Worldcoin’s official launch triggers swift privacy scrutiny in Europe
Worldcoin, OpenAI CEO Sam Altman’s bid to sew up the market for verifying humanness by convincing enough mobile meatsacks to have their eyeballs scanned in exchanged for crypto tokens (yes, really), only started its official global rollout this week but it’s already landed on the radar of European data protection
Read moreFan fiction writers rally fandoms against KOSA, the bill purporting to protect kids online
Fan fiction writers aren’t just penning alternate universe reimaginings of the Barbie movie, or steamy scenes featuring Marvel superheroes. This week, they’re writing letters to their senators, expressing their concerns that the Kids Online Safety Act (KOSA) could change the internet forever. Despite its appealing name, KOSA has been met
Read moreTechCrunch+ Roundup: SAFE founder survey, replacing a CEO, how cyber insurance works
A friend recently spent months getting into shape for a physical so he could obtain a lower insurance rate. He got the policy and plans to continue working out because he feels so much healthier. Tech companies that plan to buy cyber insurance are in a similar boat: IT managers
Read moreWhat makes everyone so sure SAFE rounds are founder-friendly?
SAFEs, simple agreements for future equity, have long been touted as a founder-friendly structure for signing venture deals. But is it really fair to call them that? TechCrunch+ recently surveyed a handful of VCs and founders about how they’re feeling about SAFE rounds in this tougher fundraising market, especially now
Read moreApple’s App Store tightens up on user privacy with new rules for app developers
Apple for years has made user privacy a focus for its App Store with rules around data collection, plus requirements around app labeling, anti-tracking measures, and the more private “Sign in with Apple” option. Now, Apple will begin to require that developers explain why they need access to select data,
Read moreHow to Test Your Network Connection Requests in Swift Using URLProtocol
Photo by Marvin Meyer on UnsplashIn this article, we will see how to test network requests using the not-so-well-known URL Loading System, which intercepts requests made to the server. To address our problem, we’ll put some example code, assuming we have an implementation of this style in our productive code:enum HTTPResult
Read moreI visited the dark web, and all I got was…
PODCAST VO SCRIPT, [unpublished] Haje: The dark web is a lot of things; particularly user-friendly ain’t one of them. The other day, I got an amazing tip about ‘Dark Web Gift Shop,’ which tries to at least give you a little bit of a reward for your struggles. Haje: The founders
Read moreThe Role of Empathy in Organizational Changes
Photo by Jon Tyson on UnsplashIn the spring of 2008, all employees of the company I worked for gathered in the auditorium to hear about the company’s business goals. At the end of this festive event, we were asked to step out into the lobby and find ourselves on a giant
Read moreFinding the imaginary part of an analytic function from the real part
A function f of a complex variable z = x + iy can be factored into real and imaginary parts: where x and y are real numbers, and u and v are real-valued functions of two real values. Suppose you are given u(x, y) and you want to find v(x, y).
Read moreLearning Rust With SHA-3 and Friends
Photo by Jantine Doornbos on UnsplashMy first hobby project for learning Rust was implementing cryptographic hash algorithms [MD5, SHA-2, SHA-3]. The latter, SHA-3, was the most challenging implementation.That was due to a) substantial differences in algorithm design from the more familiar MD5 and SHA predecessors and b) fewer and less intuitive
Read more