Max "Buzzworthy" Eddy

3.7K Followers
397 Following
11.9K Posts
The dampest award-winning #infosec journalist at the conference. Covering privacy, security, and platforms for Wirecutter, previously of PCMag. Top image by Miguel Porlan for Wirecutter.

Proud #union member.
Former write-in candidate for Washtenaw County drain commissioner.
Pronounhe/him
My Stuffhttps://maxeddy.xyz/about/
Birdsitehttps://twitter.com/wmaxeddy
Wirecutterhttps://www.nytimes.com/wirecutter/authors/max-eddy/
cat sending resumes while an alien invasion is happening outside
You know how sometimes there’s little beads of hard white stuff attached to the outside of soda cans? That’s ambergris, which can be sold to perfumers and apothecaries for a princely sum

this ai bubble is going to burst any minute now, and we all know what that means: cheap data centre rack space in huge quantities.

can we use server racks to grow salad instead of swindle? i set out to find out: https://sa.lj.am/rack-mount-hydroponics/

In this promotional photo from Apple, the headphones are more expensive than the computer.

I remember back when they said E2EE was the future.

https://www.theverge.com/tech/894752/instagram-end-to-end-encryption

Instagram is getting rid of end-to-end encrypted DMs that ‘very few’ people used

Starting on May 8th, Instagram will no longer offer end-to-end encrypted messages.

The Verge
Tintin® Moon Rocket 21367 | Ideas | Buy online at the Official LEGO® Shop US

Build your own nostalgic Tintin® comic book decor

SocksEscort sold proxy services on the open web, but was actually routing traffic through compromised routers from brands including TP-Link, Netgear and Cisco: https://www.pcmag.com/news/us-helps-shut-down-proxy-service-used-to-hack-thousands-of-routers
Dinosaurs are amazing

We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.

To be clear: Signal’s encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information – SMS codes and/or Signal PIN – to gain access to users’ accounts.