More stories

  • in

    Want to see how many one-star Uber ratings you have? Here's how

    Image: Getty Images
    Ever wondered why your Uber rating wasn’t at least a 4.9? You always greet the driver, mind your own business, and tip generously. So what gives with your not-5.0 rating? Well, you’re not alone, and Uber seems to have heard enough of what many riders are calling “Uber Anxiety”. Yesterday the company rolled out an update to iOS and Android which permits users to view their previous rider ratings and be able to tally up the average themselves. While you won’t be able to see the ratings based on the driver and date, you can see how many 1s, 2s, 3s, 4s, and 5s you’ve accumulated throughout your Uber journey.
    GIF: Uber
    How to view your previous ratings from the app:On the iOS or Android Uber app, tap on your profile picture on the upper right corner, and then Settings. Swipe down, tap on Privacy, and then Privacy Center.Swipe across the middle carousal of widgets until you find one that asks, “Would you like to see a summary of how you use Uber?”Once open, swipe down to the Ratings box and tap View my ratings.You should now see a chart quantifying all the ratings you’ve received in the past. Uber will only show the scores of your last 500 trips. Uber’s tips to improve your rating:Along with the new data feature, Uber has shared five tips that, according to drivers, are best practices for scoring high ratings:Do not slam the door. This is the most cited reason for why drivers give low ratings, as no one likes a damaged car. Always clean up after yourself. The driver shouldn’t have to pick up any trash or unwanted items that you leave behind. Always buckle up. By fastening your seat belt, the ride is safer for you and the driver. Be considerate of the driver’s time. You should be ready to get in the Uber when it arrives, and ready to get out when you’ve arrived at your destination. Treat the driver and car with respect. As with any customer-facing service, you should always treat others the same way you want to be treated. Do you find Uber’s new rating transparency helpful? Let us know in the comments below. More

  • in

    Democratic senators call for IRS and ID.me to help taxpayers delete selfies

    US Senator Bob Menendez and other lawmakers this week demanded the Internal Revenue Service (IRS) and ID.me contact taxpayers who have uploaded biometric information to the platform and inform them of their right to delete their selfie or photo account immediately after the service is available.In a letter to IRS Commissioner Charles Rettig, Menendez and Senators Cory Booker, Alex Padilla, and Catherine Cortez Masto called on the IRS to provide taxpayers with plain language instructions in multiple languages on how to complete the process of deleting their selfie. 

    The IRS announced last week that it will no longer be using ID.me facial recognition software after signing an $86 million contract with the company, adding in a statement that it will “transition away from using a third-party service for facial recognition to help authenticate people creating new online accounts.” The IRS had faced overwhelming backlash from civil rights groups and members of Congress from both parties, all of whom questioned how the IRS could begin the use of facial recognition without advance warning. But the announcement did little to quell outrage about the initial decision to use ID.me’s tools and senators on both sides of the aisle continue to raise concerns about what information ID.me gained access to. “Despite well-documented concerns with this technology — especially for individuals who have poor internet service at home, rely on computers in public libraries, use older phones, or for whom English is not their first language — the IRS required the use of this technology to access and review advanced child tax credit (CTC) payment information,” the senators added. “Nearly 35 million families received the advanced Child Tax Credit last year, including numerous Black, Hispanic, Asian, and Native American families, and many immigrant families using an Individual Taxpayer Identification Number.” 

    Menendez said the IRS and ID.me need to clarify whether facial recognition will remain an option for verification during the 2022 filing season. “If it will remain an option, we request the IRS clarify how it will ensure taxpayers using ID.me — especially last-minute filers — are not forced to rely on facial recognition technology as their only practical option to avoid long wait times for live-video verification,” the letter said.

    The senators demanded the IRS and ID.me send them a list of all federal, state, or local law enforcement agencies that would have been provided access to biometric data through the IRS’ ID.me verification system no later than Friday, February 25. “Congress has repeatedly expressed concern with the development of an unconstrained and pervasive surveillance infrastructure, fueled by systems like ID.me. The Project on Government Oversight (POGO), a leading oversight watchdog, has cautioned that the use of this type of technology often plays an outsized role in law enforcement investigations, despite serious flaws that can lead to wrongful arrests and civil rights violations,” the senators wrote.The letter also explains a range of concerns Congress has about how ID.me will manage the vast amount of government documents provided by American taxpayers since the IRS started using the platform last summer. “We are concerned about whether taxpayers will be offered a meaningful choice to protect their biometric data, whether ID.me will properly manage the vast amount of biometric data provided by taxpayers, and whether there has been substantial oversight of this facial recognition technology since the launch of ID.me verification at the IRS last summer,” the letter added.The senators’ letter comes as 46 civil rights organizations continue the push to stop other government agencies at the federal and state level from using ID.me for vital services. ID.me says it is used by agencies in 30 states as well as by the Veterans Affairs Administration and Social Security Administration. 

