Hello and welcome to Regulator, a newsletter for Verge subscribers about the technology, broligarchs and brainrot rapidly transforming politics and civic society. Not subscribed to The Verge yet? You should! It can materially improve your life.
Technology
Inside the White House shitposting machine
Last week was a grim reminder that no matter what sort of horror is being perpetrated or how many people end up dead, the Trump administration’s knee-jerk response is to shitpost through it. The White House’s response on X to abducting the head of a sovereign nation? “FAFO”. The response to an ICE agent shooting a woman in broad daylight? A Buzzfeed-style listicle of “57 Times Sick, Unhinged Democrats Declared War on Law Enforcement.” ICE agents arresting protesters? “Welcome to the Find Out stage.”
To the vast majority of people following current events, the Trump administration’s meme-ing is blunt and cruel. But the jaded political insider will also view Trump’s meme fusillade as an element of a media strategy known as “rapid response”: the full-time work of quickly shaping the political narrative of a breaking news event, sometimes within minutes, before the news media and your opponents can shape it for you.
“Every political office, every political campaign, has a dedicated operation that helps them respond strategically to events in the news that are out of their control.” Lis Smith, a high-profile Democratic communications strategist based in New York City, told me. It’s a profession that dates back to the beginning of the 24-hour news cycle, when cable shows could quickly assemble a panel of pundits to discuss current events, and the workload has grown exponentially in the age of social media. “You cannot control all the narratives that are going to be out there, so you need to be able to manage the chaos that’s coming into your world.”
Smith served as the director of rapid response for Barack Obama’s 2012 presidential campaign, which was one of the first to fully take advantage of social media, and worked in the comms shop for several New York City mayors and Democratic candidates. She’s widely credited for single-handedly elevating Pete Buttigieg’s profile, turning him from an obscure mayor to a serious presidential candidate as his director of communications. She views social networks through the lens of their messaging utility: X, formerly known as Twitter, is still the best for getting “text-based rapid response communications like written statements” in front of a wide range of “elites and opinion-shapers.” A Bluesky-based messaging strategy might engage a friendly left-leaning audience, but will never “penetrate” the world outside, nor will a Rumble-based campaign ever make it out of the right-wing bubble.
More importantly: memes may be a fast way to convey a political message to a specific audience who gets the inside joke, but the humor is rarely understood by anyone outside of that group — especially people who might have been sympathetic to the concept of stopping illegal immigration, but are horrified by how the Trump administration is going about it. The memes themselves are simply a reflection of that mindset. “The administration’s use of memes really flattens the political debate,” said Smith. “It takes the humanity, the seriousness, and the nuance that’s needed out of it and replaces it just with cruelty.”
Before we get to my conversation with Smith, here’s The Verge’s latest on the political tech dystopia:
- “Snatching Maduro was all about the spectacle”, Elizabeth Lopatto and Sarah Jeong: Real people are dead because Donald Trump wanted a spectacle.
- “America’s new era of energy imperialism is about more than oil”, Justine Calma: Trump wants Venezuela’s oil, Greenland’s minerals, and above all — control.
- “The MAGA-approved video of an ICE killing”, Mia Sato: After a federal agent shot and killed a woman in Minneapolis, the Trump administration found its preferred angle of the incident.
- “Tim Cook and Sundar Pichai are cowards”, Elizabeth Lopatto: X’s deepfake porn feature clearly violates app store guidelines. Why won’t Apple and Google pull it?
- “Trump’s fundraisers asked Microsoft for its White House ballroom donation”, Emma Roth: Amazon also admitted that it was in touch with fundraisers months before the White House released its list of donors in October.
- “New York wants to regulate Roblox”, Lauren Feiner: Gov. Kathy Hochul made new requirements meant to protect kids online a centerpiece of her plan for state policy.
- “Former NYC Mayor Eric Adams accused of $2.5 million crypto ‘rug pull’ as his NYC Token crashes”, Emma Roth: The NYC token’s value peaked at about $580 million, before dropping to $130 million.
