Anyone that sets themselves up to be a single point of failure like this will be a target. And here we are, with hackers now able to make authentic-looking police requests for data.
Something that caught my eye in these screenshots: they include Authy, Twilio's 2-factor authentication app. #Technology
[Link]
· Links · Share this post
I’m writing about the intersection of the internet, media, and society. Sign up to my newsletter to receive every post and a weekly digest of the most important stories from around the web.