubDate>Wed, 02 Jun 2021 02:16:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-021633/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-usa-costa-rica/u-s-to-detail-plan-for-global-distribution-of-80-million-vaccine-doses-idUSKCN2DE01B&amp;#34;&amp;gt;U.S. to detail plan for global distribution of 80 million vaccine doses&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-001609/</link>
      <pubDate>Wed, 02 Jun 2021 00:16:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210602-001609/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-centam/blinken-urges-central-america-to-help-on-migrants-flags-democracy-concerns-idUSKCN2DD4SO&amp;#34;&amp;gt;Blinken urges Central America to help on migrants, flags democracy concerns&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN JOSE (Reuters) -U.S. Secretary of State Antony Blinken urged Central American governments to do more to help contain illegal immigration and voiced concerns about the health of local democracy and human rights during a visit to the region on Tuesday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-politics-media/chinas-xi-calls-for-greater-global-media-reach-idUSKCN2DD4UU&amp;#34;&amp;gt;China&amp;amp;#39;s Xi calls for greater global media reach&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210602-000743/</link>
      <pubDate>Wed, 02 Jun 2021 00:07:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210602-000743/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://login.retool.com/auth/signup&amp;#34;&amp;gt;Try Retool&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/how-retool-helped-run-a-presidential-campaign/&amp;#34;&amp;gt;How Retool helped run a presidential campaign “Within two months of announcing candidacy, the team needs to scale up to 200 people. That’s faster growth than any startup you’ve worked at.”  A great tech team is now table&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/erp-for-engineers/&amp;#34;&amp;gt;What’s SAP? What&amp;amp;#39;s SAP? And why is it worth $163B?  Every year companies spend $41B on enterprise resource planning software, commonly known as ERP. Today, almost every large business has some sort of ERP system&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/state-of-internal-tools-survey-announcement-2020/&amp;#34;&amp;gt;Tell us about how you build your internal tools! TL;DR: we&amp;amp;#39;re running a survey about internal tooling and we&amp;amp;#39;d love you to participate.  State of Internal Tools Survey Chances are you’ve spent time on internal tooling: operational, non-customer facing software&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/retool-and-firebase/&amp;#34;&amp;gt;Build tools on top of Firebase Contents:     Background     Live demo     Querying data     Displaying data     Inputting data              Input fields         Automagic forms      The story of software is a story of abstraction.  Programming languages abstracted away the complexities of computer instructions — flip-flop&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-221945/</link>
      <pubDate>Tue, 01 Jun 2021 22:19:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-221945/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131599_2022-bmw-ix-xdrive50-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW iX xDrive50 arrives with 516 hp, 300-mile range, and $84,195 base price&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1126050_2022-bmw-i4-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW i4 delivers up to 536 hp, starts at $56,395&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210601-221649/</link>
      <pubDate>Tue, 01 Jun 2021 22:16:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210601-221649/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/06/ransomware-striking-the-worlds-biggest-meat-producer-threatens-shortages/&amp;#34;&amp;gt;Shortages loom as ransomware hamstrings the world’s biggest meat producer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Add meat to the list of critical supply chains disrupted by the malware scourge.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-221642/</link>
      <pubDate>Tue, 01 Jun 2021 22:16:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-221642/</guid>
      <description>MOSCOW (Reuters) -Dmitry Gudkov, a prominent opposition politician and former parliamentarian, was detained by Russian law enforcement officials on Tuesday, TASS news agency reported, part of a broader crackdown on Kremlin critics.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-201633/</link>
      <pubDate>Tue, 01 Jun 2021 20:16:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-201633/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-birdflu-china/china-reports-first-human-case-of-h10n3-bird-flu-idUSKCN2DD29J&amp;#34;&amp;gt;China reports first human case of H10N3 bird flu&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A 41-year-old man in China&amp;amp;#39;s eastern province of Jiangsu has been confirmed as the first human case of infection with a rare strain of bird flu known as H10N3, Beijing&amp;amp;#39;s National Health Commission (NHC) said on Tuesday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-open-russia-arrest/russia-detains-prominent-opposition-politician-in-widening-crackdown-idUSKCN2DD3EY&amp;#34;&amp;gt;Russia detains prominent opposition politician in widening crackdown&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-immigration-border/u-s-formally-ends-trumps-remain-in-mexico-asylum-policy-idUSKCN2DD4DG&amp;#34;&amp;gt;U.S. formally ends Trump’s &amp;amp;#39;remain in Mexico&amp;amp;#39; asylum policy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210601-201259/</link>
      <pubDate>Tue, 01 Jun 2021 20:12:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210601-201259/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/01/Long-Links&amp;#34;&amp;gt;Long Links&amp;lt;/a&amp;gt; · Welcome to the June 2021 issue of&amp;lt;br&amp;gt;
, in which I curate long-form works that I enjoyed last month. Even     if you think all these look interesting, you probably don’t have time to read them assuming you have a job, which I don’t.     My hope is that one or two will reward your attention &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/06/01/Long-Links&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/15/Testing-in-2021&amp;#34;&amp;gt;Testing in the Twenties&amp;lt;/a&amp;gt; · Grown-up software developers know perfectly well that testing is important. But — speaking     here from experience — many aren’t doing enough. So I’m here to bang the testing     drum, which our profession shouldn’t need to hear but apparently does &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/15/Testing-in-2021&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [7 comments]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210601-200745/</link>
      <pubDate>Tue, 01 Jun 2021 20:07:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210601-200745/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discover-the-next-great-community-in-stage-discovery-8ad0b95fca46?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discover the Next Great Community in Stage Discovery&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/discover-the-next-great-community-in-stage-discovery-8ad0b95fca46?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Discover the Next Great Community in Stage Discovery Back in March, we rolled out Stage channels, a new type of Channel in Discord specially designed for audio events where a few users are…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-181926/</link>
      <pubDate>Tue, 01 Jun 2021 18:19:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-181926/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132431_new-2022-toyota-4runner-trd-sport-model-aims-to-tame-on-road-dynamics&amp;#34;&amp;gt;New 2022 Toyota 4Runner TRD Sport model aims to tame on-road dynamics&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132433_review-update-2021-mercedes-benz-amg-e53-delivers-balanced-power-and-presence&amp;#34;&amp;gt;Review update: 2021 Mercedes-Benz AMG E53 delivers balanced power and presence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-181630/</link>
      <pubDate>Tue, 01 Jun 2021 18:16:29 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-181630/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-china-export-control-exclusive/exclusive-u-s-agency-not-doing-its-job-to-halt-tech-to-chinas-military-congressional-report-idUSKCN2DD46H&amp;#34;&amp;gt;Exclusive-U.S. agency not doing its job to halt tech to China&amp;#39;s military -congressional report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The U.S. Commerce Department is failing to do its part to protect national security and keep sensitive technology out of the hands of China&amp;amp;#39;s military, according to a U.S. congressional advisory report seen by Reuters.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-court-prisoners/belarusian-prisoner-tries-to-cut-own-throat-in-court-hearing-idUSKCN2DD3P6&amp;#34;&amp;gt;Belarusian prisoner tries to cut own throat in court hearing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-spain-morocco-polisario/spanish-court-rejects-custody-for-western-sahara-independence-leader-idUSKCN2DD399&amp;#34;&amp;gt;Spanish court rejects custody for Western Sahara independence leader&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210601-180731/</link>
      <pubDate>Tue, 01 Jun 2021 18:07:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210601-180731/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/celebrating-pride-month-with-glsen-a2e7695fb1d6?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Celebrating Pride Month with GLSEN&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/celebrating-pride-month-with-glsen-a2e7695fb1d6?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Celebrating Pride Month with GLSEN We’re marching throughout June under a statement of purpose: Stronger Together.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Jun 1&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Home - Mozilla Hacks - the Web developer blog</title>
      <link>https://www.whatsupup.com/blog/gaper/whisky/20210601-161653/</link>
      <pubDate>Tue, 01 Jun 2021 16:16:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gaper/whisky/20210601-161653/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/06/looking-fine-with-firefox-89/&amp;#34;&amp;gt;Looking fine with Firefox 89 →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://hacks.mozilla.org/2021/06/looking-fine-with-firefox-89/&amp;#34;&amp;gt;Looking fine with Firefox 89&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Firefox 89 has smartened up and brings with it a slimmed-down, slightly more minimalist interface.
&amp;lt;p&amp;gt;Along with this new look, we get some great styling features including a force-colours feature for media queries and better control over how fonts are displayed. The long-awaited top-level await keyword for JavaScript modules is now enabled, as well as the PerformanceEventTiming interface, which is another addition to the performance suite of APIs: 89 really has been working out!&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-161604/</link>
      <pubDate>Tue, 01 Jun 2021 16:16:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-161604/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-italy-sign-ciampi/red-faces-in-rome-as-street-plaque-gets-presidents-name-wrong-idUSKCN2DD3UU&amp;#34;&amp;gt;Red faces in Rome as street plaque gets president&amp;#39;s name wrong&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Italian President Sergio Mattarella had to abandon a ceremony on Tuesday dedicating a Rome road to one of his predecessors, Carlo Azeglio Ciampi, after officials noticed that the name on the stone plaque was misspelt.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-141924/</link>
      <pubDate>Tue, 01 Jun 2021 14:19:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-141924/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129381_2023-porsche-911-gt3-rs-spy-shots-and-video&amp;#34;&amp;gt;2023 Porsche 911 GT3 RS spy shots and video: New track star takes to the &amp;#39;Ring&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132430_2023-kia-sportage-teased-ahead-of-june-8-reveal&amp;#34;&amp;gt;2023 Kia Sportage teased ahead of June 8 reveal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-141641/</link>
      <pubDate>Tue, 01 Jun 2021 14:16:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-141641/</guid>
      <description>JERUSALEM (Reuters) -A last-gasp legal challenge by Israeli Prime Minister Benjamin Netanyahu to thwart a bid by a rival rightist to head a new government was rejected on Tuesday as his opponents raced to seal a pact that would unseat him.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210601-141624/</link>
      <pubDate>Tue, 01 Jun 2021 14:16:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210601-141624/</guid>
      <description>Amazon&amp;#39;s experimental wireless mesh networking turns users into guinea pigs.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-121841/</link>
      <pubDate>Tue, 01 Jun 2021 12:18:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-121841/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129824_rimac-nevera-production-version-of-1-914-hp-c-two-electric-hypercar-revealed&amp;#34;&amp;gt;Rimac Nevera: Production version of 1,914-hp C_Two electric hypercar revealed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-121554/</link>
      <pubDate>Tue, 01 Jun 2021 12:15:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-121554/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-challenge-to-legality-of-rivals-pm-bid-is-rebuffed-idUSKCN2DD2RG&amp;#34;&amp;gt;Netanyahu challenge to legality of rival&amp;#39;s PM bid is rebuffed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-101826/</link>
      <pubDate>Tue, 01 Jun 2021 10:18:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210601-101826/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125742_2022-ford-fusion-active-evos-spy-shots&amp;#34;&amp;gt;2022 Ford Fusion Active spy shots: Fusion successor almost here&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-101538/</link>
      <pubDate>Tue, 01 Jun 2021 10:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-101538/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-society-population/chinas-new-three-child-policy-draws-scepticism-cost-questions-idUSKCN2DD2S7&amp;#34;&amp;gt;China&amp;#39;s new three-child policy draws scepticism, cost questions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
China&amp;amp;#39;s decision to allow families to have up to three children was met with scepticism on Tuesday, with doubts expressed on social media whether it would make much difference, and calls for details on what promised &amp;amp;#34;supportive measures&amp;amp;#34; will include.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-legal-challenge-to-rivals-pm-bid-is-spurned-idUSKCN2DD2RG&amp;#34;&amp;gt;Netanyahu legal challenge to rival&amp;amp;#39;s PM bid is spurned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-081555/</link>
      <pubDate>Tue, 01 Jun 2021 08:15:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-081555/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-norway-attacks/ten-years-after-breivik-attacks-survivors-seek-to-confront-far-right-extremism-idUSKCN2DD2FU&amp;#34;&amp;gt;Ten years after Breivik attacks, survivors seek to confront far-right extremism&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Nearly 10 years after Anders Behring Breivik tried to kill her on the Norwegian island of Utoeya, Astrid Hoem is back there to explain to a group of teenagers how she ran for her life and hid in a beach cove while Breivik murdered others around her.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210601-081423/</link>
      <pubDate>Tue, 01 Jun 2021 08:14:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210601-081423/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-rp2040-on-sale/&amp;#34;&amp;gt;Raspberry Silicon update: RP2040 on sale now at $1&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
The microcontroller, perfected&amp;lt;br&amp;gt;
Eben Upton - 1st Jun 2021 This post has &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/raspberry-pi-rp2040-on-sale/#comments&amp;#34;&amp;gt;2 comments&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-061637/</link>
      <pubDate>Tue, 01 Jun 2021 06:16:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-061637/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-politics/n-koreas-ruling-party-sets-up-new-post-under-leader-kim-yonhap-idUSKCN2DD2AZ&amp;#34;&amp;gt;N.Korea&amp;#39;s ruling party sets up new post under leader Kim -Yonhap&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-g7-finance-japan/japan-finance-minister-does-not-expect-g7-meet-to-debate-specific-tax-rates-idUSKCN2DD28J&amp;#34;&amp;gt;Japan Finance Minister does not expect G7 meet to debate specific tax rates&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210601-041722/</link>
      <pubDate>Tue, 01 Jun 2021 04:17:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210601-041722/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2010/08/12/on-a-problem-of-sigfpe/&amp;#34;&amp;gt;On a Problem of sigfpe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-021537/</link>
      <pubDate>Tue, 01 Jun 2021 02:15:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210601-021537/</guid>
      <description>Indigenous groups in Canada are calling for a nationwide search for mass graves at residential school sites after the discovery of the remains of 215 children at one former school last week shocked the country.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-el-salvador-abortion/el-salvador-court-to-free-woman-given-30-years-for-death-of-fetus-idUSKCN2DD203&amp;#34;&amp;gt;El Salvador court to free woman given 30 years for death of fetus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210601-001447/</link>
      <pubDate>Tue, 01 Jun 2021 00:14:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210601-001447/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/&amp;#34;&amp;gt;Attack of the Week: Group Messaging in WhatsApp and Signal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>ongoing by Tim Bray</title>