- “I can’t find the Trump phone at America’s largest tech show”, Dominic Preston: I’ve looked and looked, but Trump Mobile is nowhere to be found at CES this year
“A meme that is funny or cruel will probably spread faster than anything with nuance”
This interview has been edited for clarity.
You came up during an era where Twitter, before it was X, was really the only internet media environment for politics. How has the practice of rapid response changed in an environment where there is so much narrative to control over so many types of media?
It’s gotten a lot harder. In the ’90s, the big change was the 24-hour news cycle with cable news. In the late 2000s and early 2010s, the big development was social media, Twitter, and being able to respond in real time online to news developments. But now, there’s no question that it’s harder to get your message out, with how fractured these different social media channels are. Not everyone is on X today the same way they were 10 years ago. But also, your message is less likely to penetrate as effectively on a platform like X than it was 10 years ago, because of how verification, etc., have changed.
So you really need to have an “all of the above” communication strategy, where you’re hitting traditional media with press releases, calls to reporters and news networks, and you’re also hitting social media in real time. That means not just hitting X, but also hitting Threads, hitting Bluesky, TikTok, Instagram, all those apps, because there has never been a time where people’s media consumption habits have been more fractured than right now.
Do candidates view specific platforms for certain political purposes, or political leanings?
X is still pretty dominant in American politics for getting out rapid response communications, especially text-based rapid response communications like written statements, because it’s still where you’re going to find the most political insiders, political pundits, and reporters. Everything [messaging-wise] trickles out from there. Where you see more fracturing is in terms of where people do short form video: you do see some campaigns using TikTok, others using Instagram more; you do see some favoring of different platforms across partisan lines. But Bluesky on the left is just never going to be as effective of a way of reaching elites and opinion-makers as X is — just as Truth Social or Discord on the right is never going to be the way that you reach elites or opinion-makers.
Let’s go into the content of said messaging. I know that Kamala Harris and Biden tried to lean into memes during their 2024 campaigns, but clearly not as effectively as Trump, and the meme format seems to be really dominant in the Trump administration. Is there a specific way an operative views the meme format as a political messaging tool?
The meme format is more likely to spread quickly. It’s something that a specific audience is going to understand immediately, and it really simplifies a political argument. The problem with that, though, is, one, it’s very audience specific. Not everyone is going to understand a Family Guy meme, not everyone is going to understand a Patriots meme, or whatever the meme du jour is.
Another problem with the meme format is that you lose a lot of context and you lose a lot of humanity in it. So when you see the administration posting sort-of-funny memes about deportations or ICE, you lose a lot of the empathy and compassion that most people have when it comes to the immigration debate. Most people think that illegal immigration is bad and that we should do something about it. But most people also understand that there are real people who are involved in all of these situations and don’t think it’s funny to make light of, say, school pickups getting raided, or families getting separated, or parents crying as they’re being dragged away from their kids.
I was listening to Joe Rogan interviewing Shane Gillis, and they actually touched on this. I would say both Rogan and Shane Gillis are people who were favorable to Trump in the election — Rogan more so than Shane Gillis — but Gillis said, I want our government to take the issue of illegal immigration seriously. I don’t want it to be funny to them. And I think that’s something that really taps into how most people feel about these issues.
If you reduce these very serious issues to cruel, funny memes, you’re going to alienate a lot of people who might be there with you on an issue if you’d approached it with a little bit more maturity and humanity. But the administration is saying, cut out the humanity, cut out the maturity. Those things don’t matter. Because a viral meme — a meme that is funny or cruel — will probably spread faster than anything with nuance. They’re prioritizing speed and virality over nuance and seriousness.
I think you just refined what we’ve been thinking about at The Verge: the way that my coworkers saw Trump’s abduction of Maduro and their response to the ICE shooting was that this government’s policy is a meme mentality — their speed, virality and the need to get their spin out first before anyone feels any sort of way about it.
There’s a short window when people — everyone from reporters to voters to anyone online — are trying to figure out what the hell’s going on and what they think about breaking news. Rapid response is about stepping into that void and shaping it, but there are real problems with how the Trump administration is doing it. Ultimately, yes, they may win some sort of short-term viral meme war. But in the long term, the way that they’re communicating about these issues — whether it’s the fatal shooting of Renee Good in Minneapolis, or deportations in general — they’re gonna lose the political debate. People want action on these issues, but they don’t want wanton cruelty.
