<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Russell Brandom | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2019-03-06T10:58:36+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/russell-brandom-2" />
	<id>https://www.vox.com/authors/russell-brandom-2/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/russell-brandom-2/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Supposed bitcoin founder says &#8216;goodbye&#8217; after presenting fake evidence]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/5/5/11634258/supposed-bitcoin-founder-says-goodbye-after-presenting-fake-evidence" />
			<id>https://www.vox.com/2016/5/5/11634258/supposed-bitcoin-founder-says-goodbye-after-presenting-fake-evidence</id>
			<updated>2019-03-06T05:58:36-05:00</updated>
			<published>2016-05-05T11:27:35-04:00</published>
			<category scheme="https://www.vox.com" term="Bitcoin" /><category scheme="https://www.vox.com" term="Business &amp; Finance" /><category scheme="https://www.vox.com" term="Commerce" /><category scheme="https://www.vox.com" term="Money" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Craig Steven Wright, the man claiming to be mysterious bitcoin founder Satoshi Nakamoto, is abruptly withdrawing from public life. Wright posted today that he would offer no more evidence to prove his identity, just days after he publicly claimed the Satoshi mantle in a series of coordinated articles. Wright&#8217;s claims were greeted with intense skepticism [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="3Dsculptor/Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15804003/shutterstock_310309553.0.1516979854.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Craig Steven Wright, the man claiming to be mysterious bitcoin founder Satoshi Nakamoto, is abruptly withdrawing from public life. Wright posted today that he would offer no more evidence to prove his identity, just days after he <a href="http://www.theverge.com/2016/5/2/11564324/satoshi-nakamoto-identity-bitcoin-creator-claim">publicly claimed the Satoshi mantle</a> in <a href="http://www.bbc.com/news/technology-36168863">a series of coordinated articles</a>. Wright&rsquo;s claims were <a href="https://dankaminsky.com/2016/05/02/validating-satoshi-or-not/">greeted with intense skepticism</a> from many in the bitcoin community, who saw Wright as a con man using the Satoshi identity for personal gain.</p>

<p>As recently as yesterday, Wright had promised new evidence that would definitively prove his identity as bitcoin&rsquo;s creator, writing that &ldquo;extraordinary claims require extraordinary proof.&rdquo; But according to <a href="http://www.drcraigwright.net/">the latest message published on his personal site</a>, Wright abruptly lost the courage to carry through with the demonstration, fearing it would lead to personal attacks against him.</p>

<p><a href="http://www.theverge.com/2016/5/5/11595904/bitcoin-satoshi-nakamoto-identity-craig-steven-wright">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Supreme Court approves legal authority to hack anonymous computers]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/4/29/11586556/supreme-court-approves-legal-authority-to-hack-anonymous-computers" />
			<id>https://www.vox.com/2016/4/29/11586556/supreme-court-approves-legal-authority-to-hack-anonymous-computers</id>
			<updated>2019-03-06T05:15:19-05:00</updated>
			<published>2016-04-29T11:23:32-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[It just got a lot easier for law enforcement agents to hack anonymous computers over the internet. Last night, the Supreme Court approved changes to the rules of criminal procedure, enabling warrants for searches of remote computers, regardless of their physical location. That kind of warrant is particularly important for law enforcement hacking techniques, which [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="The Verge" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15793017/20150917-supreme-court.0.1488142516.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>It just got a lot easier for law enforcement agents to hack anonymous computers over the internet. Last night, the Supreme Court approved <a href="http://www.supremecourt.gov/orders/courtorders/frcr16_8mad.pdf">changes to the rules of criminal procedure</a>, enabling warrants for searches of remote computers, regardless of their physical location. That kind of warrant is particularly important for law enforcement hacking techniques, which typically target anonymous accounts or devices without knowing their physical location or identity. The changes are due to take effect in December, unless Congress passes countermanding legislation in the interim.</p>