    Led by EPIC in partnership with Algorithmic Justice League and Fight for the Future, the organizations’ letter demands that all federal and state government agencies immediately end their use of ID.me and any other facial verification tools. It also highlights the lack of assessments by federal and state agencies to determine whether face verification technology has a disproportionate impact on marginalized groups, and argues that “sensitive biometric data should not be used to access government services.” The letter also asserts that ID.me’s recent announcement about offering a non-facial verification option to all users doesn’t adequately address the massive privacy and security concerns created by ID.me’s tools, arguing that “the vast majority of people are not aware of the risks associated with handing over their sensitive biometric information, and making this tech ‘optional’ puts the onus on the individual to have the right information about those risks.”Evan Greer, director of Fight for the Future, said in addition to ending all contracts, a full scale investigation is needed to reveal how it came to be that US tax dollars were used “for such invasive and unsafe technology.””The revelations about ID.me exploiting its workers, lying about its facial recognition technology, and continuing to recklessly amass millions of people’s personal data all point to the same conclusion: it’s irresponsible and unacceptable to do business with a company as shady as ID.me, much less allow it anywhere near our most personal information,” Greer said.

    Government More

  • in

    DOJ names first director of unit focused on cryptocurrency and crime

    The US Justice Department announced on Thursday that seasoned prosecutor Eun Young Choi has been chosen to lead the National Cryptocurrency Enforcement Team (NCET). Before working as senior counsel to Deputy Attorney General Lisa Monaco, Choi was an Assistant US Attorney for the Southern District of New York serving as the office’s Cybercrime Coordinator. She helped lead the investigations into a number of cybercrimes, including a hack involving J.P. Morgan Chase, while also prosecuting those connected to Coin.mx. 

    The Harvard graduate previously argued in the appeal case of Silk Road founder Ross Ulbricht and participated in the only US prosecution brought in connection with the “Panama Papers.” Choi is starting work in her new position at NCET today. “The department has been at the forefront of investigating and prosecuting crimes involving digital currencies since their inception,” said Choi, who will serve as director of NCET. “The NCET will play a pivotal role in ensuring that as the technology surrounding digital assets grows and evolves, the department in turn accelerates and expands its efforts to combat their illicit abuse by criminals of all kinds. I am excited to lead the NCET’s incredible and talented team of attorneys, and to get to work on this important priority for the department.”  NCET was created last year to tackle “the criminal misuse of cryptocurrencies and digital assets,” with a focus on virtual currency exchanges, mixing and tumbling services, infrastructure providers, and other entities. Blockchain analytics company Chainalysis said last month that cybercriminals managed to launder at least $8.6 billion worth of cryptocurrency in 2021, a 30% increase compared to 2020. The company released another report this week highlighting the connections between cybercriminals and a vast crypto exchange infrastructure designed to launder stolen funds.  

    The Justice Department is coming off of a streak of successes. A DOJ restraining order revealed that $30 million was seized from NetWalker ransomware affiliate Sebastien Vachon-Desjardins, who was sentenced to seven years in prison for hacking several companies. Two weeks ago, the Department of Justice announced the seizure of more than $3.6 billion in cryptocurrency that was stolen during an attack on the Bitfinex cryptocurrency exchange in August 2016. The DOJ arrested 34-year-old Ilya Lichtenstein and his 31-year-old wife Heather Morgan for their role in attempting to launder 119,754 bitcoin that were stolen during the attack on the Hong Kong exchange. Deputy Attorney General Lisa Monaco called the seizure the “department’s largest financial seizure ever.”Assistant Attorney General Kenneth Polite Jr. said NCET will serve as the focal point for the department’s efforts to tackle the growth of crime involving cryptocurrency. He called Choi an “accomplished leader on cyber and cryptocurrency issues” and noted that the problem has emerged as one of the most important the office deals with. “With the rapid innovation of digital assets and distributed ledger technologies, we have seen a rise in their illicit use by criminals who exploit them to fuel cyberattacks and ransomware and extortion schemes; traffic in narcotics, hacking tools and illicit contraband online; commit thefts and scams; and launder the proceeds of their crimes,” Polite Jr. said.   More

