Mother Jones has a very good summary/explainer/de-WTFer
up today. I've given up on trying to keep up with the story right now, it's too weird and too sprawling and there are too many sets of penises and vaginas involved.
Via Tim Dickinson at Rolling Stone. The chart is by Hilary Sargent (@lilsarg).
I don't know who created it, but will add credit when I figure that out.
The Washington Post reports that the U.S. Army is recommending retired general David H. Petraeus not face further punishment for screwing his biographer and leaking top-secret materials to her.
The Petraeus/Broadwell email dragnet, which hasn’t yielded evidence of any crime, has brought our attention to the FBI’s sweeping powers to surveil email. But as ProPublica’s Peter Maas writes, “It’s not just email.” In July, Rep. Edward Markey, a Democrat from Massachusetts, cajoled major cellphone carriers into disclosing the number of requests for data that […]
The FBI’s dumpster-dive into Paula Broadwell’s email archive has not yet revealed evidence of any crime, but it has revealed to America the extent to which our government is capable of collecting and surveilling our electronic communications. Greg Miller and Ellen Nakashima in the Washington Post : Many details surrounding the case remain unclear. The […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]