<p>A number of experts have criticized hacking warrants as granting unnecessarily broad powers. In <a href="https://www.justsecurity.org/15018/justice-department-proposal-massive-expand-fbi-extraterritorial-surveillance/">a 2014 editorial</a>, law professor Ahmed Ghappour argued the warrants would result in widespread intrusions into other countries, potentially violating other countries&rsquo; sovereignty. &ldquo;Overseas cyber operations will be unilateral and invasive,&rdquo; Ghappour wrote. &ldquo;They will not be limited to matters of national security; nor will they be executed with the consent of the host country.&rdquo;</p>

<p><a href="http://www.theverge.com/2016/4/29/11536348/supreme-court-approval-fbi-anonymous-hack">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Comcast announces plan to buy DreamWorks Animation for $3.8 billion]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/4/28/11586502/comcast-announces-plan-to-buy-dreamworks-animation-for-3-8-billion" />
			<id>https://www.vox.com/2016/4/28/11586502/comcast-announces-plan-to-buy-dreamworks-animation-for-3-8-billion</id>
			<updated>2019-03-06T05:15:14-05:00</updated>
			<published>2016-04-28T07:49:43-04:00</published>
			<category scheme="https://www.vox.com" term="Business &amp; Finance" /><category scheme="https://www.vox.com" term="Media" /><category scheme="https://www.vox.com" term="Money" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[NBCUniversal* has announced a plan to purchase Dreamworks Animation for $3.8 billion dollars, in a deal expected to close by late 2016. Best known for the Shrek and Kung Fu Panda franchises, Dreamworks Animation has produced 32 feature films in its 22 year history, developing as a rival to the Disney-owned Pixar. The deal does [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Justin Sullivan / Getty Images" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15792993/120284039.0.1504282407.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>NBCUniversal* has <a href="http://corporate.comcast.com/news-information/news-feed/nbcuniversal-announces-dreamworks-animation-acquisition">announced a plan to purchase Dreamworks Animation</a> for $3.8 billion dollars, in a deal expected to close by late 2016. Best known for the Shrek and Kung Fu Panda franchises, Dreamworks Animation has produced 32 feature films in its 22 year history, developing as a rival to the Disney-owned Pixar. The deal does not include Dreamworks Pictures, a separately owned studio specializing in live-action films.</p>

<p>The acquisition would significantly expand the entertainment holdings of Comcast, which owns NBCUniversal and operates the largest cable business in the United States. &ldquo;DreamWorks will help us grow our film, television, theme parks and consumer products businesses for years to come,&rdquo; said NBCUniversal CEO Steve Burke in a statement. &ldquo;The prospects for our future together are tremendous.&rdquo;</p>

<p><a href="http://www.theverge.com/2016/4/28/11526256/comcast-nbcuniversal-buys-dreamworks-animation">Read the rest of this post on The Verge </a></p>

<p>* Comcast owns NBCU, an investor in <strong>Re/code</strong> parent company Vox Media.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[FBI Director Comey Says iPhone Hack &#8216;Doesn&#8217;t Work on a 5s&#8217; or Newer]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/4/7/11585948/fbi-director-comey-iphone-hack-limits" />
			<id>https://www.vox.com/2016/4/7/11585948/fbi-director-comey-iphone-hack-limits</id>
			<updated>2019-03-06T05:36:27-05:00</updated>
			<published>2016-04-07T10:41:42-04:00</published>
			<category scheme="https://www.vox.com" term="Apple" /><category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The FBI&#8217;s new method for unlocking iPhones won&#8217;t work on most models, FBI Director Comey said in a speech last night at Kenyon College. &#8220;It&#8217;s a bit of a technological corner case, because the world has moved on to sixes,&#8221; Comey said, in response to a question. &#8220;This doesn&#8217;t work on sixes, doesn&#8217;t work on [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Kenyon College" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15798091/20160407-james-comey-fbi.0.1488142515.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The FBI&rsquo;s new method for unlocking iPhones won&rsquo;t work on most models, FBI Director Comey said in <a href="http://www.kenyon.edu/academics/centers/center-for-the-study-of-american-democracy/conference-archives/">a speech last night at Kenyon College</a>. &ldquo;It&rsquo;s a bit of a technological corner case, because the world has moved on to sixes,&rdquo; Comey said, in response to a question. &ldquo;This doesn&rsquo;t work on sixes, doesn&rsquo;t work on a 5s. So we have a tool that works on a narrow slice of phones.&rdquo;</p>

