Alright, it’s spec-fic week ‘roun the ole House of Gaming. “Spec-fic” is shorthand for Speculative Fiction, all that crazy genre stuff we at the House dote on: sci-fi to fantasy to horror (and everything in between). So, all the regular posts this week will be spec-fic related.
What’s more, me and John McGlynn, my podcast partner in crime, have laid down the audio for two — count ’em, two — spec-fic episodes of the Kickass Podcast. Look forward to those sometime this week. (Assuming Jasyn gets his tuckus in gear and gets the ‘casts edited in time.)
Also, as far as site news, we’ve now tripled the number of subscribers to the blog. So a big “Welcome!” to everybody new to the House.
The Bloomberg terminal spying, noted here, included Treasury Secretary Tim Geithner and Federal Reserve Chairman Ben Bernanke, according to HuffPo. Reportedly, company officials knew it had been going on since 2011.
Let’s say that again: private media company Bloomberg was spying on Tim Geithner and Ben Bernanke, because they, too used Bloomberg terminals to access financial news. And Bloomberg reporters knew what they were reading, when, and for how long.
This is a serious, serious breach of security, and I suspect Bloomberg will take a huge hit from it. Again, the takeway is this: everything you do on the Internet is public knowledge, unless you’re way more skilled in covering your tracks than nearly everyone else.
It’s all logged, all recorded, and the only thing that protects your privacy is lack of concern — you’re a small fry, so no one cares. As soon as that changes, your privacy will vanish and everyone will know what you do online.
(Yeah, I could have milked those links for four days worth of posts, but that’s a chump move and it looks like Monday could be the start of a wholly different theme week. Maybe. You know, if I feel like it.)
A story as awesome as it sounds. A tiny little chip inside many modern Macs is secured with a secret backdoor password: SpecialisRevelio (a spell from the Harry Potter books that reveals hidden charms). Read the full story here.
Note: Not as devastating as it sounds, as the actual hack would take a lot of work, a lot of luck, and physical access to the machine for a length of time. It’s far easier to phish your way to fame and fortune.