      <link>https://www.whatsupup.com/blog/sideswiped/tuftily/20210531-221230/</link>
      <pubDate>Mon, 31 May 2021 22:12:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sideswiped/tuftily/20210531-221230/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/LP-Victory&amp;#34;&amp;gt;LP Victory&amp;lt;/a&amp;gt; · Some readers may remember &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/201x/2019/02/23/LP-Log&amp;#34;&amp;gt;a February 2019&amp;lt;/a&amp;gt; blog post describing how I inherited 900 or so used LPs,     mostly classical. As of this week, I’ve listened to all of them (or rejected them out of hand), and kept 220 or so (counting methods were     imperfect). Herewith lessons and reconfigurations.  Also there’s a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/Fourteen-Classics&amp;#34;&amp;gt;companion piece&amp;lt;/a&amp;gt; on sixteen albums I especially liked &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.tbray.org/ongoing/When/202x/2021/05/22/LP-Victory&amp;#34;&amp;gt;&amp;amp;hellip;&amp;lt;/a&amp;gt; [1 comment]&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-201607/</link>
      <pubDate>Mon, 31 May 2021 20:16:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-201607/</guid>
      <description>VIENNA (Reuters) -Iran has failed to explain traces of uranium found at several undeclared sites, a report by the U.N. nuclear watchdog showed on Monday, possibly setting up a fresh diplomatic clash between Tehran and the West that could derail wider nuclear talks.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-indigenous-children/indigenous-groups-call-for-canada-to-identify-graves-after-remains-of-215-children-found-idUSKCN2DC1QA&amp;#34;&amp;gt;Indigenous groups call for Canada to identify graves after remains of 215 children found&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-181546/</link>
      <pubDate>Mon, 31 May 2021 18:15:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-181546/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea/iran-fails-to-explain-uranium-traces-found-at-several-sites-iaea-report-idUSKCN2DC1LG&amp;#34;&amp;gt;Iran fails to explain uranium traces found at several sites -IAEA report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210531-101759/</link>
      <pubDate>Mon, 31 May 2021 10:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210531-101759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10054534_kirk-bell&amp;#34;&amp;gt;Kirk Bell - Senior Editor&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-101516/</link>
      <pubDate>Mon, 31 May 2021 10:15:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-101516/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-society-population/three-child-policy-china-lifts-cap-on-births-in-major-policy-shift-idUSKCN2DC0HB&amp;#34;&amp;gt;Three-child policy: China lifts cap on births in major policy shift&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIJING (Reuters) -Married Chinese couples may have up to three children, China announced on Monday, in a major shift from the existing limit of two after recent data showed a dramatic decline in births in the world&amp;amp;#39;s most populous country.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahus-disparate-rivals-try-to-nail-down-pact-to-unseat-him-idUSKCN2DC0SV&amp;#34;&amp;gt;Netanyahu&amp;amp;#39;s disparate rivals try to nail down pact to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-081452/</link>
      <pubDate>Mon, 31 May 2021 08:14:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-081452/</guid>
      <description>&amp;lt;p&amp;gt;China announces three-child policy, in a major shift after recent data showed a dramatic decline in births &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DC0HB&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-society-population/china-in-major-policy-shift-announces-families-can-have-three-children-idUSKCN2DC0HB&amp;#34;&amp;gt;China, in major policy shift, announces families can have three children&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIJING (Reuters) -China announced on Monday that married couples may have up to three children, a major policy shift from the existing limit of two after recent data showed a dramatic decline in births in the world&amp;amp;#39;s most populous country.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-denmark-defence/u-s-spied-on-merkel-and-other-europeans-through-danish-cables-broadcaster-dr-idUSKCN2DB0I7&amp;#34;&amp;gt;U.S. spied on Merkel and other Europeans through Danish cables - broadcaster DR&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210531-041749/</link>
      <pubDate>Mon, 31 May 2021 04:17:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210531-041749/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2008/07/29/singing-card-guts/&amp;#34;&amp;gt;Singing card guts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-041617/</link>
      <pubDate>Mon, 31 May 2021 04:16:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-041617/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-judges/beijings-hong-kong-office-slams-intimidation-of-judge-in-tycoon-jimmy-lais-case-idUSKCN2DC068&amp;#34;&amp;gt;Beijing&amp;#39;s Hong Kong office slams intimidation of judge in tycoon Jimmy Lai&amp;#39;s case&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-001551/</link>
      <pubDate>Mon, 31 May 2021 00:15:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210531-001551/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-denmark-defence/u-s-security-agency-spied-on-merkel-other-top-european-officials-through-danish-cables-broadcaster-dr-idUSKCN2DB0I7&amp;#34;&amp;gt;U.S. security agency spied on Merkel, other top European officials through Danish cables - broadcaster DR&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
COPENHAGEN (Reuters) -The U.S. National Security Agency (NSA) has used a partnership with Denmark&amp;amp;#39;s foreign intelligence unit to spy on senior officials of neighbouring countries, including German Chancellor Angela Merkel, according to Danish state broadcaster DR.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics-bennett/naftali-bennett-the-right-wing-millionaire-who-may-end-netanyahu-era-idUSKCN2DB0EO&amp;#34;&amp;gt;Naftali Bennett: The right-wing millionaire who may end Netanyahu era&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-201625/</link>
      <pubDate>Sun, 30 May 2021 20:16:24 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-201625/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahus-grip-on-power-loosens-as-rival-moves-to-unseat-him-idUSKCN2DB033&amp;#34;&amp;gt;Netanyahu&amp;#39;s grip on power loosens as rival moves to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Far-right party leader Naftali Bennett threw his crucial support on Sunday behind a &amp;amp;#34;unity government&amp;amp;#34; in Israel to unseat Prime Minister Benjamin Netanyahu, in what would be the end of a political era.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-181627/</link>
      <pubDate>Sun, 30 May 2021 18:16:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-181627/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahus-kingmaker-rival-bennett-agrees-to-join-coalition-to-unseat-him-idUSKCN2DB033&amp;#34;&amp;gt;Netanyahu&amp;#39;s &amp;#39;kingmaker&amp;#39; rival Bennett agrees to join coalition to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Far-right party leader Naftali Bennett threw his crucial support on Sunday behind a &amp;amp;#34;government of change&amp;amp;#34; in Israel to unseat Prime Minister Benjamin Netanyahu, in what would be the end of a political era.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-161603/</link>
      <pubDate>Sun, 30 May 2021 16:16:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-161603/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-may-face-imminent-end-to-long-run-as-israels-leader-idUSKCN2DB033&amp;#34;&amp;gt;Netanyahu may face imminent end to long run as Israel&amp;#39;s leader&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
JERUSALEM (Reuters) -Israeli far-right politician Naftali Bennett will deliver a statement on Sunday in which he is widely expected to throw his crucial support behind a &amp;amp;#34;government of change&amp;amp;#34; to unseat Prime Minister Benjamin Netanyahu.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-russia-biden/biden-to-press-putin-on-respecting-human-rights-in-geneva-idUSKCN2DB0CF&amp;#34;&amp;gt;Biden to press Putin on respecting human rights in Geneva&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-egypt/israeli-egyptian-officials-meet-in-effort-to-solidify-gaza-truce-idUSKCN2DB0AE&amp;#34;&amp;gt;Israeli, Egyptian officials meet in effort to solidify Gaza truce&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210530-141622/</link>
      <pubDate>Sun, 30 May 2021 14:16:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210530-141622/</guid>
      <description>May 30, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/30/Come-build-your-project.html&amp;#34;&amp;gt;Build your project in our new language&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-141521/</link>
      <pubDate>Sun, 30 May 2021 14:15:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-141521/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-egypt/israel-egypt-meet-in-effort-to-solidify-gaza-truce-idUSKCN2DB0AE&amp;#34;&amp;gt;Israel, Egypt meet in effort to solidify Gaza truce&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-politics-johnson-wedding/uk-pm-johnson-marries-in-low-key-surprise-ceremony-idUSKCN2DA0G8&amp;#34;&amp;gt;UK PM Johnson marries in low-key, surprise ceremony&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-121500/</link>
      <pubDate>Sun, 30 May 2021 12:14:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-121500/</guid>
      <description>JERUSALEM (Reuters) -Prime Minister Benjamin Netanyahu manoeuvred on Sunday to try to dissuade opponents from forming a &amp;amp;quot;government of change&amp;amp;quot;, with media reports saying a deal to unseat Israel&amp;#39;s longest-serving leader could be imminent.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210530-101754/</link>
      <pubDate>Sun, 30 May 2021 10:17:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210530-101754/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132362_someone-turned-a-mercedes-benz-slk-class-into-an-adorable-300sl-gullwing-replica&amp;#34;&amp;gt;Someone turned a Mercedes-Benz SLK-Class into an adorable 300SL gullwing replica&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132414_2022-infiniti-qx60-s-upmarket-interior-teased-ahead-of-crossover-s-june-23-reveal&amp;#34;&amp;gt;2022 Infiniti QX60&amp;amp;#39;s upmarket interior teased ahead of crossover&amp;amp;#39;s June 23 reveal&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/writer/10000017_martin-padgett&amp;#34;&amp;gt;Martin Padgett - Editorial Director&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-101504/</link>
      <pubDate>Sun, 30 May 2021 10:15:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-101504/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/netanyahu-in-last-minute-bid-to-scupper-possible-deal-to-unseat-him-idUSKCN2DB033&amp;#34;&amp;gt;Netanyahu in last-minute bid to scupper possible deal to unseat him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Prime Minister Benjamin Netanyahu manoeuvred on Sunday to try to dissuade opponents from forming a &amp;amp;#34;government of change&amp;amp;#34;, with media reports saying a deal to unseat Israel&amp;amp;#39;s longest-serving leader could be imminent.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210530-100601/</link>
      <pubDate>Sun, 30 May 2021 10:06:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210530-100601/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/topic/chronic-procrastination&amp;#34;&amp;gt;Chronic Procrastination&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-081525/</link>
      <pubDate>Sun, 30 May 2021 08:15:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-081525/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-egypt-diplomacy/analysis-gaza-truce-shifts-focus-to-egypts-regional-role-idUSKCN2DB03E&amp;#34;&amp;gt;Analysis: Gaza truce shifts focus to Egypt&amp;#39;s regional role&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-061507/</link>
      <pubDate>Sun, 30 May 2021 06:15:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-061507/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-politics/end-of-netanyahu-era-could-be-in-the-cards-in-israeli-political-drama-idUSKCN2DB033&amp;#34;&amp;gt;End of Netanyahu era could be in the cards in Israeli political drama&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Israel was gripped by political drama on Sunday over the possibly imminent end of Prime Minister Benjamin Netanyahu&amp;amp;#39;s record run as the country&amp;amp;#39;s leader.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-india/india-reports-3460-more-covid-19-deaths-over-165000-new-infections-idUSKCN2DB01Y&amp;#34;&amp;gt;India reports 3,460 more COVID-19 deaths, over 165,000 new infections&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-041449/</link>
      <pubDate>Sun, 30 May 2021 04:14:49 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-041449/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-canada-shooting/one-dead-four-taken-to-hospital-after-shooting-near-toronto-idUSKCN2DB010&amp;#34;&amp;gt;One dead, four taken to hospital after shooting near Toronto&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210530-001657/</link>
      <pubDate>Sun, 30 May 2021 00:16:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210530-001657/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2016/05/17/in-praise-of-beeminder/&amp;#34;&amp;gt;In praise of Beeminder&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-001523/</link>
      <pubDate>Sun, 30 May 2021 00:15:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210530-001523/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-britain-politics-johnson-wedding/uk-pm-johnson-marries-fiancee-in-secret-ceremony-reports-idUSKCN2DA0G8&amp;#34;&amp;gt;UK PM Johnson marries fiancee in secret ceremony - reports&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
British Prime Minister Boris Johnson married his fiancee Carrie Symonds in a secret ceremony at Westminster Cathedral on Saturday, the Sun and Mail on Sunday newspapers reported.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-russia/russia-confirms-second-loan-for-belarus-raises-issue-of-detained-citizen-idUSKCN2DA0AN&amp;#34;&amp;gt;Russia confirms second loan for Belarus, raises issue of detained citizen&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-myanmar/myanmar-covid-19-outbreak-hits-health-system-shattered-after-coup-idUSKCN2DB001&amp;#34;&amp;gt;Myanmar COVID-19 outbreak hits health system shattered after coup&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210530-001352/</link>
      <pubDate>Sun, 30 May 2021 00:13:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210530-001352/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2011/11/23/digital-fortress-i-read-it-so-you-dont/&amp;#34;&amp;gt;Digital Fortress: I read it so you don&amp;#39;t have to&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-221436/</link>
      <pubDate>Sat, 29 May 2021 22:14:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-221436/</guid>
      <description>Chelsea beat Manchester City 1-0 to win Champions League Soccer final &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DA0H0&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-201433/</link>
      <pubDate>Sat, 29 May 2021 20:14:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-201433/</guid>
      <description>Vietnam detected a new coronavirus variant, a hybrid that it said is airborne and &amp;#39;very dangerous&amp;#39; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/world/asia-pacific/vietnam-detects-hybrid-indian-uk-covid-19-variant-2021-05-29/&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-vilnius-march/belarus-opposition-leader-hails-world-support-after-journalist-arrest-idUSKCN2DA0GJ&amp;#34;&amp;gt;Belarus opposition leader hails world support after journalist arrest&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210529-201415/</link>
      <pubDate>Sat, 29 May 2021 20:14:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210529-201415/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/amazon-devices-will-soon-automatically-share-your-internet-with-neighbors/&amp;#34;&amp;gt;Amazon devices will soon automatically share your Internet with neighbors&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Amazon&amp;amp;#39;s experiment wireless mesh networking turns users into guinea pigs.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210529-181928/</link>
      <pubDate>Sat, 29 May 2021 18:19:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210529-181928/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132423_it-s-the-30th-anniversary-of-the-500-e-the-mercedes-benz-that-porsche-built&amp;#34;&amp;gt;It&amp;#39;s the 30th anniversary of the 500 E, the Mercedes-Benz that Porsche built&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-181646/</link>
      <pubDate>Sat, 29 May 2021 18:16:46 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-181646/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-egypt/egypts-foreign-minister-to-meet-israeli-counterpart-on-sunday-idUSKCN2DA0E1&amp;#34;&amp;gt;Egypt&amp;#39;s foreign minister to meet Israeli counterpart on Sunday&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210529-180527/</link>
      <pubDate>Sat, 29 May 2021 18:05:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210529-180527/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/using-fake-reviews-to-find-dangerous-extensions/&amp;#34;&amp;gt;Using Fake Reviews to Find Dangerous Extensions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and tracking these fake reviewer accounts is often the easiest way to spot scams. Here’s the story of how bogus reviews on a counterfeit Microsoft Authenticator browser extension exposed dozens of other extensions that siphoned personal and financial data.&amp;lt;br&amp;gt;