  • in

    Singapore to build quantum-safe network for critical infrastructure trials

    Singapore is aiming to build a quantum-safe network that it hopes will showcase “crypto-agile connectivity” and facilitate trials with both public and private organisations. The initiative also includes a quantum security lab for vulnerability research. The three-year initiative is led by the Quantum Engineering Programme (QEP), with SG$8.5 million ($6.31 million) set aside to fund its deployment. Supported by the National Research Foundation (NRF), the project has roped in 15 partners from the public and private sectors including two local universities, ST Telemedia Global Data Centres, Cyber Security Agency, and Amazon Web Services (AWS). QEP was launched in 2018 to provide the research and ecosystem needed to drive the development of quantum technologies. Its work focuses on four key areas including quantum sensing, quantum communication and security, and the establishment of a national quantum fabless foundry. 

    Its plans for a national quantum-safe network (NQSN) would facilitate trials of commercial technologies and in-depth evaluation of security systems. It also would develop guidelines to support companies in adopting such technologies, QEP said in a statement Thursday. It added that the nationwide trials of quantum-safe communication technologies aimed to provide robust network security for critical infrastructures and companies handling sensitive data. This was critical as public-key encryption was expected to be vulnerable to attacks by quantum computers in future. There was increasing urgency to address the cybersecurity threat as the technology advanced, QEP said.”Quantum-safe communication technologies are designed to counter the threat of quantum computing with specialised hardware and new cryptographic algorithms,” it said. “They could secure communication systems for governments, critical infrastructure such as energy grids, and companies handling sensitive data in areas such as healthcare and finance.”

    Quantum-safe cryptography or post-quantum cryptography looks to establish algorithms that can combat attacks by both traditional and quantum computers. Hosted on National University of Singapore (NUS), the NQSN would provide quantum key distribution, which offered a hardware approach to quantum-safe communication. This involved the installation of devices to create and receive quantum signals, QEP explained. The network also would offer post-quantum cryptography, in which software was enhanced to run new cryptographic algorithms deemed to be resistant to attacks by quantum computers. The NQSN initially would comprise 10 network nodes to be rolled out across the city-state, connected to fibre. These would include two at NUS, two at Nanyang Technological University (NTU), and others on the premises of government and private organisations. Expected to be up within a year, the nodes would be connected to provide a public network that could serve as a living lab for companies looking to experience quantum-safe communication technologies. This would run separate from government and private networks trialling applications, according to QEP. Another experimental node at NUS would provide a free-space fibre connection to the public network. This could facilitate the development of technologies that could extend secure links to locations unable to connect to fibre, such as boats.A quantum security lab also would be set up to facilitate advanced quantum security vulnerability research and security design. NQSN’s co-coordinator and Fraunhofer Singapore’s department director for cyber and information security, Michael Kasper, said: “Quantum-safe communication can play a crucial role in long-term information security. With NQSN, we aim to demonstrate crypto-agile connectivity for our partners and support the deployment of quantum networks for broader use in industry and society.”Fraunhofer, along with NUS and NTU, would provide expertise, coordination, and locations for hardware needed in the initiative. Other partners such as NetLink Trust and ST Telemedia would provide access to Singapore fibre network and develop use cases, respectively. CSA would work with its Common Criteria testing labs T-Systems and UL on security certification of quantum-safe technologies, while DSO National Laboratories and Horizon Quantum Computing would partake in quantum network research projects.”Singapore can build on its heritage in quantum science, optics, and cybersecurity engineering to become a trusted global provider of quantum network technology and services, said Charles Lim, NQSN’s lead principal investigator and assistant professor with NUS’ Department of Electrical and Computer Engineering and Centre for Quantum Technologies. “In NQSN, we will bring quantum innovation to deployed optical networks, where we can study operational issues such as a quantum network’s reliability and resilience together with our industry partners,” Lim said. RELATED COVERAGE More

  • in

    Ransomware attacks more than doubled last year – these cybersecurity basics can protect you

