/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Lily Hay Newman

@lhn
8 posts
2026-01-27
Human trafficking to scam compounds in SE Asia is a catastrophe for forced laborers and their scam victims worldwide.  One individual, Red Bull, gave @agreenberg.bsky.social incredible insight into the situation over months from inside.  Then he attempted an escape www.wired.com/story/he-lea...
2026-01-27 View on X
Wired

Documents: a whistleblower details the Boshang scam compound in Laos that defrauded victims of ~$2.2M over 11 weeks and utilized a system of worker debt bondage

A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials …

2026-01-16
a big load of earbuds, headphones and speakers need updating to patch vulnerabilities that could be exploited to hijack audio, take over mics for eavesdropping, or even in some cases for location tracking www.wired.com/story/google...
2026-01-16 View on X
Wired

Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates

2026-01-15
a big load of earbuds, headphones and speakers need updating to patch vulnerabilities that could be exploited to hijack audio, take over mics for eavesdropping, or even in some cases for location tracking www.wired.com/story/google...
2026-01-15 View on X
Wired

Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates

Flaws in how 17 models of headphones and speakers use Google's one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.

2025-10-16
An extremely important story about the ways that facial recognition tech is failing people with facial differences, by @mattburgess1.bsky.social www.wired.com/story/when-f...
2025-10-16 View on X
Wired

How facial recognition software rejects people with facial differences, who number an estimated 100M+ worldwide, blocking them from accessing essential services

An estimated 100 million people live with facial differences.  As face recognition tech becomes widespread … Bluesky: @brbarrett , @lhn , @mattburgess1 , and @couts . Forums: r/tec...

2025-10-11
As Apple expands its bug bounty, I spoke with VP Ivan Krstić about the significance + recent big swings like Memory Integrity Enforcement.  These steps protect all users, but particularly those targeted by spyware: “We feel a great moral obligation to defend those users” www.wired.com/story/apple-...
2025-10-11 View on X
Wired

Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware

$2M Top Payout Usman Qureshi / iPhone in Canada : Apple Doubles Security Bounty Rewards to $2 Million Bill Toulas / BleepingComputer : Apple now offers $2 million for zero-click RC...

2025-10-10
As Apple expands its bug bounty, I spoke with VP Ivan Krstić about the significance + recent big swings like Memory Integrity Enforcement.  These steps protect all users, but particularly those targeted by spyware: “We feel a great moral obligation to defend those users” www.wired.com/story/apple-...
2025-10-10 View on X
Wired

Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware

With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses …

2025-03-05
I thought I had heard every version of “If something is cheap/free, you are the product” but really enjoyed Fyodor Yarochkin's contribution: “There is no free cheese unless the cheese is in a mousetrap” www.wired.com/story/1-mill...
2025-03-05 View on X
Wired

Human Security: 1M+ Android TV streaming boxes, tablets, projectors, and car infotainment systems are infected with malware that conscripts them into a botnet

New research shows at least a million inexpensive Android devices—from TV streaming boxes to car infotainment systems … Bluesky: @couts and @lhn . Forums: r/technews Bluesky: Andre...

2025-02-27
Scam researchers and survivors of forced work in compounds in certain regions have been mentioning for awhile that scam operations are increasingly relying on Starlink for internet access @mattburgess1.bsky.social goes deeper to expose the scope and scale of the problem www.wired.com/story/starli...
2025-02-27 View on X
Wired

Investigation: criminals who make billions from scam compounds in Myanmar, where tens of thousands of people are enslaved, are using Starlink to get online

A WIRED investigation reveals that criminals who make billions from scam compounds in Myanmar—where tens of thousands of people are enslaved—are using Starlink to get online. Blues...