Comments on the fake Microsoft Authenticator browser extension show the reviews for these applications are either positive or very negative — basically calling it out as a scam. Image: chrome-stats.com.&amp;lt;br&amp;gt;
After hearing from a reader about a phony Microsoft Authenticator extension that appeared on the Google Chrome Store , KrebsOnSecurity began looking at the profile of the account that created it. There were a total of five reviews on the extension before it was removed: Three Google users gave it one star, warning people to stay far away from it; but two of the reviewers awarded it between three and four stars.&amp;lt;br&amp;gt;
“It’s great!,” the Google account Theresa Duncan enthused, improbably. “I’ve only had very occasional issues with it.”&amp;lt;br&amp;gt;
“Very convenient and handing,” assessed Anna Jones , incomprehensibly.&amp;lt;br&amp;gt;
Google’s Chrome Store said the email address tied to the account that published the knockoff Microsoft extension also was responsible for one called “ iArtbook Digital Painting .” Before it was removed from the Chrome Store, iArtbook had garnered just 22 users and three reviews. As with the knockoff Microsoft extension, all three reviews were positive, and all were authored by accounts with first and last names, like Megan Vance , Olivia Knox , and Alison Graham .&amp;lt;br&amp;gt;
Google’s Chrome Store doesn’t make it easy to search by reviewer. For that I turned to Hao Nguyen , the developer behind &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.chrome-stats.com&amp;#34;&amp;gt;chrome-stats.com&amp;lt;/a&amp;gt; , which indexes and makes searchable a broad array of attributes about extensions available from Google.&amp;lt;br&amp;gt;
Looking at the Google accounts that left positive reviews on both the now-defunct Microsoft Authenticator and iArtbook extensions, KrebsOnSecurity noticed that each left positive reviews on a handful of other extensions that have since been removed.&amp;lt;br&amp;gt;
Reviews on the iArtbook extension were all from apparently fake Google accounts that each reviewed two other extensions, one of which was published by the same developer. This same pattern was observed across 45 now-defunct extensions.&amp;lt;br&amp;gt;
Like an ever-expanding &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://en.wikipedia.org/wiki/Venn_diagram&amp;#34;&amp;gt;venn diagram&amp;lt;/a&amp;gt; , a review of the extensions commented on by each new fake reviewer found led to the discovery of even more phony reviewers and extensions. In total, roughly 24 hours worth of digging through chrome-stats.com unearthed more than 100 positive reviews on a network of patently fraudulent extensions.&amp;lt;br&amp;gt;
Those reviews in turn lead to the relatively straightforward identification of:&amp;lt;br&amp;gt;
-39 reviewers who were happy with extensions that spoofed major brands and requested financial data -45 malicious extensions that collectively had close to 100,000 downloads -25 developer accounts tied to multiple banned applications&amp;lt;br&amp;gt;
The extensions spoofed a range of consumer brands, including Adobe , Amazon , Facebook , HBO , Microsoft , Roku and Verizon . Scouring the manifests for each of these other extensions in turn revealed that many of the same developers were tied to multiple apps being promoted by the same phony Google accounts.&amp;lt;br&amp;gt;
Some of the fake extensions have only a handful of downloads, but most have hundreds or thousands. A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chrome-stats.com/d/cfpojnimgikehbalpifbfnofalkmeikm&amp;#34;&amp;gt;fake Microsoft Teams extension&amp;lt;/a&amp;gt; attracted 16,200 downloads in the roughly two months it was available from the Google store. A &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://chrome-stats.com/d/cafffncdbdopajhdpnfpohbneabfmjef&amp;#34;&amp;gt;counterfeit version&amp;lt;/a&amp;gt; of CapCut , a professional video editing software suite, claimed nearly 24,000 downloads over a similar time period.&amp;lt;br&amp;gt;
More than 16,000 people downloaded a fake Microsoft Teams browser extension over the roughly two months it was available for download from the Google Chrome store.&amp;lt;br&amp;gt;
Unlike malicious browser extensions that can &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/03/is-your-browser-extension-a-botnet-backdoor/&amp;#34;&amp;gt;turn your PC into a botnet or harvest your cookies&amp;lt;/a&amp;gt; , none of the extensions examined here request any special permissions from users. Once installed, however, they invariably prompt the user to provide personal and financial data — all the while pretending to be associated with major brand names. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/using-fake-reviews-to-find-dangerous-extensions/#more-55728&amp;#34;&amp;gt;Continue reading →&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/&amp;#34;&amp;gt;Boss of ATM Skimming Syndicate Arrested in Mexico&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Florian “The Shark” Tudor , the alleged ringleader of a prolific ATM skimming gang that siphoned hundreds of millions of dollars from bank accounts of tourists visiting Mexico over the last eight years, was arrested in Mexico City on Thursday in response to an extradition warrant from a Romanian court.&amp;lt;br&amp;gt;
Florian Tudor, at a 2020 press conference in Mexico in which he asserted he was a legitimate businessman and not a mafia boss. Image: OCCRP.&amp;lt;br&amp;gt;
Tudor, a native of Craiova, Romania, moved to Mexico to set up Top Life Servicios , an ATM servicing company which managed a fleet of relatively new ATMs based in Mexico branded as Intacash .&amp;lt;br&amp;gt;
Intacash was the central focus of a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/09/tracking-a-bluetooth-skimmer-gang-in-mexico/&amp;#34;&amp;gt;three&amp;lt;/a&amp;gt; – &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/09/tracking-bluetooth-skimmers-in-mexico-part-ii/&amp;#34;&amp;gt;part&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2015/09/whos-behind-bluetooth-skimming-in-mexico/&amp;#34;&amp;gt;investigation&amp;lt;/a&amp;gt; KrebsOnSecurity published in September 2015. That series tracked the activities of a crime gang working with Intacash that was bribing and otherwise coercing ATM technicians to install sophisticated Bluetooth-based skimmers inside cash machines throughout popular tourist destinations in and around Mexico’s Yucatan Peninsula — including Cancun, Cozumel, Playa del Carmen and Tulum.&amp;lt;br&amp;gt;
Follow-up &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.occrp.org/en/how-a-crew-of-romanian-criminals-conquered-the-world-of-atm-skimming/&amp;#34;&amp;gt;reporting last year&amp;lt;/a&amp;gt; by the Organized Crime and Corruption Reporting Project (OCCRP) found Tudor and his associates compromised more than 100 ATMs across Mexico using skimmers that were able to remain in place undetected for years. The OCCRP, which dubbed Tudor’s group “The Riviera Maya Gang,” estimates the crime syndicate used cloned card data and stolen PINs to steal more than $1.2 billion from bank accounts of tourists visiting the region.&amp;lt;br&amp;gt;
Last year, a Romanian court ordered Tudor’s capture following his conviction in absentia for attempted murder, blackmail and the creation of an organized crime network that specialized in human trafficking.&amp;lt;br&amp;gt;
Mexican authorities have been examining bank accounts tied to Tudor and his companies, and investigators believe Tudor and his associates paid protection and hush money to various Mexican politicians and officials over the years. In February, the leader of Mexico’s Green Party &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2021/02/mexican-politician-removed-over-alleged-ties-to-romanian-atm-skimmer-gang/&amp;#34;&amp;gt;stepped down after it emerged that he received funds from Tudor’s group&amp;lt;/a&amp;gt; .&amp;lt;br&amp;gt;
This is the second time Mexican authorities have detained Tudor. In April 2019, Tudor and his deputy &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://krebsonsecurity.com/2019/04/alleged-chief-of-romanian-atm-skimming-gang-arrested-in-mexico/&amp;#34;&amp;gt;were arrested for illegal firearms possession&amp;lt;/a&amp;gt; . That arrest came just months after Tudor allegedly ordered the execution of a former bodyguard who was trying to help U.S. authorities bring down the group’s lucrative skimming operations.&amp;lt;br&amp;gt;
Tudor’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.gob.mx/fgr/prensa/comunicado-fgr-192-21-fgr-informa&amp;#34;&amp;gt;arrest this week inside the premises of the Mexican Attorney General’s Office&amp;lt;/a&amp;gt; did not go smoothly, according to Mexican news outlets. El Universal &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.eluniversal.com.mx/nacion/video-me-estan-ahorcando-asi-fue-la-detencion-de-florian-tudor-en-la-fgr&amp;#34;&amp;gt;reports&amp;lt;/a&amp;gt; that a brawl broke out between Tudor’s lawyers and officials at the Mexican AG’s office, and &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/El_Universal_Mx/status/1398038127697141761&amp;#34;&amp;gt;a video released by the news outlet on Twitter&amp;lt;/a&amp;gt; shows Tudor resisting arrest as he is being hauled out of the building hand and foot.&amp;lt;br&amp;gt;
A Mexican judge will decide on Tudor’s extradition to Romania in the coming weeks.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-141451/</link>
      <pubDate>Sat, 29 May 2021 14:14:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-141451/</guid>
      <description>Remains of 215 children found at former indigenous school site in Canada &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2D92C0&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hungary-accident-boat-wreath/with-bells-and-flowers-hungary-marks-anniversary-of-danube-boat-disaster-idUSKCN2DA0A5&amp;#34;&amp;gt;With bells and flowers, Hungary marks anniversary of Danube boat disaster&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210529-140553/</link>
      <pubDate>Sat, 29 May 2021 14:05:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210529-140553/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/topic/motivation&amp;#34;&amp;gt;How to Get Motivated&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210529-100532/</link>
      <pubDate>Sat, 29 May 2021 10:05:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210529-100532/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/topic/gaming&amp;#34;&amp;gt;How to Stop Gaming&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-081433/</link>
      <pubDate>Sat, 29 May 2021 08:14:32 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-081433/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-organisers-lose-appeal-to-hold-tiananmen-vigil-idUSKCN2DA051&amp;#34;&amp;gt;Hong Kong organisers lose appeal to hold Tiananmen vigil&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-northkorea-labour/orphans-soldiers-students-n-korea-turns-to-volunteers-for-coal-mines-construction-idUSKCN2DA068&amp;#34;&amp;gt;Orphans, soldiers, students: N.Korea turns to &amp;amp;#39;volunteers&amp;amp;#39; for coal mines, construction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-061506/</link>
      <pubDate>Sat, 29 May 2021 06:15:06 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-061506/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-organisers-loses-appeal-to-hold-tiananmen-vigil-idUSKCN2DA051&amp;#34;&amp;gt;Hong Kong organisers loses appeal to hold Tiananmen vigil&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Organisers of an annual vigil to commemorate the Chinese Communist government&amp;amp;#39;s bloody crackdown on student-led pro-democracy protests in Beijing&amp;amp;#39;s Tiananmen Square in 1989 said on Saturday they had lost an appeal to hold this year&amp;amp;#39;s rally.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210529-041610/</link>
      <pubDate>Sat, 29 May 2021 04:16:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210529-041610/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2015/04/14/polynomial-functors-constrained-by-regular-expressions/&amp;#34;&amp;gt;Polynomial Functors Constrained by Regular Expressions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-041441/</link>
      <pubDate>Sat, 29 May 2021 04:14:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-041441/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-philippines-china-southchinasea/philippines-protests-chinas-illegal-south-china-sea-presence-idUSKCN2DA03O&amp;#34;&amp;gt;Philippines protests China&amp;#39;s &amp;#39;illegal&amp;#39; South China Sea presence&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-021537/</link>
      <pubDate>Sat, 29 May 2021 02:15:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210529-021537/</guid>
      <description>U.S. to reimpose sanctions on nine Belarus firms over forced landing of Ryanair flight and journalist&amp;#39;s arrest &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2DA014&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-belarus-sanctions/u-s-drawing-up-targeted-sanctions-on-belarus-officials-after-plane-incident-idUSKCN2DA014&amp;#34;&amp;gt;U.S. drawing up targeted sanctions on Belarus officials after plane incident&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WASHINGTON (Reuters) -The Biden administration said on Friday it is drawing up a list of targeted sanctions against key members of the Belarusian government following the former Soviet republic&amp;amp;#39;s forced landing of a passenger jet and arrest of a journalist on board.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Brendan Gregg&#39;s Homepage</title>
      <link>https://www.whatsupup.com/blog/bilateralistic/jungle/20210529-020905/</link>
      <pubDate>Sat, 29 May 2021 02:09:05 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/bilateralistic/jungle/20210529-020905/</guid>
      <description>29 May 2021 » &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.brendangregg.com/blog/2021-05-29/moving-to-australia.html&amp;#34;&amp;gt;Moving my US tech job to Australia&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210529-001410/</link>
      <pubDate>Sat, 29 May 2021 00:14:09 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210529-001410/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2011/11/10/format-preserving-encryption-or-how-to/&amp;#34;&amp;gt;Format Preserving Encryption, or, how to encrypt a credit card number with AES&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210528-220731/</link>
      <pubDate>Fri, 28 May 2021 22:07:30 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210528-220731/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/announcing-our-latest-profile-badge-the-certified-discord-moderator-908182193af8?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Announcing our Latest Profile Badge: the Certified Discord Moderator&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/announcing-our-latest-profile-badge-the-certified-discord-moderator-908182193af8?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Announcing our Latest Profile Badge: the Certified Discord Moderator The Certified Discord Moderator badge rewards the unsung heroes who go above and beyond and make communities on Discord what they are.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-201520/</link>
      <pubDate>Fri, 28 May 2021 20:15:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-201520/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-usa-india/blinken-says-u-s-and-india-united-in-tackling-covid-19-idUSKCN2D928K&amp;#34;&amp;gt;Blinken says U.S. and India united in tackling COVID-19&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-france-security/french-policewoman-stabbed-by-ex-prisoner-on-threat-watch-list-idUSKCN2D913W&amp;#34;&amp;gt;French policewoman stabbed by ex-prisoner on threat watch list&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210528-201415/</link>
      <pubDate>Fri, 28 May 2021 20:14:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210528-201415/</guid>
      <description>A newsletter about big tech and society by Silicon Valley-based journalist Alex Kantrowitz.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210528-181718/</link>
      <pubDate>Fri, 28 May 2021 18:17:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210528-181718/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2011/05/18/tic-tac-toe-maps-with-diagrams/&amp;#34;&amp;gt;Tic-tac-toe maps with diagrams&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210528-181631/</link>
      <pubDate>Fri, 28 May 2021 18:16:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210528-181631/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/es/2021/05/28/espanol/astronomia-sol-clima-espacio.html&amp;#34;&amp;gt;Allá Afuera ¿La nueva temporada de tormentas solares será tempestuosa o tranquila? Al comenzar otro ciclo de actividad solar de 11 años, los científicos debaten cuán violento puede ser nuestro amigo estelar. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-181538/</link>
      <pubDate>Fri, 28 May 2021 18:15:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-181538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-russia/putin-offers-belarus-leader-support-against-west-in-ryanair-plane-standoff-idUSKCN2D91FI&amp;#34;&amp;gt;Putin offers Belarus leader support against West in Ryanair plane standoff&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
MOSCOW (Reuters) -Russian President Vladimir Putin on Friday offered his Belarusian counterpart Alexander Lukashenko support in his standoff with the West over his handling of the grounding of a passenger jet and the arrest of a dissident blogger.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210528-180717/</link>
      <pubDate>Fri, 28 May 2021 18:07:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210528-180717/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/react-component-libraries/&amp;#34;&amp;gt;Top React component libraries (2021 edition) Get an overview of the top React component libraries looking at several factors like popularity, use cases, documentation, resources, support, etc.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-161905/</link>