    The number of ransomware attacks has more than doubled over the last year as cybercriminals continue their relentless campaigns to hold networks and data to ransom.According to an analysis by cybersecurity researchers at SonicWall, the volume of attempted ransomware attacks targeting their customers rose by 105% in 2021, to a total of 623.3 million attempted incidents throughout the year. The figure also represents more than triple the number of attempted ransomware attacks recorded in 2019.The biggest surge in ransomware attacks came between June and September 2021, a period that featured some of the most significant incidents of last year. These included the Colonial Pipeline ransomware attack, the JBS ransomware attack and the Kaseya ransomware attack.Both Colonial and JBS were among the ransomware victims who opted to pay cybercriminals millions of dollars in ransom demands in order to obtain a decryption key to restore their networks.Cybersecurity providers and law enforcement agencies recommend against giving in to ransom demands, as it shows criminals that ransomware attacks work. But in some cases, victims perceive it to be the most efficient way of restoring the network – although even with the correct decryption key, this can still take months of effort.Cybercriminals are also using the extra leverage provided by threatening to leak data stolen from compromised networks if they don’t receive a ransom payment.

    SEE: A winning strategy for cybersecurity (ZDNet special report)According to SonicWall’s statistics, the United States was by far the largest target for ransomware attacks, but the volume of detected incidents more than doubled in many regions around the world including Europe and Asia.While action has been taken against some significant ransomware groups, such as the apparent takedown of REvil in January, the SonicWall report warns that this has been “largely ineffective” in stemming the tide of ransomware as a whole.”Due to the lucrative nature of ransomware, as soon as one group is taken down, new ones rise to fill the void,” says the paper. But despite the continuing scourge of ransomware, according to SolarWinds, there are relatively simple steps that organisations can take to prevent them from falling victim – such as practising better password hygiene and using multi-factor authentication.Cracking simple passwords is one of the easiest ways for cybercriminals to gain access to accounts and networks, particularly if they’re common passwords, or the username and password have previously been leaked in a breach. Using unique passwords on accounts can help prevent unauthorised access.In addition, applying multi-factor authentication across the network provides an extra barrier of protection against hackers attempting to breach an account.”The Colonial Pipeline breach could almost certainly have been prevented with the use of two-factor authentication,” said the paper.”While cyberdefense has become more sophisticated and specialized over time, in some cases the simplest prevention is still some of the best”.MORE ON CYBERSECURITY More

  • in

    Cisco's quarterly results indicate increasing business value of network

    Networking giant Cisco Systems announced its FY22 Q2 numbers on Wednesday. ZDNet summarized the results in this post, so I won’t go into detail on the numbers. At a high level, the company put up a modest beat, which is impressive given the unprecedented supply-chain constraints that are playing havoc with infrastructure vendors.

    Quarterly revenue and non-GAAP EPS were $56 million and $0.03 ahead of street expectations respectively. The $12.7 billion in revenue represents 6.4% year-over-year growth, which is impressive for a $50 billion annual-run-rate company. While the financials give the industry a sense that demand for Cisco is strong, it’s worth looking behind the numbers to get a better picture of where Cisco’s business is and where it’s going.  Demand for company’s products never stronger The numbers show 6.5% year-over-year growth, but that was tempered by the macro supply chain issues. Total product order growth for the quarter was up 33% YoY, making it the third consecutive quarter this metric has topped 30%. Looking at segments, enterprise orders grew 37%, its strongest number in a dozen years. Service providers and webscale grew 42% and 70%, respectively. These are notable because Cisco has struggled in these segments historically, but that ship seems to have turned on the strength of a refreshed ASR 9K and Catalyst 8K portfolios. These include the acquisition of Acacia. Commercial business (SMB) jumped 34% and public sector 22%. This order growth has resulted in an RPO growing (remaining performance obligation) 8.5% to $30.5 billion, with 53% to be recognized in the next 12 months. Also, Cisco reported its backlog is now over $14 billion, which oddly enough includes $2 billion in software backlog, which is unusual but occurs due to the tie to hardware. CEO Chuck Robbins addressed the backlog on the earnings call and noted that supply issues have not gotten worse but also have not improved. The shift to subscription and inventory backlog has put Cisco in a comfortable, predictable position with demand not seen in more than a decade. AA A massive software company Under Robbins, Cisco has been aggressive in its transition to subscription software. This wasn’t an easy thing to do for a company whose value is mostly tied up in hardware. Total software revenue is now $3.8 billion, 80% of which comes via subscription. That number annualizes to more than $15 billion in software, making it a top-5 software company. While many Cisco products are still delivered as hardware, much of the value is now through software. This is an important pivot because it enables the company to innovate new features its customers can use, faster than with a hardware-only model.