<p>Comey did not elaborate on why the new method did not work on more advanced phones, but it&rsquo;s very likely related to the Secure Enclave protections that were implemented with the 5s&rsquo; A7 chip, present in all subsequent iPhones. If true, that would severely limit the impact of the FBI&rsquo;s new method.</p>

<p><a href="http://www.theverge.com/2016/4/7/11383892/fbi-iphone-hack-5s-limited-version">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The FAA Logged More Than 500 Drone Incidents in Six Months]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/3/26/11587284/the-faa-logged-more-than-500-drone-incidents-in-six-months" />
			<id>https://www.vox.com/2016/3/26/11587284/the-faa-logged-more-than-500-drone-incidents-in-six-months</id>
			<updated>2019-03-06T05:11:09-05:00</updated>
			<published>2016-03-26T07:00:59-04:00</published>
			<category scheme="https://www.vox.com" term="Policy" /><category scheme="https://www.vox.com" term="Technology" /><category scheme="https://www.vox.com" term="Transportation" />
							<summary type="html"><![CDATA[Airplanes and helicopters no longer have the skies to themselves. A new report from the FAA lists 583 separate drone incidents reported from August 2015 through January 2016. The majority of the incidents are minor, with pilots or bystanders reporting drones that are flying in restricted airspace without necessarily endangering anyone. Still, the documents reveal [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Sean Gallup / Getty Images" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15791985/gettyimages-473398674.0.1536754203.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Airplanes and helicopters no longer have the skies to themselves. A new report from the FAA lists 583 separate drone incidents reported from August 2015 through January 2016. The majority of the incidents are minor, with pilots or bystanders reporting drones that are flying in restricted airspace without necessarily endangering anyone.</p>

<p>Still, the documents reveal more than a few close calls. One incident outside New York&rsquo;s JFK airport in August saw a drone flying at 7,000 feet, only 20 feet from the plane&rsquo;s right side. The report also lists hundreds of incidents in which drones approached airports or flew above the 500-foot altitude limit proposed by the FAA.</p>

<p><a href="http://www.theverge.com/2016/3/25/11306850/faa-drone-airport-incidents">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Google Is Giving Itself an Encryption Report Card]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/3/15/11586988/google-is-giving-itself-an-encryption-report-card" />
			<id>https://www.vox.com/2016/3/15/11586988/google-is-giving-itself-an-encryption-report-card</id>
			<updated>2019-03-06T05:16:04-05:00</updated>
			<published>2016-03-15T13:21:31-04:00</published>
			<category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Google" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Today, Google added a new section to its transparency report, giving users a running tally of how many Google requests use HTTPS encryption. Groups like the EFF have long pushed for wider usage of HTTPS, but implementation can be demanding, particularly for services as complex as Google&#8217;s. &#8220;Our aim with this project is to hold [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="The Verge" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15793192/20160315-google-office-new-york.0.1537283693.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Today, Google added a new section to <a href="https://www.google.com/transparencyreport/https/">its transparency report</a>, giving users a running tally of how many Google requests use HTTPS encryption. Groups like the EFF have <a href="https://www.eff.org/encrypt-the-web">long pushed for wider usage of HTTPS</a>, but implementation can be demanding, particularly for services as complex as Google&rsquo;s. &ldquo;Our aim with this project is to hold ourselves accountable and encourage others to encrypt so we can make the Web even safer for everyone,&rdquo; Google said <a href="https://security.googleblog.com/2016/03/securing-web-together_15.html">in an accompanying statement</a>.</p>