      <pubDate>Fri, 28 May 2021 16:19:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-161905/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132418_2023-mercedes-benz-amg-eqe-spy-shots&amp;#34;&amp;gt;2023 Mercedes-Benz AMG EQE spy shots: AMG crafts second dedicated EV&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-141951/</link>
      <pubDate>Fri, 28 May 2021 14:19:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-141951/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132415_this-964-generation-porsche-911-delivers-500-hp-zero-emissions&amp;#34;&amp;gt;This 964-generation Porsche 911 delivers 500 hp, zero emissions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132373_parnelli-jones-baja-raced-big-oly-ford-bronco-sold-for-1-87m&amp;#34;&amp;gt;Parnelli Jones&amp;amp;#39; Baja-raced &amp;amp;#34;Big Oly&amp;amp;#34; Ford Bronco sold for $1.87M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1113484_stellantis-ceo-samples-maserati-grecale-crossover-due-in-2021&amp;#34;&amp;gt;Stellantis CEO samples Maserati Grecale crossover due in 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210528-141813/</link>
      <pubDate>Fri, 28 May 2021 14:18:12 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210528-141813/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/07/19/monads-easy-or-hard/&amp;#34;&amp;gt;Monads: Easy or Hard?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210528-141618/</link>
      <pubDate>Fri, 28 May 2021 14:16:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210528-141618/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/apples-m1-chip-has-a-security-bug-but-dont-worry-its-mostly-harmless/&amp;#34;&amp;gt;Covert channel in Apple’s M1 is mostly harmless, but it sure is interesting&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Technically, it&amp;amp;#39;s a vulnerability, but there&amp;amp;#39;s not much an attacker can do with it.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-141615/</link>
      <pubDate>Fri, 28 May 2021 14:16:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-141615/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-russia/belarus-leader-flies-into-russia-for-talks-with-putin-amid-uproar-over-air-piracy-idUSKCN2D91FI&amp;#34;&amp;gt;Belarus leader flies into Russia for talks with Putin amid uproar over &amp;#39;air piracy&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/05/28/the-week-in-numbers-bond-market-billions?videoId=730586301&amp;amp;videoChannel=118169&amp;#34;&amp;gt;The Week in Numbers: &amp;amp;#39;Bond&amp;amp;#39; market billions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-121725/</link>
      <pubDate>Fri, 28 May 2021 12:17:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-121725/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132411_review-update-2021-mercedes-benz-amg-glb35-combines-power-and-practicality&amp;#34;&amp;gt;Review update: 2021 Mercedes-Benz AMG GLB35 combines power and practicality&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-121424/</link>
      <pubDate>Fri, 28 May 2021 12:14:23 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-121424/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-conflict-un/un-alarmed-at-soldiers-detaining-displaced-from-tigray-camps-idUSKCN2D90WZ&amp;#34;&amp;gt;UN alarmed at soldiers detaining displaced from Tigray camps&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
GENEVA (Reuters) -The United Nations refugee agency voiced deep concern on Friday at reports of soldiers taking hundreds of people away from displacement camps in the Tigray region of Ethiopia earlier this week, saying such sites should be a safe haven.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nigeria-accident/boat-carrying-200-people-capsizes-in-nigeria-idUSKCN2D72FU&amp;#34;&amp;gt;Boat carrying 200 people capsizes in Nigeria&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-101752/</link>
      <pubDate>Fri, 28 May 2021 10:17:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210528-101752/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1124807_2022-volkswagen-transporter-t7-spy-shots-and-video&amp;#34;&amp;gt;2022 Volkswagen Transporter (T7) spy shots and video: Popular van moves to MQB&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132403_first-of-new-rear-drive-premium-mazdas-tipped-to-be-cx-50-crossover&amp;#34;&amp;gt;First of new rear-drive, premium Mazdas tipped to be CX-50 crossover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210528-101541/</link>
      <pubDate>Fri, 28 May 2021 10:15:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210528-101541/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/05/28/science/astronomy-sun-space-weather.html&amp;#34;&amp;gt;Out There Will the Next Space-Weather Season Be Stormy or Fair? As another 11-year cycle of solar activity begins, scientists debate how violent our stellar friend is likely to be. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210528-101443/</link>
      <pubDate>Fri, 28 May 2021 10:14:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210528-101443/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/microsoft-says-solarwinds-hackers-targeted-us-agencies-in-a-new-campaign/&amp;#34;&amp;gt;SolarWinds hackers are back with a new mass campaign, Microsoft says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Kremlin-backed group uses hacked account to impersonate US aid agency.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-101442/</link>
      <pubDate>Fri, 28 May 2021 10:14:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-101442/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-nato-summit-spending-exclusive/exclusive-france-resists-more-joint-funding-of-brain-dead-nato-idUSKCN2D90WT&amp;#34;&amp;gt;Exclusive: France resists more joint funding of &amp;#39;brain dead&amp;#39; NATO&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
A $20 billion plan to give NATO more flexibility in facing military threats, climate change and China&amp;amp;#39;s rise has hit firm resistance from France, which fears the move could undermine its defence priorities, four diplomats and a French defence source said.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Guides and digital tools to help you stop procrastinating</title>
      <link>https://www.whatsupup.com/blog/rubicundity/envenomation/20210528-100545/</link>
      <pubDate>Fri, 28 May 2021 10:05:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/rubicundity/envenomation/20210528-100545/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-change-for-the-better&amp;#34;&amp;gt;How to change for the better&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-set-goals-that-work&amp;#34;&amp;gt;How to set goals that work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-finally-start-doing-something-about-your-dreams&amp;#34;&amp;gt;How to finally start doing something about your dreams&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-avoid-i-ll-do-it-tomorrow&amp;#34;&amp;gt;How to avoid “I’ll do it tomorrow”&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/case-study-why-you-should-play-factorio&amp;#34;&amp;gt;Case Study: Why you should play Factorio&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-benefits-of-gaming&amp;#34;&amp;gt;The real benefits of gaming&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/play-the-ultimate-game-your-real-life&amp;#34;&amp;gt;Play the ultimate game: your real life&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/the-real-reason-why-you-get-distracted&amp;#34;&amp;gt;The real reason why you get distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/today-shouldnt-suck&amp;#34;&amp;gt;Today shouldn’t suck&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/4-most-common-ways-of-getting-distracted&amp;#34;&amp;gt;4 most common ways of getting distracted&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-be-productive-without-forcing-yourself&amp;#34;&amp;gt;How to be more productive without forcing yourself&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/how-to-focus-on-work&amp;#34;&amp;gt;How to focus on work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.deprocrastination.co/blog/block-out-input-free-time&amp;#34;&amp;gt;Block out input-free time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-081429/</link>
      <pubDate>Fri, 28 May 2021 08:14:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-081429/</guid>
      <description>BENGALURU (Reuters) -Coronavirus infections in the South Asia region surpassed 30 million on Friday, according to a Reuters tally of official data, led by India which is struggling with a second COVID-19 wave and a vaccine shortage across the region.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-061602/</link>
      <pubDate>Fri, 28 May 2021 06:16:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-061602/</guid>
      <description>&amp;lt;p&amp;gt;Jailed Hong Kong media tycoon and Beijing critic Jimmy Lai was given a new prison sentence of 14 months on Friday over his role in an unauthorised assembly on Oct. 1, 2019, during one of the city&amp;#39;s pro-democracy rallies that year.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-south-asia-cases/south-asia-crosses-30-million-covid-19-cases-as-india-battles-second-wave-idUSKCN2D90CF&amp;#34;&amp;gt;South Asia crosses 30 million COVID-19 cases as India battles second wave&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-ethiopia-election-media-insight/in-abiys-ethiopia-press-freedom-flourished-then-fear-returned-idUSKCN2D90FT&amp;#34;&amp;gt;In Abiy&amp;amp;#39;s Ethiopia, press freedom flourished then fear returned&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Neil Sainsbury</title>
      <link>https://www.whatsupup.com/blog/invertase/atween/20210528-060757/</link>
      <pubDate>Fri, 28 May 2021 06:07:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/invertase/atween/20210528-060757/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/&amp;#34;&amp;gt;Neil Sainsbury&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/about&amp;#34;&amp;gt;/about&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/consulting&amp;#34;&amp;gt;/consulting&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/writing&amp;#34;&amp;gt;/writing&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://twitter.com/neilwithdata&amp;#34;&amp;gt;/twitter&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
I&amp;amp;#39;m a software developer, enjoying building mobile apps and API back-ends and services. I&amp;amp;#39;m also a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/mathematics-self-learner&amp;#34;&amp;gt;math enthusiast&amp;lt;/a&amp;gt; with an interest in
            databases (check out my &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.masterywithsql.com&amp;#34;&amp;gt;Mastery with
            SQL&amp;lt;/a&amp;gt; course)&amp;lt;br&amp;gt;
2020&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/advanced-sql&amp;#34;&amp;gt;Advanced SQL and database books and resources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
May 1, 2020&amp;lt;br&amp;gt;
For people who&amp;amp;#39;ve worked through Mastery with SQL, a common question I get is &amp;amp;#34;What&amp;amp;#39;s next?&amp;amp;#34; If you completed the course and all 150&#43; exercises, at this point you&amp;amp;#39;ll have a very strong grasp of SQL and should be comfortable writing all sorts of...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/developer-myth&amp;#34;&amp;gt;The myth of the developer that can&amp;amp;#39;t code&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
At the time of writing, my last blog post on the subject of hiring has over 150K views and generated a lot of great discussion. It touched a nerve. Good. There&amp;amp;#39;s lots of agreement that developer hiring is broken. But there&amp;amp;#39;s also disagreement, or...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/developer-hiring&amp;#34;&amp;gt;The software industry&amp;amp;#39;s greatest sin: hiring&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
One of the greatest sins in the entire software industry has got to be the way developers are hired. It is irredeemably broken and needs to be torn down and completely rebuilt. I&amp;amp;#39;ve been a software developer now for around 15 years. In that time,...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/chrome-redirect-forget&amp;#34;&amp;gt;How to make Chrome forget a permanent redirect?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Recently I&amp;amp;#39;ve been working on a project that sets up a number of permanent (HTTP 301) redirects on localhost. While that&amp;amp;#39;s useful for that project, after stepping outside of that project these redirects got in the way of other development...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/django-sql-logging&amp;#34;&amp;gt;Logging raw SQL to the console in Django&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When working on a Django project it can be useful to see the raw SQL queries being made to your database - you can quickly and easily identify when there are too many calls being made and look for other inefficient access patterns (queries asking...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/teams-bot-without-azure&amp;#34;&amp;gt;Can you build a Microsoft Teams bot without using Azure?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Yes. But also, no. Let me explain. One important concept to understand right away is that Microsoft Teams apps never directly communicate with your web services. A Teams app as installed in the client is actually just a JSON manifest file and...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/teams-app-id-password&amp;#34;&amp;gt;What are the Microsoft App ID and password for when building a Teams bot?&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When you&amp;amp;#39;re building an app for Microsoft Teams, or really, anything that&amp;amp;#39;s going to end up using the Azure Bot Service, at some point in the process you have to create and manage a Microsoft App ID and password. When you first do this, it feels...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/azure-functions-post-body-js&amp;#34;&amp;gt;Azure Functions: How to get data from a POST body in JavaScript&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When working with Azure Functions, a common thing you&amp;amp;#39;ll want to do is get data out of the POST body inside your function. Handily, if you make your POST request in JSON format, you&amp;amp;#39;ll be able to simply access the object properties by name,...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/azure-cli-webapp-runtime-error&amp;#34;&amp;gt;Command not recognized error when specifying a runtime during webapp creation with Azure CLI&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Recently I&amp;amp;#39;ve been working with Azure and have been using the Azure CLI to script up creation of a Node.js webapp (btw, the Azure CLI Tools extension is excellent for this). I found however that when scripting up the creation of the webapp, if...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/ms-teams-validdomains-error&amp;#34;&amp;gt;Microsoft Teams error - &amp;amp;#39;validDomains&amp;amp;#39; array cannot contain a tunneling site&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When building your first app or bot for Microsoft Teams, one error you might come across during your development when you&amp;amp;#39;re using the tool ngrok is in App Studio. In the Manifest Editor, when you go to the Test and Distribute tab, if you&amp;amp;#39;ve been...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/how-i-built-bbsmart&amp;#34;&amp;gt;How I built the best-selling BlackBerry app of all-time&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
Many years ago, I built what I believe was the best-selling BlackBerry app of all-time, BBSmart Email Viewer. It feels strange to write that, and it&amp;amp;#39;s not something I&amp;amp;#39;d say I&amp;amp;#39;m really known for outside of the small niche community of BlackBerry...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/mathematics-self-learner&amp;#34;&amp;gt;Mathematics for the adventurous self-learner&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
For over six years now, I&amp;amp;#39;ve been studying mathematics on my own in my spare time - working my way through books, exercises, and online courses. In this post I&amp;amp;#39;ll share what books and resources I&amp;amp;#39;ve worked through and recommend and also tips for...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/using-vscode-with-psql&amp;#34;&amp;gt;Using Visual Studio Code with psql&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
A quick HOWTO to show you how to setup psql to use Visual Studio Code for interactive editing. Updating your EDITOR When you&amp;amp;#39;re working in psql, it can be handy to jump to a richer text editor, particularly when typing up longer queries. In psql,...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/with-ties-postgresql&amp;#34;&amp;gt;Implementing SQL Server&amp;amp;#39;s WITH TIES in PostgreSQL&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
SQL Server supports a TOP (N) WITH TIES clause which can be used to return the top N rows from a query along with any additional rows that have the same sort value as the Nth row. It&amp;amp;#39;s handy functionality that can come in use in many situations....&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/join-using&amp;#34;&amp;gt;Joins: USING vs ON for join conditions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
When establishing the join condition between two tables in PostgreSQL, and you&amp;amp;#39;re performing an equality join where the columns are named the same in both tables, a nice shorthand syntax to establish the join is with USING. You might think this...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/copy-permission-denied&amp;#34;&amp;gt;Permission Denied error when using PostgreSQL&amp;amp;#39;s COPY FROM/TO command&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
COPY FROM is commonly used to import data from a file (CSV, plain text, etc.) in to PostgreSQL. Likewise, COPY TO is used to export data from a table or a query result to a file. When you&amp;amp;#39;re using these commands if you&amp;amp;#39;re getting a &amp;amp;#34;Permission...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/mastery-with-sql-launch&amp;#34;&amp;gt;Mastery with SQL is out now!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