    Consider how Teslas, iPhones, and other consumer devices are hardware devices that deliver value through software updates. All of Cisco’s newer hardware products work this way. Customers buy the hardware but also purchase a software subscription. This ensures they can run the latest and greatest features without going through a costly hardware upgrade. The network is not a commodity 

    Many industry watchers have been calling for the network to be commoditized for the better part of two decades. The bearish outlook on Cisco was that network features were largely becoming standardized, leaving no room for differentiation and causing the bottom to fall out of the industry. Huawei was going to do this to Cisco, the same way software-defined networking was going to do it to white boxes. These trends have come and gone, yet Cisco’s gross margins remain in the mid-60% range, where it has historically been. In technology, it’s always been my belief that no market is a commodity if the vendor can create differentiation. People pay thousands for a MacBook even though Chromebooks are just a few hundred dollars. VMware maintains healthy margins for virtualization despite a strong push from Microsoft. Cisco’s differentiation in networking has been and continues to be driven via its custom silicon. Most network vendors use merchant silicon from vendors such as Broadcom, but Cisco has largely eschewed that model. It has built its hardware, allowing it to often get a first-mover advantage with new features and performance numbers. From an enterprise perspective, the shift to hybrid work has shone a new light on the network, which rarely earned any C-level attention previously. In a recent ZK Research study, a little over 60% of business leaders stated that the network has grown in business value since the pandemic began. Most enabling technologies for digital initiatives, such as cloud, mobile, and IoT are network-centric, making the choice of network vendor a critical one for businesses. With that being said, the competitive landscape in this area is much tougher for Cisco. Arista, HPE, VMware, Juniper, and Extreme Networks are all strong companies. Also, AWS, GCP, and Azure eyeing network services and 5G could shift things to telcos, so it will be interesting to see if Cisco can continue to stay at the front of the innovation train. Security, collaboration in transition While the network business remains robust at Cisco, its security and collaboration businesses are currently in the midst of transitions. Security showed growth of 7%, which is well behind the growth of companies like Palo Alto, Fortinet, and Zscaler. However, Cisco’s security growth number is a mix of declining on-premises hardware and cloud-delivered security centered in its Duo product. Over time, the hardware business will level out and security growth should jump back up to the teens, but right now the legacy products are acting as a drag on the business.Similarly, Cisco’s collaboration products experienced a decline of 9%. I know the core Webex business is growing, but Cisco has a huge base of customers still using on-premises VoIP, Jabber, and Telepresence. Also, many of Cisco’s newer collaboration endpoints were bitten by supply chain issues, limiting availability. Again, over time I expect to see Cisco migrate customers over to Webex and, as this happens, collaboration should return to growth.

    Tech Earnings More

  • in

    Robot fry cook gets job at 100 White Castle locations

    White Castle
    White Castle seems to be all-in on its latest employee, a robotic fry cook. Flippy 2, the fast-food robot by Miso Robotics, will now be whipping up burgers and other food in 100 standalone locations.

    The news is part of a larger shift underway in the quick-serve sector, driven in part by the demand for contactless service and in part by a tight labor market and rising wages toward automation. Just this week, in a similar move, Jamba announced it was strengthening its collaboration with Blendid, which makes a juice robot.White Castle first trialed Miso’s original Flippy robot in a Chicago-area location in 2020. The burger chain, which bills itself as the first hamburger fast-food chain in-country (it was founded in 1921), then rolled out a version of Flippy, Robot-on-a-Rail (ROAR), to an additional 10 kitchens.”Artificial intelligence and automation have been an area White Castle has wanted to experiment with to optimize our operations and provide a better work environment for our team members,” said Lisa Ingram, CEO of White Castle, at the time. “We believe technology like Flippy ROAR can improve customer service and kitchen operation. This pilot is putting us on that path — and we couldn’t be more pleased to continue our work with Miso Robotics and pave the way for greater adoption of cutting-edge technology in the fast-food industry.”Also: Sam’s Club betting its cleaning robots can do double dutyThe sales pitch by Miso is that its robot can alleviate inefficiencies in the back of house while ensuring consistent quality. Given the scope of the rollout, White Castle clearly deems the ROI equation valid.”We could not be more grateful for the confidence White Castle has shown in us as we enter into the next phase of our partnership,” said Mike Bell, CEO of Miso Robotics. “White Castle was the first large brand to embrace our technology,  and we are thrilled that our Flippy pilot made such a positive impact on their operations that they want to integrate 100 more. We can’t wait to continue on this journey with such an outstanding partner.”         