<p>Roughly three-quarters of requests from Google products use SSL. Products like Gmail and Drive require SSL encryption, which powers HTTPS, for security reasons, but it&rsquo;s less important for casual products like Maps or News. Still, Google figures show SSL usage growing gradually more encrypted over the past two years.</p>

<p><a href="http://www.theverge.com/2016/3/15/11233498/google-ssl-encryption-transparency-report">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[White House Initiative Pledges Broadband to 20 Million More People by 2020]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/3/9/11586828/white-house-initiative-pledges-broadband-to-20-million-more-people-by" />
			<id>https://www.vox.com/2016/3/9/11586828/white-house-initiative-pledges-broadband-to-20-million-more-people-by</id>
			<updated>2019-03-06T05:10:25-05:00</updated>
			<published>2016-03-09T13:14:49-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Today, President Obama announced a new broadband initiative called ConnectALL, aimed at providing broadband to underserved areas. The initiative aims to bring broadband access to another 20 million Americans by 2020, building on previous goals set by the National Broadband Initiative in 2010. The most immediate effort is one that was announced yesterday by the [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="White House / Flickr" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15791807/20160309-obama-oval-office.0.1503035457.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Today, President Obama announced a new broadband initiative called ConnectALL, aimed at providing broadband to underserved areas. The initiative aims to bring broadband access to another 20 million Americans by 2020, building on previous goals set by the <a href="https://www.fcc.gov/general/national-broadband-plan">National Broadband Initiative</a> in 2010.</p>

<p>The most immediate effort is one that was announced yesterday by the FCC: A <a href="http://www.theverge.com/2016/3/8/11177768/fcc-broadband-subsidy-poor-lifeline-program">proposed broadband subsidy for poor households</a>, scheduled for a commission vote on March 31st.</p>

<p><a href="http://www.theverge.com/2016/3/9/11186728/white-house-broadband-initiative-connectall-obama">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Apple Has a New Fix for Phones Bricked by Error 53]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/2/18/11588010/apple-has-a-new-fix-for-phones-bricked-by-error-53" />
			<id>https://www.vox.com/2016/2/18/11588010/apple-has-a-new-fix-for-phones-bricked-by-error-53</id>
			<updated>2019-03-06T05:12:18-05:00</updated>
			<published>2016-02-18T12:05:00-05:00</published>
			<category scheme="https://www.vox.com" term="Apple" /><category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[In the latest update to iOS, Apple has issued a patch for one of its most stubborn and mystifying errors, potentially restoring countless bricked phones to functionality. Typically triggered by third-party repairs, Error 53 has been causing headaches for months, but became particularly prominent earlier this month when a freelance reporter described severe difficulty restoring [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="The Verge" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15792274/20160218-damaged-iphone.0.1543774854.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>In the latest update to iOS, Apple has <a href="https://support.apple.com/en-us/HT205628">issued a patch</a> for one of its most stubborn and mystifying errors, potentially restoring countless bricked phones to functionality. Typically triggered by third-party repairs, Error 53 has been causing headaches for months, but became particularly prominent <a href="http://www.theverge.com/2016/2/5/10923780/error-53-iphone-screen-repair-third-party">earlier this month</a> when a freelance reporter described severe difficulty restoring his phone after having it repaired <a href="http://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">while on assignment in Macedonia</a>.</p>

<p>While rare, the error is significant because of its severe consequences. Error 53 is typically triggered by a disruption of the link between the Touch ID fingerprint reader and the Secure Enclave within the phone, which often causes the phone to brick completely. Many users who took those phones to nearby Apple stores were told the phones were effectively unrecoverable.</p>