My new course Mastery with SQL is out now! I&amp;amp;#39;m so thrilled with how it&amp;amp;#39;s turned out. My goal when I set out was to build a course that&amp;amp;#39;s exercise-centric. I&amp;amp;#39;m an avid learner who loves studying new domains, and in my experience one of the best...&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.neilwithdata.com/using-distinct&amp;#34;&amp;gt;Using Distinct&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
The DISTINCT keyword has a bunch of interesting use-cases in ANSI SQL and offers some additional functionality when used in PostgreSQL. Let&amp;amp;#39;s dive in and take a look with an example (you can find the full source code to reproduce this example on...&amp;lt;br&amp;gt;
Neil Sainsbury 2020. Background pattern from &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://www.heropatterns.com/&amp;#34;&amp;gt;heropatterns.com&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210528-041759/</link>
      <pubDate>Fri, 28 May 2021 04:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210528-041759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2012/06/12/unsubscribing-from-wolfram-emails-rant/&amp;#34;&amp;gt;Unsubscribing from Wolfram emails (rant)&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-041620/</link>
      <pubDate>Fri, 28 May 2021 04:16:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-041620/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/jailed-hk-tycoon-jimmy-lai-sentenced-to-14-months-for-oct-1-illegal-assembly-idUSKCN2D9024&amp;#34;&amp;gt;Jailed HK tycoon Jimmy Lai sentenced to 14 months for Oct. 1 illegal assembly&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
HONG KONG (Reuters) -Jailed Hong Kong media tycoon and Beijing critic Jimmy Lai was given a new prison sentence of 14 months on Friday over his role in an unauthorised assembly on Oct. 1, 2019, during one of the city&amp;amp;#39;s pro-democracy rallies that year.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics-asean/southeast-asian-nations-oppose-arms-embargo-on-myanmar-report-idUSKCN2D908K&amp;#34;&amp;gt;Southeast Asian nations oppose arms embargo on Myanmar -report&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bad Request</title>
      <link>https://www.whatsupup.com/blog/invertase/atween/20210528-040758/</link>
      <pubDate>Fri, 28 May 2021 04:07:58 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/invertase/atween/20210528-040758/</guid>
      <description>[Nothing new, only with content removed]</description>
    </item>
    
    <item>
      <title>Big Technology</title>
      <link>https://www.whatsupup.com/blog/overgrazing/propellent/20210528-021523/</link>
      <pubDate>Fri, 28 May 2021 02:15:22 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overgrazing/propellent/20210528-021523/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-skyrocketing-import-costs-are&amp;#34;&amp;gt;Why Skyrocketing Import Costs Are Hammering Amazon Sellers (And You)&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/why-skyrocketing-import-costs-are&amp;#34;&amp;gt;Shipping one container from China to the U.S. cost $2,000 a year ago. Now it’s up to $15,000, leaving sellers scrambling and causing product prices to rise.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/well-exit-the-pandemic-with-a-more&amp;#34;&amp;gt;We’ll Exit The Pandemic With a More Realistic Relationship With Work&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/well-exit-the-pandemic-with-a-more&amp;#34;&amp;gt;With community in decline, we counted on work for meaning. But a year in isolation is clarifying. We’ll come out of this with more sensible expectation…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
May 21 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;10&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://bigtechnology.substack.com/p/well-exit-the-pandemic-with-a-more/comments&amp;#34;&amp;gt;Comment 2&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;javascript:void(0)&amp;#34;&amp;gt;Share&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-001611/</link>
      <pubDate>Fri, 28 May 2021 00:16:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210528-001611/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-election-results/syrias-assad-wins-4th-term-with-95-of-vote-in-election-the-west-calls-fraudulent-idUSKCN2D82S2&amp;#34;&amp;gt;Syria&amp;#39;s Assad wins 4th term with 95% of vote, in election the West calls fraudulent&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIRUT (Reuters) -Syrian President Bashar al-Assad won a fourth term in office with 95.1% of the votes in an election that will extend his rule over a country ruined by war but which opponents and the West say was marked by fraud.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-221538/</link>
      <pubDate>Thu, 27 May 2021 22:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-221538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-election-results/syrias-assad-wins-fourth-term-in-office-with-95-1-of-votes-idUSKCN2D82S2&amp;#34;&amp;gt;Syria&amp;#39;s Assad wins fourth term in office with 95.1% of votes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BEIRUT (Reuters) -Syria&amp;amp;#39;s President Bashar al-Assad won a fourth term in office with 95.1% of votes in an election that will extend his rule over a country ruined by war but which opponents and the West say was marked by fraud.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-201502/</link>
      <pubDate>Thu, 27 May 2021 20:15:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-201502/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-un/u-n-launches-investigation-into-whether-israel-hamas-committed-crimes-idUSKCN2D80YQ&amp;#34;&amp;gt;U.N. launches investigation into whether Israel, Hamas committed crimes&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-181820/</link>
      <pubDate>Thu, 27 May 2021 18:18:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-181820/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132405_2023-chevrolet-colorado-spy-shots&amp;#34;&amp;gt;2023 Chevrolet Colorado spy shots: Redesigned mid-size pickup on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132342_2022-toyota-tundra-2022-ford-f-150-lightning-2021-acura-tlx-type-s-the-week-in-reverse&amp;#34;&amp;gt;2022 Toyota Tundra, 2022 Ford F-150 Lightning, 2021 Acura TLX Type S: The Week In Reverse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-181521/</link>
      <pubDate>Thu, 27 May 2021 18:15:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-181521/</guid>
      <description>Exclusive: U.S. opens criminal probe into alleged lapses at Eli Lilly plant &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSL2N2NE1JW&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-162008/</link>
      <pubDate>Thu, 27 May 2021 16:20:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-162008/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132404_hyundai-hydrogen-electric-semi-to-hit-us-roads-in-2021&amp;#34;&amp;gt;Hyundai hydrogen-electric semi to hit US roads in 2021&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-161656/</link>
      <pubDate>Thu, 27 May 2021 16:16:55 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-161656/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-nato-turkey-exclusiv/exclusive-turkey-pushed-nato-allies-into-softening-outrage-over-belarus-plane-diplomats-say-idUSKCN2D826P&amp;#34;&amp;gt;Exclusive: Turkey pushed NATO allies into softening outrage over Belarus plane, diplomats say&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Turkey pushed NATO allies into watering down an official reaction to the forced landing by Belarus of a passenger plane and the detention of a dissident journalist on Sunday, two diplomats familiar with the matter told Reuters.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security/hong-kong-passes-sweeping-pro-china-election-rules-reduces-publics-voting-power-idUSKCN2D811T&amp;#34;&amp;gt;Hong Kong passes sweeping pro-China election rules, reduces public&amp;amp;#39;s voting power&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210527-160804/</link>
      <pubDate>Thu, 27 May 2021 16:08:04 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210527-160804/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/jetfuel-customer-story/&amp;#34;&amp;gt;How Jetfuel sped up customer support by marrying data and actions with Retool This is the story of how a co-founder and CRO built internal tools that helped every team bring insights and action into the same place.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-141952/</link>
      <pubDate>Thu, 27 May 2021 14:19:52 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-141952/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132400_ssc-tuatara-striker-and-aggressor-unveiled-with-up-to-2-200-horsepower&amp;#34;&amp;gt;SSC Tuatara Striker and Aggressor unveiled with up to 2,200 horsepower&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1117022_rolls-royce-reveals-boat-tail-as-sign-of-return-to-coachbuilding&amp;#34;&amp;gt;Rolls-Royce reveals Boat Tail as sign of return to coachbuilding&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210527-141839/</link>
      <pubDate>Thu, 27 May 2021 14:18:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210527-141839/</guid>
      <description>Write a Comment&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-141645/</link>
      <pubDate>Thu, 27 May 2021 14:16:44 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-141645/</guid>
      <description>British Prime Minister Boris Johnson on Thursday brushed aside  allegations from his former chief aide that his failings had caused tens of thousands of unnecessary deaths from COVID-19, saying &amp;amp;quot;some of the commentary&amp;amp;quot; bore no relation to reality.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-141456/</link>
      <pubDate>Thu, 27 May 2021 14:14:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-141456/</guid>
      <description>Write a Comment&amp;amp;hellip;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210527-141409/</link>
      <pubDate>Thu, 27 May 2021 14:14:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210527-141409/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#conferences&amp;#34;&amp;gt;conferences&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#cpp-on-sea&amp;#34;&amp;gt;cpp-on-sea&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/tags/#training&amp;#34;&amp;gt;training&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
The schedule for C&#43;&#43; on Sea 2021 has been announced! The “conference day”
involves two tracks of five talks each, plus a keynote by Barbara Geller
and Ansel Sermersheim.
The two “workshop days” offer… well, you should sign up for my own
two-day training class, at which point the other offerings are moot.
But, just for the record, the two available two-day classes are:&amp;lt;br&amp;gt;
Arthur O’Dwyer’s &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cpponsea.uk/2021/sessions/workshop_modern-stl-programming-algorithms-containers-iterators.html&amp;#34;&amp;gt;“Modern STL Programming”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Anthony Williams’ &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://cpponsea.uk/2021/sessions/workshop_more-concurrent-thinking-in-cpp.html&amp;#34;&amp;gt;“More Concurrent Thinking in C&#43;&#43;”&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
If you don’t do a two-day class, then on Wednesday you can choose among these options: …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-122216/</link>
      <pubDate>Thu, 27 May 2021 12:22:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210527-122216/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1089319_2023-porsche-911-safari-spy-shots-and-video&amp;#34;&amp;gt;A modern Safari? Porsche tests high-riding 911&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132402_mclaren-adds-windshield-option-to-elva-speedster&amp;#34;&amp;gt;McLaren adds windshield option to Elva speedster&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-121926/</link>
      <pubDate>Thu, 27 May 2021 12:19:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-121926/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/no-relation-to-reality-uk-pm-johnson-brushes-off-ex-aides-claims-idUSKCN2D80UV&amp;#34;&amp;gt;No relation to reality: UK PM Johnson brushes off ex-aide&amp;#39;s claims&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dennis Overbye - The New York Times</title>
      <link>https://www.whatsupup.com/blog/traveling/splay/20210527-101548/</link>
      <pubDate>Thu, 27 May 2021 10:15:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/traveling/splay/20210527-101548/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/05/27/science/black-hole-names-holley-bockelmann.html&amp;#34;&amp;gt;Out There What to Name a Bunch of Black Holes? You Had Some Ideas. Recently, astronomers asked aloud which plural term would best suit the most enigmatic entity in the cosmos. The responses were plentiful. By Dennis Overbye&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-101508/</link>
      <pubDate>Thu, 27 May 2021 10:15:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-101508/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-taiwan-china/taiwan-says-request-to-drop-word-country-preceded-biontech-vaccine-deal-collapse-idUSKCN2D810T&amp;#34;&amp;gt;Taiwan says request to drop word &amp;#39;country&amp;#39; preceded BioNTech vaccine deal collapse&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-081518/</link>
      <pubDate>Thu, 27 May 2021 08:15:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-081518/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-australia-trial/china-keeps-diplomats-out-of-espionage-trial-of-australian-yang-hengjun-idUSKCN2D72SK&amp;#34;&amp;gt;China keeps diplomats out of espionage trial of Australian Yang Hengjun&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-061508/</link>
      <pubDate>Thu, 27 May 2021 06:15:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-061508/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-hongkong-security-jimmylai-exclusive/exclusive-hong-kong-security-chief-threatens-tycoon-lais-bankers-with-jail-if-they-deal-in-his-accounts-idUSKCN2D80EM&amp;#34;&amp;gt;Exclusive: Hong Kong security chief threatens tycoon Lai&amp;#39;s bankers with jail if they deal in his accounts&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/australias-victoria-state-to-enter-covid-19-lockdown-after-highly-infectious-outbreak-idUSKCN2D72XY&amp;#34;&amp;gt;Australia&amp;amp;#39;s Victoria state to enter COVID-19 lockdown after &amp;amp;#39;highly-infectious&amp;amp;#39; outbreak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-061343/</link>
      <pubDate>Thu, 27 May 2021 06:13:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-061343/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2019/02/11/attack-of-the-week-searchable-encryption-and-the-ever-expanding-leakage-function/&amp;#34;&amp;gt;Attack of the week: searchable encryption and the ever-expanding leakage function&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-041554/</link>
      <pubDate>Thu, 27 May 2021 04:15:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-041554/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-china-usa/chinese-embassy-in-u-s-says-politicising-covid-19-origins-hampers-investigations-idUSKCN2D8023&amp;#34;&amp;gt;Chinese embassy in U.S. says politicising COVID-19 origins hampers investigations&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Politicising the origins of COVID-19 would hamper further investigations and undermine global efforts to curb the pandemic, China&amp;amp;#39;s U.S. embassy said after President Joe Biden ordered a review of intelligence about where the virus emerged.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-australia-trial/australian-yang-hengjun-to-face-court-in-beijing-on-espionage-charges-idUSKCN2D72SK&amp;#34;&amp;gt;Australian Yang Hengjun to face court in Beijing on espionage charges&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210527-040742/</link>
      <pubDate>Thu, 27 May 2021 04:07:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210527-040742/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/best-postgresql-guis-in-2020/&amp;#34;&amp;gt;Best PostgreSQL GUIs in 2021 (Updated) psql is nice, but nobody wants to write their queries in the command line. This post walks through the best GUIs available for querying your Postgres data.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-021844/</link>
      <pubDate>Thu, 27 May 2021 02:18:43 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210527-021844/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-aviation-safety-anal/analysis-pressure-grows-for-sensitive-belarus-air-safety-probe-idUSKCN2D726Y&amp;#34;&amp;gt;Analysis: Pressure grows for sensitive Belarus air safety probe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-001450/</link>
      <pubDate>Thu, 27 May 2021 00:14:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210527-001450/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2011/12/01/how-not-to-use-symmetric-encryption/&amp;#34;&amp;gt;How (not) to use symmetric encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Arthur O&#39;Dwyer – Stuff mostly about C&#43;&#43;</title>
      <link>https://www.whatsupup.com/blog/boxed/modification/20210527-001400/</link>
      <pubDate>Thu, 27 May 2021 00:14:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/boxed/modification/20210527-001400/</guid>
      <description>Previously on this blog:&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/05/19/after-you-no-after-you/&amp;#34;&amp;gt;“A metaprogramming puzzle: Overly interoperable libraries”&amp;lt;/a&amp;gt; (2021-05-19)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://quuxplusone.github.io/blog/2021/05/22/after-you-part-two/&amp;#34;&amp;gt;“Overly interoperable libraries, part 2”&amp;lt;/a&amp;gt; (2021-05-22)&amp;lt;br&amp;gt;
Jason Cobb has sent me a proposal that I think meets all the requirements and
therefore qualifies as a complete solution!&amp;lt;br&amp;gt;
Unlike the ideas in my previous posts, Jason’s solution doesn’t depend on “GUIDs” at all.
