Karl Bode
Decade of Disillusion

The Decade We Learned There’s No Such Thing as Privacy Online
And a corrupt U.S. government seems incapable and unwilling to do anything about it.
Karl Bode
1.1.20
Decade of Disillusion

How the Entertainment Industry Solved Piracy, Then Made It Popular Again
Streaming services are starting to look a lot like cable packages.
Karl Bode
12.30.19
Internet Archive

Archivists Are Saving the History of Internet Piracy
The goal is to create a catalog of more than 5 terabytes of searchable, piracy-related metadata.
Karl Bode
12.14.19
SURVEILLANCE

Toys “R” Us Pivots From Teddy Bears to Surveillance
The once loved toy giant could have simply died a quiet death. Instead it has been co-opted and transformed into a private equity surveillance project.
Karl Bode
12.12.19
Internet

The Case for Internet Access as a Human Right
A new study says internet access shouldn’t be an exploitable luxury good, but a basic, protected human right provided for free to those who can’t afford it.
Karl Bode
11.15.19
Games News

This Real Time Strategy Game Is Just 13 Kilobytes
The Js13kGames competition challenges game developers to create teeny, tiny games in Javascript.
Karl Bode
9.26.19
Internet of Things

The Internet of Things Is Still a Privacy Dumpster Fire, Study Finds
Biggest IoT study ever finds “smart” devices hoover up a universe of user behavior data and share it with a laundry list of global third parties, frequently with little transparency to the end user.
Karl Bode
9.22.19
Tech

The Rise of Netflix Competitors Has Pushed Consumers Back Toward Piracy
BitTorrent usage has bounced back because there's too many streaming services, and too much exclusive content.
Karl Bode
9.19.19
SURVEILLANCE

This Interactive Map Tracks Our Growing Surveillance State
A new database showcases which areas are investing heavily in surveillance technology, though data remains scarce on how that data is used or abused.
Karl Bode
9.11.19
Another Day Another Hack

This Counterfeit iPhone Is Riddled With Backdoors and Malware
Fake devices look real but are rife with unpatched operated systems, outdated kernels, and a universe of dodgy backdoors and malware, researchers have found.
Karl Bode
8.16.19
Hacking

Google Hackers Found 10 Ways to Hack an iPhone Without Touching It
Many of the vulnerabilities relied on using iMessage to own the rest of the phone, Google's Project Zero said.
Karl Bode
8.12.19
Internet

This Is Probably Why Your AirPods Keep Losing Connection
Sometimes older, dumber technology is the smarter option.
Karl Bode
8.1.19
0102