<p><a href="http://www.theverge.com/2016/2/18/11050178/iphone-error-53-fix-restore-bricked-phone">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Facebook Is Developing Millimeter-Wave Networks for Internet.org]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/2/9/11587700/facebook-is-developing-millimeter-wave-networks-for-internet-org" />
			<id>https://www.vox.com/2016/2/9/11587700/facebook-is-developing-millimeter-wave-networks-for-internet-org</id>
			<updated>2019-01-29T14:07:52-05:00</updated>
			<published>2016-02-09T12:42:38-05:00</published>
			<category scheme="https://www.vox.com" term="Facebook" /><category scheme="https://www.vox.com" term="Social Media" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[When Starry announced its new venture for gigabit mesh networks in January, it was hailed as ambitious, innovative, and more than a little far-fetched. But Starry isn&#8217;t the only company developing the technology. Patent records obtained by The Verge show that Facebook is actively developing an extremely similar technology. One patent &#8212; filed by Facebook [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="The Verge" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/13723290/20160209-cell-tower.0.1510292834.jpg?quality=90&#038;strip=all&#038;crop=0,15.125,100,69.75" />
	<figcaption>
		</figcaption>
</figure>
<p>When Starry <a href="http://recode.net/2016/01/27/aereos-founder-is-back-with-starry-this-time-hes-going-after-broadband-not-tv/">announced its new venture for gigabit mesh networks</a> in January, it was hailed as <a href="http://recode.net/2016/01/27/why-starry-faces-an-uphill-battle-in-its-quest-to-shake-up-home-internet-service/">ambitious, innovative, and more than a little far-fetched</a>. But Starry isn&rsquo;t the only company developing the technology.</p>

<p>Patent records obtained by The Verge show that Facebook is actively developing an extremely similar technology. One patent &mdash; filed by Facebook employee Sanjai Kohli in October but made public the week after the Starry announcement &mdash; describes a &ldquo;Next Generation Data Network&rdquo; that would connect computers using millimeter-wave radio links deployed as a mesh network. Both mesh and millimeter-wave technology are also central ideas in Starry&rsquo;s scheme. Another patent granted to Kohli at the end of 2015 describes the Next Generation Network in more detail, as a kind of centralized, cloud-based routing system.</p>

<p>Reached by The Verge, Facebook confirmed the millimeter-wave research and said its development was part of Internet.org&rsquo;s ongoing efforts to build out Internet access for rural and poor populations.</p>

<p><a href="http://www.theverge.com/2016/2/9/10951200/facebook-millimeter-wave-mesh-networks-starry">Read the rest of this post on the original site &raquo;</a></p>
<div><p><iframe src="https://player.megaphone.fm/VMP6288352442"></iframe></p></div>
<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The Dragnet: How a Fraud Suspect Exposed a Secret Surveillance Device]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/1/13/11588762/the-dragnet" />
			<id>https://www.vox.com/2016/1/13/11588762/the-dragnet</id>
			<updated>2019-03-06T05:40:40-05:00</updated>
			<published>2016-01-13T10:23:31-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[On May 6, 2008, a package containing $68,000 in cash arrived at a FedEx store in Palo Alto, Calif. The bills had been washed in lantern fuel, as per instruction, then double-vacuum-sealed and placed inside the cavity of a stuffed animal, which was then gift-wrapped. The store had been chosen carefully: It was open all [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Cam Floyd / The Verge" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15799289/20160113-stingray-investigation-illustration.0.1537364762.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>On May 6, 2008, a package containing $68,000 in cash arrived at a FedEx store in Palo Alto, Calif. The bills had been washed in lantern fuel, as per instruction, then double-vacuum-sealed and placed inside the cavity of a stuffed animal, which was then gift-wrapped. The store had been chosen carefully: It was open all night and located just 500 feet from a Caltrain station. The package was general delivery, to be picked up at the store by a man named Patrick Stout.</p>

<p>The money was being closely watched. The package had been prepared by a criminal informant, working in cooperation with a joint task force of agents from the FBI, IRS, and U.S. Postal Service, who were investigating a tax fraud scheme. The informant had been arrested and flipped months earlier, betrayed by yet another informant. Now they were after the mastermind.</p>

<p><a href="http://www.theverge.com/2016/1/13/10758380/stingray-surveillance-device-daniel-rigmaiden-case">Read the rest of this post on the original site &raquo;</a></p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