It’s based on a simple idea that is, in hindsight, quite obvious. …&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210526-221532/</link>
      <pubDate>Wed, 26 May 2021 22:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210526-221532/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/&amp;#34;&amp;gt;No, it doesn’t just crash Safari. Apple has yet to fix exploitable flaw&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-221528/</link>
      <pubDate>Wed, 26 May 2021 22:15:27 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-221528/</guid>
      <description>(In 11th paragraph adds missing first name of attorney to read Zach Thornley)&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-strife-analysis/analysis-as-gaza-fighting-ebbs-israels-communities-eye-each-other-warily-idUSKCN2D712X&amp;#34;&amp;gt;Analysis: As Gaza fighting ebbs, Israel&amp;#39;s communities eye each other warily&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210526-220714/</link>
      <pubDate>Wed, 26 May 2021 22:07:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210526-220714/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/nacho-iacovino-on-the-future-of-internal-tools/&amp;#34;&amp;gt;Why the future of internal tools will lead to less coding from scratch for developers A guest post from Nacho Iacovino, developer advocate at Clerk, who recently chatted with us about the findings from our 2021 State of Internal Tools report and where he thinks internal tool development is going.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-201526/</link>
      <pubDate>Wed, 26 May 2021 20:15:25 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-201526/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-protasevich/detained-journalist-broke-his-own-rule-never-fly-over-belarus-says-friend-idUSKCN2D72IZ&amp;#34;&amp;gt;Detained journalist broke his own rule - Never fly over Belarus, says friend&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210526-201516/</link>
      <pubDate>Wed, 26 May 2021 20:15:16 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210526-201516/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/&amp;#34;&amp;gt;Exploitable security bug remains in iOS and macOS 3 weeks after upstream fix&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WebKit bug that was fixed upstream has yet to find its way into Apple products.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-181804/</link>
      <pubDate>Wed, 26 May 2021 18:18:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-181804/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132392_lamborghini-huracan-super-trofeo-evo2-gets-an-aggressive-makeover&amp;#34;&amp;gt;Lamborghini Huracan Super Trofeo Evo2 gets an aggressive makeover&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-181503/</link>
      <pubDate>Wed, 26 May 2021 18:15:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-181503/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uk-pms-ineptitude-led-to-tens-of-thousands-of-deaths-ex-aide-says-idUSKCN2D62VU&amp;#34;&amp;gt;UK PM&amp;#39;s ineptitude led to tens of thousands of deaths, ex-aide says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
British Prime Minister Boris Johnson&amp;amp;#39;s inept handling of the COVID pandemic led to tens of thousands of unnecessary deaths, and officials even feared he would ask to be injected with the virus on television to show it was benign, his former chief adviser said on Wednesday.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210526-181308/</link>
      <pubDate>Wed, 26 May 2021 18:13:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210526-181308/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/05/introducing-security-by-design.html&amp;#34;&amp;gt;Introducing Security By Design&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Posted by Jon Markoff and Sean Smith, Android Security and Privacy Team &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/05/introducing-security-by-design.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Posted by Jon Markoff and Sean Smith, Android Security and Privacy Team&amp;lt;br&amp;gt;
Integrating security into your app development lifecycle can save a lot of time, money, and risk. That’s why we’ve launched &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://playacademy.exceedlms.com/student/path/63550-security-by-design&amp;#34;&amp;gt;Security by Design&amp;lt;/a&amp;gt; on &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://playacademy.exceedlms.com/student/catalog&amp;#34;&amp;gt;Google Play Academy&amp;lt;/a&amp;gt; to help developers identify, mitigate, and proactively protect against security threats.&amp;lt;br&amp;gt;
The Android ecosystem, including Google Play, has many built-in security features that help protect developers and users. The course &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://g.co/playacademy/security?utm_source=google&amp;amp;utm_medium=blog&amp;amp;utm_campaign=Security&amp;amp;utm_content=androidblog&amp;#34;&amp;gt;Introduction to app security best practices&amp;lt;/a&amp;gt; takes these protections one step further by helping you take advantage of additional security features to build into your app. For example, &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/topic/security/data&amp;#34;&amp;gt;Jetpack Security&amp;lt;/a&amp;gt; helps developers properly encrypt their data at rest and provides only safe and well known algorithms for encrypting Files and SharedPreferences. The &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developer.android.com/training/safetynet/attestation&amp;#34;&amp;gt;SafetyNet Attestation API&amp;lt;/a&amp;gt; is a solution to help identify potentially dangerous patterns in usage. There are several common design vulnerabilities that are important to look out for, including using shared or improper file storage, using insecure protocols, unprotected components such as Activities, and more. The course also provides methods to test your app in order to help you keep it safe after launch. Finally, you can set up a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://developers.google.com/android/play-protect/starting-a-vdp&amp;#34;&amp;gt;Vulnerability Disclosure Program&amp;lt;/a&amp;gt; (VDP) to engage security researchers to help.&amp;lt;br&amp;gt;
In the next course, you can learn how to integrate security at every stage of the development process by adopting the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://playacademy.exceedlms.com/student/activity/69287-introduction-to-the-security-development-lifecycle&amp;#34;&amp;gt;Security Development Lifecycle&amp;lt;/a&amp;gt; (SDL). The SDL is an industry standard process and in this course you’ll learn the fundamentals of setting up a program, getting executive sponsorship and integration into your development lifecycle.&amp;lt;br&amp;gt;
Threat modeling is part of the Security Development Lifecycle, and in this course you will learn to think like an attacker to identify, categorize, and address threats. By doing so early in the design phase of development, you can identify potential threats and start planning for how to mitigate them at a much lower cost and create a more secure product for your users.&amp;lt;br&amp;gt;
Improving your app’s security is a never ending process. Sign up for the Security by Design &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://playacademy.exceedlms.com/student/path/63550-security-by-design&amp;#34;&amp;gt;module&amp;lt;/a&amp;gt; where in a few short courses, you will learn how to integrate security into your app development lifecycle, model potential threats, and app security best practices into your app, as well as avoid potential design pitfalls.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/android&amp;#34;&amp;gt;android&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/android%20security&amp;#34;&amp;gt;android security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/app%20security&amp;#34;&amp;gt;app security&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/encryption&amp;#34;&amp;gt;encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/encryption&amp;#34;&amp;gt;encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Julia Angwin – The Markup</title>
      <link>https://www.whatsupup.com/blog/jigging/witherer/20210526-161621/</link>
      <pubDate>Wed, 26 May 2021 16:16:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/jigging/witherer/20210526-161621/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://themarkup.org/citizen-browser/2021/01/19/facebook-said-it-would-stop-pushing-users-to-join-partisan-political-groups-it-didnt&amp;#34;&amp;gt;Citizen Browser Facebook Said It Would Stop Pushing Users to Join Partisan Political Groups. It Didn’t According to Citizen Browser data, the platform especially peppered Trump voters with political group recommendations January 19, 2021 08:00 ET&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-161600/</link>
      <pubDate>Wed, 26 May 2021 16:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-161600/</guid>
      <description>Several killed in rail yard shooting in San Jose, California, police say shooter is dead &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2D7208&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Belarusian President Alexander Lukashenko said on Wednesday a journalist pulled off a plane that was forced to land in Minsk had been plotting a rebellion, and he accused the West of waging a hybrid war against him.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-election/syrias-assad-votes-in-former-rebel-town-site-of-chemical-attack-idUSKCN2D70A1&amp;#34;&amp;gt;Syria&amp;#39;s Assad votes in former rebel town, site of chemical attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-141821/</link>
      <pubDate>Wed, 26 May 2021 14:18:21 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-141821/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131251_2022-genesis-g90-spy-shots&amp;#34;&amp;gt;2022 Genesis G90 spy shots: Redesigned flagship sedan in the works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1122220_1-of-1-bugatti-la-voiture-noire-spotted-testing&amp;#34;&amp;gt;1-of-1 Bugatti La Voiture Noire spotted testing&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-141532/</link>
      <pubDate>Wed, 26 May 2021 14:15:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-141532/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uk-pm-johnson-considered-having-covid-injection-in-early-2020-ex-adviser-says-idUSKCN2D62VU&amp;#34;&amp;gt;UK PM Johnson considered having COVID injection in early 2020, ex-adviser says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -British Prime Minister Boris Johnson was disastrously slow to impose a lockdown in 2020 because he thought COVID-19 was a scare story and even considered getting injected with coronavirus on live television to show it was benign, his former chief adviser said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/belarus-leader-says-detained-journalist-was-plotting-bloody-rebellion-idUSKCN2D717U&amp;#34;&amp;gt;Belarus leader says detained journalist was plotting &amp;amp;#39;bloody rebellion&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/05/26/getting-up-close-with-cicadas?videoId=730484187&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Getting up close with cicadas&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/05/26/tasmanian-devils-born-on-australian-main?videoId=730483199&amp;amp;videoChannel=118169&amp;#34;&amp;gt;Tasmanian Devils born on Australian mainland after 3,000 years&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-121840/</link>
      <pubDate>Wed, 26 May 2021 12:18:39 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-121840/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129268_2022-mercedes-benz-amg-s63e-spy-shots-and-video&amp;#34;&amp;gt;2022 Mercedes-Benz AMG S63e spy shots and video: Plug-in hybrid super sedan on the way&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132387_rolls-royce-revives-coachbuilding-business&amp;#34;&amp;gt;Rolls-Royce revives coachbuilding business&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-121559/</link>
      <pubDate>Wed, 26 May 2021 12:15:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-121559/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uks-johnson-dismissed-covid-19-as-a-scare-story-ex-chief-adviser-says-idUSKCN2D62VU&amp;#34;&amp;gt;UK&amp;#39;s Johnson dismissed COVID-19 as a &amp;#39;scare story&amp;#39;, ex-chief adviser says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -Prime Minister Boris Johnson and the British state failed to appreciate the deadly threat from the novel coronavirus as it raced across the world in early 2020 and were disastrously slow to impose a lockdown, his former adviser said on Wednesday.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/defiant-belarus-leader-accuses-west-of-waging-hybrid-war-idUSKCN2D717U&amp;#34;&amp;gt;Defiant Belarus leader accuses West of waging &amp;amp;#39;hybrid war&amp;amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-blinken-egypt/blinken-meets-egypts-sisi-as-u-s-seeks-to-secure-gaza-ceasefire-idUSKCN2D70WA&amp;#34;&amp;gt;Blinken meets Egypt&amp;amp;#39;s Sisi as U.S. seeks to secure Gaza ceasefire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-101703/</link>
      <pubDate>Wed, 26 May 2021 10:17:02 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-101703/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1130916_2022-hyundai-ioniq-5-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Hyundai Ioniq 5 electric crossover arrives with retro looks, handy tech&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-101419/</link>
      <pubDate>Wed, 26 May 2021 10:14:18 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-101419/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-vote-charges/u-s-steps-up-pursuit-of-far-right-activists-in-2016-voter-suppression-probe-idUSKCN2D7125&amp;#34;&amp;gt;U.S. steps up pursuit of far-right activists in 2016 voter suppression probe&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
SAN FRANCISCO     The indictment of a far-right internet activist on charges of interfering with the 2016 U.S. election reflects a strategic shift by the Department of Justice and sets the stage for new cases against more prominent right-wing actors, according to people familiar with the matter.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/whatsapp-india-lawsuit-exclusive/whatsapp-sues-indian-government-over-new-privacy-rules-sources-idUSKCN2D707P&amp;#34;&amp;gt;WhatsApp sues Indian government over new privacy rules - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
WhatsApp has filed a lawsuit in Delhi against the Indian government seeking to block regulations coming into force on Wednesday that experts say would compel Facebook&amp;amp;#39;s messaging app to break privacy protections, sources said. | &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/video/2021/05/26/whatsapp-sues-indias-government?videoId=730473852&amp;amp;newsChannel=&amp;#34;&amp;gt;Video&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uks-johnson-failed-disastrously-in-covid-19-crisis-ex-chief-adviser-says-idUSKCN2D62VU&amp;#34;&amp;gt;UK&amp;amp;#39;s Johnson failed &amp;amp;#39;disastrously&amp;amp;#39; in COVID-19 crisis, ex-chief adviser says&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
LONDON (Reuters) -British Prime Minister Boris Johnson&amp;amp;#39;s former chief adviser said his ex-boss failed in the COVID-19 crisis and ministers fell &amp;amp;#34;disastrously short&amp;amp;#34; of the standards the public had a right to expect during the most devastating global pandemic in decades.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-blinken-egypt/blinken-visits-cairo-as-u-s-seeks-to-secure-gaza-ceasefire-idUSKCN2D70WA&amp;#34;&amp;gt;Blinken visits Cairo as U.S. seeks to secure Gaza ceasefire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-lukashenko/belarus-leader-accuses-west-of-using-plane-incident-to-try-to-undermine-him-idUSKCN2D70UX&amp;#34;&amp;gt;Belarus leader accuses West of using plane incident to try to undermine him&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Retool Blog</title>
      <link>https://www.whatsupup.com/blog/kickback/overgeneralization/20210526-100708/</link>
      <pubDate>Wed, 26 May 2021 10:07:08 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/kickback/overgeneralization/20210526-100708/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://retool.com/blog/join-the-retool-developer-community/&amp;#34;&amp;gt;[Launch] Join the Retool developer community! The Retool community is the best place to get help, share what you&amp;#39;re building, and level up your Retool skills.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-081742/</link>
      <pubDate>Wed, 26 May 2021 08:17:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-081742/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1125565_2023-mercedes-benz-amg-c63-wagon-spy-shots&amp;#34;&amp;gt;2023 Mercedes-Benz AMG C63 Wagon spy shots: More power, fewer cylinders&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-081504/</link>
