Not a very flattering portrayal of how such a dramatic move has been handled.
A good read, and I think the performance was stronger and better due to the stumble.
Some valuable lessons here.
Courageous & impressive work.
I've been using their app and services over the last 12 months and this sort of approach and dedication really shows.
Are we to expect the US hasn't been doing this for some time already, or is this just them publicly acknowledging it as hiding it becomes harder?
Certainly sounds like they have been busy and proactive in getting in front of this very public and ongoing discussion. The really astonishing bit is the need to do this with a wary eye towards its own government.
- The benefits of its custom silicon and overall approach by Ben Bajarin [Link]
- iMessage security design and how its built to not trust Apple itself. [Link]
I meant to post links to the show's videos and articles into their investigation for how phone calls could allegedly be easily tracked.
Instead, however – I'll post the link to Engadget how the entire segment may not have been accurately represented.
Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network…
Update: Looks like the SWIFT banking platform was exploited in this raid on the Bangladesh Central bank. However…
The findings from BAE and SWIFT do not explain how the fraudulent orders were created and pushed through the system. That remains a key mystery in ongoing probes into the heist.
Fascinating and disturbing, a compelling read.
So many questions, and many more irate customers. I still host archive sites there which for now appear unaffected.
Incredible work to manage this sensitively, professionally, and in secrecy for such a length of time.