/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Person

Matthew Braga

7 articles decelerating
Articles
7
mentions
Velocity
-50.0%
growth rate
Acceleration
-1.500
velocity change
Sources
7
publications

Coverage Timeline

2020-04-04
The Intercept 30 related

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

but it can be fixed Stephen Warwick / iMore : Today on Zoom: ‘Not suited for secrets’, encryption issues and more Mercury News : Zoombombing: FBI warns video calls are getting hijacked Tweets: Glenn F...

2018-10-07
TechCrunch 14 related

Questions arise about Bloomberg's story on China spying via tiny chips after companies' strong denials, showing the difficulties of national security reporting

China's Chip Hack, Amazon and Apple's Denials, Google's Trust Reversal Kif Leswing / Business Insider : Could spies actually insert malicious chips into computer circuit boards?  A manufacturing exper...

2018-10-06
Apple 37 related

Apple says it has never found malicious chips in its servers, calls Bloomberg reporters' claims unsubstantiated and untrue, says it is not under a gag order

Separating Legit Cryptocurrency Ideas From the Ponzi Schemes William White / InvestorPlace : Friday Apple Rumors: UK Backs Up Apple's Claim About China Hack Bloomberg : How China Used a Tiny Chip to I...

2018-05-14
CBC News

Profile of Open Observatory of Network Interference, an organization collecting evidence of internet censorship in 200+ countries with help from ~50K volunteers

Matthew Braga / CBC News : Tweets: @torproject . Thanks: @mattbraga Tweets: The Tor Project / @torproject : As network filtering and censorship technology become easier to obtain and use, data collec...

2018-02-08
Motherboard

Sources detail Azimuth Security, a boutique hacking shop finding 0-days for Tor, iOS, Android, more, which counts agencies from Five Eyes countries as clients

Motherboard : Tweets: @lorenzofb , @josephfcox , @josephfcox , @josephfcox , @lorenzofb , @josephfcox , @josephfcox , @motherboard , @lorenzofb , @lorenzofb , @cauchon , @lorenzofb , @mattbraga , @ja...

2016-08-29
Bloomberg

As major tech firms focus on voice assistants, microphone makers face pressure to improve product that hasn't seen much change since 2012

Matthew Braga / Bloomberg : Tweets: @dwlz Tweets: Dan Loewenherz / @dwlz : Compare Google Now or Alexa with Siri and it's clear Siri's issues aren't microphone related. At all. http://www.bloomberg.c...

2014-12-30
Fast Company 2 related

Archivist Daniel Rehn of wwwtxt, a cache of Internet content from 1980-94, finds similarities in conversations from then and now

Matthew Braga / Fast Company :

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...