      <pubDate>Wed, 26 May 2021 08:15:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-081504/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/uk-whatsapp-india-lawsuit-exclusive/exclusive-whatsapp-sues-india-govt-says-new-rules-mean-end-to-privacy-sources-idUSKCN2D707P&amp;#34;&amp;gt;Exclusive: WhatsApp sues India govt, says new rules mean end to privacy - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WhatsApp has filed a lawsuit in Delhi against the Indian government seeking to block regulations coming into force on Wednesday that experts say would compel the California-based Facebook unit to break privacy protections, sources said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/whatsapp-india-lawsuit/exclusive-whatsapp-sues-india-govt-says-new-media-rules-mean-end-to-privacy-sources-idUSL2N2NC366&amp;#34;&amp;gt;EXCLUSIVE-WhatsApp sues India govt, says new media rules mean end to privacy -sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
* Delhi suit argues rule violates constitutional privacy
protection -sources&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-congo-security-ambassador-insight/a-botched-ransom-attempt-ambassadors-death-in-congo-may-not-be-what-it-seemed-idUSKCN2D70LC&amp;#34;&amp;gt;A botched ransom attempt? Ambassador&amp;amp;#39;s death in Congo may not be what it seemed&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
At around 10:00 a.m. on Feb. 22, seven men, some armed, stepped onto a road in eastern Congo and forced two cars belonging to the United Nations World Food Programme to stop.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-russia-politics-navalny/jailed-kremlin-critic-alexei-navalny-appears-in-court-via-video-link-idUSKCN2D70O2&amp;#34;&amp;gt;Jailed Kremlin critic Alexei Navalny appears in court via video link&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-britain/uks-covid-disaster-to-be-laid-bare-by-pm-johnsons-ex-chief-adviser-idUSKCN2D62VU&amp;#34;&amp;gt;UK&amp;amp;#39;s COVID &amp;amp;#39;disaster&amp;amp;#39; to be laid bare by PM Johnson&amp;amp;#39;s ex-chief adviser&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-061732/</link>
      <pubDate>Wed, 26 May 2021 06:17:31 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-061732/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-asia-storm-india/powerful-cyclone-yaas-hits-land-in-eastern-india-idUSKCN2D70E8&amp;#34;&amp;gt;Powerful cyclone Yaas hits land in eastern India&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-syria-security-election/syrians-go-to-the-polls-in-election-that-assad-is-set-to-win-idUSKCN2D70A1&amp;#34;&amp;gt;Syrians go to the polls in election that Assad is set to win&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Mike Isaac - The New York Times</title>
      <link>https://www.whatsupup.com/blog/playacted/rededication/20210526-041711/</link>
      <pubDate>Wed, 26 May 2021 04:17:11 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/playacted/rededication/20210526-041711/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/05/25/technology/whatsapp-india-lawsuit.html&amp;#34;&amp;gt;WhatsApp Sues India’s Government to Stop New Internet Rules The rules, which would require WhatsApp to make people’s messages traceable, would violate people’s privacy, the messaging service said. By Mike Isaac&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-041527/</link>
      <pubDate>Wed, 26 May 2021 04:15:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-041527/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-whatsapp-india-lawsuit-exclusive/exclusive-whatsapp-sues-india-government-says-new-media-rules-mean-end-to-privacy-sources-idUSKCN2D707T&amp;#34;&amp;gt;Exclusive: WhatsApp sues India government, says new media rules mean end to privacy - sources&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
WhatsApp has filed a legal complaint in Delhi against the Indian government seeking to block regulations coming into force on Wednesday that experts say would compel the California-based Facebook unit to break privacy protections, sources said.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-myanmar-politics/myanmar-cardinal-appeals-for-fighting-to-end-after-fatal-church-attack-idUSKCN2D7098&amp;#34;&amp;gt;Myanmar cardinal appeals for fighting to end after fatal church attack&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-001950/</link>
      <pubDate>Wed, 26 May 2021 00:19:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210526-001950/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132380_2022-bmw-m4-competition-convertible-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 BMW M4 Convertible arrives with 503 hp, AWD&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-001655/</link>
      <pubDate>Wed, 26 May 2021 00:16:54 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210526-001655/</guid>
      <description>(Corrects name of woman detained to Sapega instead of Sagega, paragraphs 17,20 and 22)&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210525-221539/</link>
      <pubDate>Tue, 25 May 2021 22:15:38 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210525-221539/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/&amp;#34;&amp;gt;Vulnerability in VMware product has severity rating of 9.8 out of 10&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Remote code execution flaw in vCenter Server poses &amp;amp;#34;serious&amp;amp;#34; risk to data centers.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Discord Blog</title>
      <link>https://www.whatsupup.com/blog/augur/cussed/20210525-220742/</link>
      <pubDate>Tue, 25 May 2021 22:07:41 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/augur/cussed/20210525-220742/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/how-trust-safety-addresses-violent-extremism-on-discord-c15613dae03a?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;How Trust &amp;amp;amp; Safety Addresses Violent Extremism on Discord&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/how-trust-safety-addresses-violent-extremism-on-discord-c15613dae03a?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;How Trust &amp;amp;amp; Safety Addresses Violent Extremism on Discord We dive into our history with violent extremists on the platform and how our response has improved since the 2017 Charlottesville incident.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/welcome-to-policy-at-discord-e3f189139023?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Welcome to Policy at Discord!&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.discord.com/welcome-to-policy-at-discord-e3f189139023?source=collection_home---4------0-----------------------&amp;#34;&amp;gt;Welcome to Policy at Discord! We’ll be sharing more regularly what our Policy team is working on, listen to the feedback you may have, and improve our approach to…&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-201540/</link>
      <pubDate>Tue, 25 May 2021 20:15:40 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-201540/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-media-insight/death-threats-and-arrests-belarus-opposition-media-struggles-at-home-and-abroad-idUSKCN2D62MB&amp;#34;&amp;gt;Death threats and arrests: Belarus opposition media struggles at home and abroad&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210525-201502/</link>
      <pubDate>Tue, 25 May 2021 20:15:01 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210525-201502/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://myaccount.nytimes.com/auth/login?response_type=cookie&amp;amp;client_id=vi&amp;#34;&amp;gt;Log In&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-181846/</link>
      <pubDate>Tue, 25 May 2021 18:18:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-181846/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132355_musk-claims-new-tesla-roadster-will-do-0-60-mph-in-1-1s-with-spacex-rocket-option&amp;#34;&amp;gt;Musk claims new Tesla Roadster will do 0-60 mph in 1.1s with SpaceX rocket option&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-181548/</link>
      <pubDate>Tue, 25 May 2021 18:15:48 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-181548/</guid>
      <description>&amp;lt;p&amp;gt;Reports of gunshots at intersection where George Floyd died, at least one wounded with non-life-threatening injury, police say &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/idUSKCN2D624S&amp;#34;&amp;gt;VIEW MORE&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/airlines-re-route-to-avoid-belarus-opposition-says-journalist-beaten-idUSKCN2D617K&amp;#34;&amp;gt;Airlines re-route to avoid Belarus, opposition says journalist beaten&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-mother-interview/mother-of-detained-belarus-bloggers-girlfriend-hopes-for-a-miracle-idUSKCN2D62CH&amp;#34;&amp;gt;Mother of detained Belarus blogger&amp;amp;#39;s girlfriend hopes for a miracle&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-usa-blinken/blinken-announces-u-s-aid-to-gaza-pledges-to-reopen-jerusalem-consulate-idUSKCN2D60CS&amp;#34;&amp;gt;Blinken announces U.S. aid to Gaza, pledges to reopen Jerusalem consulate&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Cecilia Kang - The New York Times</title>
      <link>https://www.whatsupup.com/blog/sited/implore/20210525-181529/</link>
      <pubDate>Tue, 25 May 2021 18:15:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/sited/implore/20210525-181529/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.nytimes.com/2021/05/25/business/amazon-dc-lawsuit.html&amp;#34;&amp;gt;D.C. Accuses Amazon of Controlling Online Prices The District of Columbia said in a lawsuit that Amazon had stopped merchants that use its platform from charging lower prices for the same products elsewhere online. By David McCabe, Karen Weise and Cecilia Kang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Krebs on Security – In-depth security news and investigation</title>
      <link>https://www.whatsupup.com/blog/ideo/fleury/20210525-180534/</link>
      <pubDate>Tue, 25 May 2021 18:05:33 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ideo/fleury/20210525-180534/</guid>
      <description>Last week, someone began posting classified notices on LinkedIn for different design consulting jobs at &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.geosyntec.com/&amp;#34;&amp;gt;Geosyntec Consultants&amp;lt;/a&amp;gt; , an environmental engineering firm based in the Washington, D.C. area. Those who responded were told their application for employment was being reviewed and that they should email &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.linkedin.com/in/troygwin&amp;#34;&amp;gt;Troy Gwin&amp;lt;/a&amp;gt; — Geosyntec’s senior recruiter — immediately to arrange a screening interview.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-162101/</link>
      <pubDate>Tue, 25 May 2021 16:21:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-162101/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132372_preview-2022-bentley-bentayga-s-sharpens-v-8s-focus&amp;#34;&amp;gt;Preview: 2022 Bentley Bentayga S sharpens V-8&amp;#39;s focus&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-161810/</link>
      <pubDate>Tue, 25 May 2021 16:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-161810/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/airlines-re-route-to-avoid-belarus-opposition-says-journalist-tortured-idUSKCN2D617K&amp;#34;&amp;gt;Airlines re-route to avoid Belarus, opposition says journalist tortured&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KYIV/VILNIUS (Reuters) -Airlines re-routed flights to avoid Belarus&amp;amp;#39;s airspace on Tuesday and Belarusian planes faced a possible ban from Europe, as international outrage mounted over Minsk forcing down a jetliner and arresting a dissident journalist on board.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Google Online Security Blog</title>
      <link>https://www.whatsupup.com/blog/ewing/undiscernibly/20210525-161600/</link>
      <pubDate>Tue, 25 May 2021 16:16:00 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/ewing/undiscernibly/20210525-161600/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html&amp;#34;&amp;gt;Introducing Half-Double: New hammering technique for DRAM Rowhammer bug&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Research Team: Salman Qazi, Yoongu Kim, Nicolas Boichat, Eric Shiu &amp;amp;amp; Mattias Nissler Today, we are sharing details around our discovery of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf&amp;#34;&amp;gt;Half-Double&amp;lt;/a&amp;gt; , a new Rowhammer technique that capitalizes on the worsening physics of some of the newer DRAM chips to alter the contents of memory. &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html&amp;#34;&amp;gt;Read More&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Research Team: Salman Qazi, Yoongu Kim, Nicolas Boichat, Eric Shiu &amp;amp;amp; Mattias Nissler Today, we are sharing details around our discovery of &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf&amp;#34;&amp;gt;Half-Double&amp;lt;/a&amp;gt; , a new Rowhammer technique that capitalizes on the worsening physics of some of the newer DRAM chips to alter the contents of memory. Rowhammer is a DRAM vulnerability whereby repeated accesses to one address can tamper with the data stored at other addresses. Much like speculative execution vulnerabilities in CPUs, Rowhammer is a breach of the security guarantees made by the underlying hardware. As an electrical coupling phenomenon within the silicon itself, Rowhammer allows the potential bypass of hardware and software memory protection policies. This can allow untrusted code to break out of its sandbox and take full control of the system. Rowhammer was first discussed in a &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf&amp;#34;&amp;gt;paper&amp;lt;/a&amp;gt; in 2014 for what was then the mainstream generation of DRAM: DDR3. The following year, Google’s Project Zero released a working privilege-escalation &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html&amp;#34;&amp;gt;exploit&amp;lt;/a&amp;gt; . In response, DRAM manufacturers implemented proprietary logic inside their chips that attempted to track frequently accessed addresses and reactively mitigate when necessary. As DDR4 became widely adopted, it appeared as though Rowhammer had faded away thanks in part to these built-in defense mechanisms. However, in 2020, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vusec.net/projects/trrespass/&amp;#34;&amp;gt;TRRespass&amp;lt;/a&amp;gt; paper showed how to reverse-engineer and neutralize the defense by distributing accesses, demonstrating that Rowhammer techniques are still viable. Earlier this year, the &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.vusec.net/projects/smash/&amp;#34;&amp;gt;SMASH&amp;lt;/a&amp;gt; research went one step further and demonstrated exploitation from JavaScript, without invoking cache-management primitives or system calls. Traditionally, Rowhammer was understood to operate at a distance of one row: when a DRAM row is accessed repeatedly (the “aggressor”), bit flips were found only in the two adjacent rows (the “victims”). However, with Half-Double, we have observed Rowhammer effects propagating to rows beyond adjacent neighbors, albeit at a reduced strength. Given three consecutive rows A, B, and C, we were able to attack C by directing a very large number of accesses to A, along with just a handful (~dozens) to B. Based on our experiments, accesses to B have a non-linear gating effect, in which they appear to “transport” the Rowhammer effect of A onto C. Unlike TRRespass, which exploits the blind spots of manufacturer-dependent defenses, Half-Double is an intrinsic property of the underlying silicon substrate. This is likely an indication that the electrical coupling responsible for Rowhammer is a property of distance, effectively becoming stronger and longer-ranged as cell geometries shrink down. Distances greater than two are conceivable.&amp;lt;br&amp;gt;
Google has been working with &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jedec.org/&amp;#34;&amp;gt;JEDEC&amp;lt;/a&amp;gt; , an independent semiconductor engineering trade organization, along with other industry partners, in search of possible solutions for the Rowhammer phenomenon. JEDEC has published two documents about DRAM and system-level mitigation techniques (JEP &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jedec.org/standards-documents/docs/jep300-1&amp;#34;&amp;gt;300-1&amp;lt;/a&amp;gt; and JEP &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.jedec.org/standards-documents/docs/jep301-1&amp;#34;&amp;gt;301-1&amp;lt;/a&amp;gt; ). We are disclosing this work because we believe that it significantly advances the understanding of the Rowhammer phenomenon, and that it will help both researchers and industry partners to work together, to develop lasting solutions. The challenge is substantial and the ramifications are industry-wide. We encourage all stakeholders (server, client, mobile, automotive, IoT) to join the effort to develop a practical and effective solution that benefits all of our users.&amp;lt;br&amp;gt;