    Miso’s journey, which we’ve covered since the company came out of stealth, has been fun to watch. The company did a non-traditional crowdfunding campaign and is primarily funded by individual investors. It boasts over 15,000 shareholders and a whopping  $50M in crowdfunding to date. Its E round gives it a market valuation of $500 million. More

  • in

    Microsoft warns of emerging 'ice phishing' threat on blockchain, DeFi networks

    Microsoft has warned of new threats impacting blockchain technologies and Web3 including “ice phishing” campaigns. 

    The blockchain, decentralized technologies, DeFi, smart contracts, the concept of a ‘metaverse’ and Web3 — the decentralized foundation built on top of cryptographic systems that underlay blockchain projects — all have the potential to produce radical changes in how we understand and experience connectivity today. Read on: What is Web3? Everything you need to know about the decentralized future of the internetHowever, with every technological innovation, there may also be new avenues created for cyberattackers and Web3 is no exception.  Today’s most common threats include mass spam and phishing conducted over email and social media platforms, social engineering, and vulnerability exploitation.  On February 16, the Microsoft 365 Defender Research Team said that phishing, in particular, has made its way over to the blockchain, custodial wallets, and smart contracts – “reaffirming the durability of these threats as well as the need for security fundamentals to be built into related future systems and frameworks.” Microsoft’s cybersecurity researchers say that phishing attacks focused on Web3 and the blockchain can take various forms. 

    One of the threats to watch out for is an attacker trying to obtain the private, cryptographic keys to access a wallet containing digital assets. While emailed phishing attempts do occur, social media scams are rife. For example, scam artists may send direct messages to users publicly asking for help from a cryptocurrency service — and while pretending to be from a support team, they ask for the key.  Another tactic is by launching fake airdrops for free tokens on social media sites, and when users try to access their new assets, they are redirected to malicious domains that either try to steal credentials or execute cryptojacking malware payloads on a victim’s machine.  In addition, cybercriminals are known to conduct typo-squatting to impersonate legitimate blockchain and cryptocurrency services. They register website domains containing small errors or changes — such as cryptocurency.com rather than cryptocurrency.com — and set up phishing websites to steal keys directly.  Ice phishing is different and ignores private keys entirely. This attack method attempts to dupe a victim into signing a transaction that hands over the approval of a user’s tokens to a criminal.  Such transactions can be used in DeFi environments and smart contracts to permit a token swap to take place, for example.
    Microsoft
    “Once the approval transaction has been signed, submitted, and mined, the spender can access the funds,” Microsoft noted. “In case of an ‘ice phishing’ attack, the attacker can accumulate approvals over a period of time and then drain all victim’s wallets quickly.”The most high-profile example of ice phishing is last year’s BadgerDAO compromise. Attackers were able to compromise the front-end of BadgerDAO to obtain access to a Cloudflare API key, and malicious scripts were then injected — and removed — from the Badger smart contract.  Customers with high balances were selected and they were asked to sign fraudulent transaction approvals. BadgerDAO said in a post-mortem of the phishing attack that “the script intercepted Web3 transactions and prompted users to allow a foreign address approval to operate on ERC-20 tokens in their wallet.” “After phishing a number of approvals, a funding account sent 8 ETH to the exploiter’s account to fuel a series of transferFrom calls on the users’ approved tokens,” BadgerDAO said. “This allowed the attacker to move funds on behalf of the users to other accounts, which then liquidated the funds and exited via the Badger Bridge to BTC.” Approximately $121 million was stolen. An audit and recovery plan is underway.  “The Badger DAO attack highlights the need to build security into Web3 while it is in its early stages of evolution and adoption,” Microsoft says. “At a high level, we recommend that software developers increase security usability of Web3. In the meantime, end-users need to explicitly verify information through additional resources, such as reviewing the project’s documentation and external reputation/informational websites.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More