Labels: &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Rowhammer&amp;#34;&amp;gt;Rowhammer&amp;lt;/a&amp;gt; , &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Security&amp;#34;&amp;gt;Security&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://security.googleblog.com/search/label/Rowhammer&amp;#34;&amp;gt;Rowhammer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-141919/</link>
      <pubDate>Tue, 25 May 2021 14:19:19 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-141919/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131558_uber-rare-ford-gt-mk-ii-sells-for-1-87m-at-auction&amp;#34;&amp;gt;Uber-rare Ford GT Mk II sold for $1.87M at auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1131353_2022-mercedes-benz-c-class-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Mercedes-Benz C-Class arrives with mild-hybrid turbo-4, simplified trim levels&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132130_superb-1930-duesenberg-model-sj-rollston-convertible-sells-for-almost-3m&amp;#34;&amp;gt;Superb 1930 Duesenberg Model SJ Rollston Convertible sold for almost $3M&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-141636/</link>
      <pubDate>Tue, 25 May 2021 14:16:35 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-141636/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/airlines-start-shunning-belarus-opposition-leader-says-journalist-tortured-idUSKCN2D617K&amp;#34;&amp;gt;Airlines start shunning Belarus, opposition leader says journalist tortured&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KYIV/VILNIUS (Reuters) -Airlines shunned Belarus&amp;amp;#39;s airspace on Tuesday and Belarusian planes faced a possible ban from Europe as international outrage mounted over Minsk forcing down a jetliner and arresting a dissident journalist who was on board.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210525-141557/</link>
      <pubDate>Tue, 25 May 2021 14:15:56 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210525-141557/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/hackers-exploit-a-macos-0day-that-allows-them-to-screenshot-infected-macs/&amp;#34;&amp;gt;Actively exploited macOS 0-day let hackers take screenshots of infected Macs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-121835/</link>
      <pubDate>Tue, 25 May 2021 12:18:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-121835/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132357_review-update-the-2021-porsche-911-turbo-s-cabriolet-swipes-right-on-summer&amp;#34;&amp;gt;Review update: The 2021 Porsche 911 Turbo S Cabriolet swipes right on summer&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210525-121538/</link>
      <pubDate>Tue, 25 May 2021 12:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210525-121538/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/disk-wiping-malware-with-irananian-fingerprints-is-striking-israeli-targets/&amp;#34;&amp;gt;It’s ransomware, or maybe a disk wiper, and it’s striking targets in Israel&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Dubbed Apostle, never-before-seen wiper masquerades as ransomware.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-121535/</link>
      <pubDate>Tue, 25 May 2021 12:15:34 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-121535/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/airlines-shun-belarus-opposition-leader-says-journalist-tortured-idUSKCN2D617K&amp;#34;&amp;gt;Airlines shun Belarus, opposition leader says journalist tortured&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Airlines shunned Belarus&amp;amp;#39;s air space on Tuesday and Belarusian planes could soon be banned from Europe, potentially isolating the land-locked country apart from its border with Russia after it forced down a jetliner and arrested a dissident journalist.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-usa-blinken/blinken-pledges-u-s-support-to-rebuild-gaza-prevent-return-to-war-idUSKCN2D60CS&amp;#34;&amp;gt;Blinken pledges U.S. support to rebuild Gaza, prevent return to war&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-101759/</link>
      <pubDate>Tue, 25 May 2021 10:17:59 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-101759/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132309_jay-leno-meets-a-16-year-old-who-daily-drives-a-1965-mustang&amp;#34;&amp;gt;Jay Leno meets a 16-year-old who daily drives a 1965 Mustang&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210525-101650/</link>
      <pubDate>Tue, 25 May 2021 10:16:50 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210525-101650/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/2013/04/25/random-binary-trees-with-a-size-limited-critical-boltzmann-sampler-2/&amp;#34;&amp;gt;Random binary trees with a size-limited critical Boltzmann sampler&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-101514/</link>
      <pubDate>Tue, 25 May 2021 10:15:14 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-101514/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-usa-blinken/blinken-vows-u-s-support-to-rebuild-gaza-prevent-return-to-war-idUSKCN2D60CS&amp;#34;&amp;gt;Blinken vows U.S. support to rebuild Gaza, prevent return to war&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. Secretary of State Antony Blinken pledged on a Middle East mission on Tuesday that Washington would rally support to rebuild Gaza as part of efforts to bolster a ceasefire between its Hamas Islamist rulers and Israel.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-usa-race-georgefloyd/a-year-since-george-floyds-murder-americans-reflect-on-his-legacy-idUSKCN2D612Q&amp;#34;&amp;gt;A year since George Floyd&amp;amp;#39;s murder, Americans reflect on his legacy&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics-kremlin/kremlin-dismisses-notion-of-alleged-russian-involvement-in-belarus-plane-incident-idUSKCN2D610Y&amp;#34;&amp;gt;Kremlin dismisses notion of alleged Russian involvement in Belarus plane incident&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>blog :: Brent -&gt; [String]</title>
      <link>https://www.whatsupup.com/blog/gonadal/revving/20210525-061811/</link>
      <pubDate>Tue, 25 May 2021 06:18:10 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/gonadal/revving/20210525-061811/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com&amp;#34;&amp;gt;Follow&amp;lt;/a&amp;gt; &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com&amp;#34;&amp;gt;Following&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
Already have a WordPress.com account? &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com&amp;#34;&amp;gt;Log in now.&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com/wp-admin/customize.php?url=https%3A%2F%2Fbyorgey.wordpress.com%2F&amp;#34;&amp;gt;Customize&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://wordpress.com/start/&amp;#34;&amp;gt;Sign up&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;http://en.wordpress.com/abuse/&amp;#34;&amp;gt;Report this content&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://subscribe.wordpress.com/&amp;#34;&amp;gt;Manage subscriptions&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://byorgey.wordpress.com&amp;#34;&amp;gt;Collapse this bar&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-061637/</link>
      <pubDate>Tue, 25 May 2021 06:16:36 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-061637/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-israel-palestinians-usa-blinken/blinken-begins-middle-east-mission-to-bolster-gaza-ceasefire-idUSKCN2D60CS&amp;#34;&amp;gt;Blinken begins Middle East mission to bolster Gaza ceasefire&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
U.S. Secretary of State Antony Blinken began a Middle East visit  in Israel on Tuesday, hoping to bolster its ceasefire with Gaza&amp;amp;#39;s ruling Hamas militants and help speed humanitarian aid to the devastated Palestinian enclave.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-china-politics-anniversary/chinese-visit-red-sites-ahead-of-100th-communist-party-anniversary-idUSKCN2D60IL&amp;#34;&amp;gt;Chinese visit &amp;amp;#39;red&amp;amp;#39; sites ahead of 100th Communist Party anniversary&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-041652/</link>
      <pubDate>Tue, 25 May 2021 04:16:51 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-041652/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-health-coronavirus-australia/masks-social-restrictions-return-to-australias-melbourne-after-fresh-outbreak-idUSKCN2D6025&amp;#34;&amp;gt;Masks, social restrictions return to Australia&amp;#39;s Melbourne after fresh outbreak&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-colombia-protests/colombia-government-strike-committee-reach-pre-agreement-in-protest-talks-idUSKCN2D51M6&amp;#34;&amp;gt;Colombia government, strike committee reach &amp;amp;#39;pre-agreement&amp;amp;#39; in protest talks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-022320/</link>
      <pubDate>Tue, 25 May 2021 02:23:20 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210525-022320/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1129766_2022-genesis-gv70-price-specs-review-photos-info&amp;#34;&amp;gt;Preview: 2022 Genesis GV70 looks to add sporty flair to GV80’s looks and luxury for $42,045&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132360_1970-plymouth-cuda-440-6-heads-to-auction&amp;#34;&amp;gt;1970 Plymouth &amp;amp;#39;Cuda 440-6 heads to auction&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1132361_audi-to-test-the-waters-with-ev-charging-station-you-can-book-in-advance&amp;#34;&amp;gt;Audi to test the waters with EV charging station you can book in advance&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Dan Goodin | Ars Technica</title>
      <link>https://www.whatsupup.com/blog/disappear/fussy/20210525-022042/</link>
      <pubDate>Tue, 25 May 2021 02:20:42 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/disappear/fussy/20210525-022042/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://arstechnica.com/gadgets/2021/05/hackers-exploit-a-macos-0day-that-allows-them-to-screenshot-infected-macs/&amp;#34;&amp;gt;Actively exploited macOS 0day let hackers take screenshots of infected Macs&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Apple patches vulnerability that malware used to bypass macOS privacy protections.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-022038/</link>
      <pubDate>Tue, 25 May 2021 02:20:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210525-022038/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/belarus-faces-new-sanctions-over-jetliner-state-piracy-arrest-of-journalist-idUSKCN2D50QW&amp;#34;&amp;gt;Belarus faces new sanctions over jetliner &amp;#39;state piracy,&amp;#39; arrest of journalist&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
BRUSSELS/KYIV (Reuters) -Western powers prepared to pile sanctions on Belarus and cut off its aviation links on Monday, furious after it scrambled a warplane to intercept a Ryanair aircraft and arrest a dissident journalist, an act one official denounced as &amp;amp;#39;state piracy&amp;amp;#39;.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-protests-father-interview/this-is-total-insanity-says-father-of-detained-belarusian-journalist-idUSKCN2D528G&amp;#34;&amp;gt;&amp;amp;#39;This is total insanity,&amp;amp;#39; says father of detained Belarusian journalist&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-mali-politics/military-detain-malis-president-prime-minister-and-defence-minister-idUSKCN2D51ZD&amp;#34;&amp;gt;Military detain Mali&amp;amp;#39;s president, prime minister and defence minister&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>- Andreessen Horowitz</title>
      <link>https://www.whatsupup.com/blog/phonic/shopboy/20210525-021527/</link>
      <pubDate>Tue, 25 May 2021 02:15:26 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/phonic/shopboy/20210525-021527/</guid>
      <description>Due to unforeseen circumstances, we will not have our One On One show tonight &amp;amp;ndash; we&amp;#39;ll see you all soon! &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://t.co/Laslcp07qH&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;https://t.co/Laslcp07qH&amp;#34;&amp;gt;https://t.co/Laslcp07qH&amp;lt;/a&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-142017/</link>
      <pubDate>Mon, 24 May 2021 14:20:17 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-142017/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1078735_briggs-cunningham-corvette-that-raced-at-le-mans-sells-for-785-500&amp;#34;&amp;gt;Briggs Cunningham Corvette that raced at Le Mans sells for $785,500&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210524-141746/</link>
      <pubDate>Mon, 24 May 2021 14:17:45 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210524-141746/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/europeans-threaten-to-restrict-air-traffic-over-belarus-after-state-piracy-idUSKCN2D50QW&amp;#34;&amp;gt;Europeans threaten to restrict air traffic over Belarus after &amp;amp;quot;state piracy&amp;amp;quot;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
KYIV/VILNIUS (Reuters) -European leaders threatened on Monday to limit international air traffic over Belarus and possibly restrict its ground transport, after a Ryanair passenger plane was forced to land in an incident denounced by Western countries as &amp;amp;#34;state piracy&amp;amp;#34;.&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-121803/</link>
      <pubDate>Mon, 24 May 2021 12:18:03 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-121803/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.motorauthority.com/news/1115876_2023-bmw-x8-spy-shots&amp;#34;&amp;gt;2023 BMW X8 spy shots: Flagship crossover in the works&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Drew DeVault&#39;s blog</title>
      <link>https://www.whatsupup.com/blog/buckeroo/doubling/20210524-121615/</link>
      <pubDate>Mon, 24 May 2021 12:16:15 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/buckeroo/doubling/20210524-121615/</guid>
      <description>May 24, 2021 &amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://drewdevault.com/2021/05/24/io_uring-finger-server.html&amp;#34;&amp;gt;Using io_uring to make a high-performance&amp;amp;hellip; finger server&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Columns | Reuters.com</title>
      <link>https://www.whatsupup.com/blog/twopenny/ultraism/20210524-121538/</link>
      <pubDate>Mon, 24 May 2021 12:15:37 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/twopenny/ultraism/20210524-121538/</guid>
      <description>&amp;lt;p&amp;gt;&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-belarus-politics/europeans-threaten-to-limit-belarus-air-traffic-after-state-piracy-idUSKCN2D50QW&amp;#34;&amp;gt;Europeans threaten to limit Belarus air traffic after &amp;#39;state piracy&amp;#39;&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
European leaders threatened to limit international air traffic over Belarus and possibly target its ground transport as well, after a Ryanair plane was forced to land in an incident denounced by Western countries as &amp;amp;#34;state piracy&amp;amp;#34;.&amp;lt;br&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-scotland-usa-trump-exclusive/exclusive-court-action-seeks-probe-of-trumps-scottish-golf-course-buys-idUSKCN2D50VZ&amp;#34;&amp;gt;Exclusive: Court action seeks probe of Trump’s Scottish golf course buys&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;
&amp;lt;hr&amp;gt;
&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.reuters.com/article/us-iran-nuclear-iaea/iran-and-iaea-extend-monitoring-deal-averting-crisis-in-nuclear-talks-idUSKCN2D50T7&amp;#34;&amp;gt;Iran and IAEA extend monitoring deal, averting crisis in nuclear talks&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.</title>
      <link>https://www.whatsupup.com/blog/overinsuring/enzyme/20210524-121407/</link>
      <pubDate>Mon, 24 May 2021 12:14:07 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/overinsuring/enzyme/20210524-121407/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://blog.cryptographyengineering.com/2012/02/02/multiple-encryption/&amp;#34;&amp;gt;Multiple encryption&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Eben Upton, Founder - Raspberry Pi</title>
      <link>https://www.whatsupup.com/blog/veld/paternal/20210524-121329/</link>
      <pubDate>Mon, 24 May 2021 12:13:28 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/veld/paternal/20210524-121329/</guid>
      <description>&amp;lt;a rel=&amp;#34;noreferrer&amp;#34; target=&amp;#34;_blank&amp;#34; href=&amp;#34;https://www.raspberrypi.org/blog/announcing-the-raspberry-pi-poe-hat/&amp;#34;&amp;gt;Announcing the Raspberry Pi PoE&#43; HAT&amp;lt;/a&amp;gt;&amp;lt;br&amp;gt;&amp;lt;/p&amp;gt;
&amp;lt;hr&amp;gt;
Power (over Ethernet) to the people&amp;lt;br&amp;gt;</description>
    </item>
    
    <item>
      <title>Bengt Halvorson - Senior Editor - Motor Authority</title>
      <link>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-101700/</link>
      <pubDate>Mon, 24 May 2021 10:16:53 +0000</pubDate>
      
      <guid>https://www.whatsupup.com/blog/tragicomedy/shampooed/20210524-101700/</guid>
      <