Also, if you [the administration[ step in very quickly and put out bad facts, what you do is just compound mistrust in government and mistrust in the administration. And it’s possible that the Trump administration benefits from that because the less people trust official sources, the more it’s good for them. But I think overall, it’s pretty bad that they’re putting out false information that goes mega-viral the way they do it, because ultimately, no one’s going to take anything they say at face value anymore. It’s especially damaging for their relationships with the news media and elites who, in the past, would have clearly taken what any presidential administration said at face value.
Is it too early to think about meme warfare in the midterm election — changing people’s opinions who could be swayed to vote one way or another, getting that messaging to them as quickly as possible, driving them out to the polls?
I don’t think that the meme strategy from this administration is gonna help Republicans in the midterms. And I think if you talk to a lot of Republicans who are up in swing areas or swing states or certain districts, and you presented them with the memes this administration is putting out, I don’t think they would agree with them, and I don’t think that they would say that this is good political strategy. Because to the point I made earlier: the administration’s use of memes really flattens the political debate. It takes the humanity, the seriousness, the nuance that’s needed out of it, and replaces it just with cruelty. The voters who are going to turn out in 2026 — yeah, some of them are going to be part of that MAGA base that it embraces the cruelty, but the people that you need to win over are going to be people who have nuanced views on issues like illegal immigration and people who say, Yeah, we need secure borders; yes, we need more enforcement of our immigration laws; but maybe we don’t need to be putting out memes about, you know, a father being taken off in handcuffs.
That’s where I think the administration’s focus on speed and virality comes at a political cost. Someone’s’s going to have to pay for the tone that they’re taking online, and it’s likely going to be the Republicans who are up in 2026, unless, I don’t know, Democrats somehow overplay their hand on immigration issues.
And a lot of the voters who will determine the midterm elections are older voters. They’re not going to consume the memes firsthand, nor are they going to understand the memes. That’s something being lost in this debate too: even though more people than ever are getting their news through social media, a lot of the people who decide elections, and a lot of the people that Republicans need to win, are not meme consumers. It’s questionable whether it will pay off electorally for them.
Speaking of memes distilling political arguments:
Technology
Republicans attack ‘woke’ Netflix — and ignore YouTube
When Netflix co-CEO Ted Sarandos entered the Senate office building on Tuesday, he got thrown a curveball. What started as a standard antitrust hearing relating to the Warner Bros. merger quickly devolved into a performative Republican attack about the spread of “woke” ideology on the streaming service. At the same time, arguably a much more influential platform was completely ignored: YouTube.
After grilling Sarandos about residual payments, Sen. Josh Hawley (R-MO) launched into a completely different line of questioning: “Why is it that so much of Netflix content for children promotes a transgender ideology?” Hawley asked, making an unsubstantiated claim that “almost half” of the platform’s children’s content contains so-called “transgender ideology.” The statement harkened to a pressure campaign launched by Elon Musk months ago in which he called on X users to unsubscribe from Netflix for having a “transgender woke agenda,” citing its few shows with trans characters — shows that were canceled years ago.
“Our business intent is to entertain the world,” Sarandos replied. “It is not to have a political agenda.” Still, other Republican lawmakers, including Sens. Ashley Moody (R-FL) and Eric Schmitt (R-MO), piled on, bringing up a post Netflix made following the murder of George Floyd, and the French film Cuties, which sparked a right-wing firestorm years ago. Sen. Ted Cruz (R-TX) even asked Sarandos what he thought about Billie Eilish’s “no one is illegal on stolen land” comment at the Grammys. It seemed like they were grasping at straws to support their narrative that Netflix’s acquisition of Warner Bros. could somehow poison the well of content for viewers.
“My concern is that you don’t share my values or those of many other American parents, and you want the United States government to allow you to become one of the largest — if not the largest — streaming monopolist in the world,” Hawley said. “I think we ought to be concerned about what content you’re promoting.”
While it’s true that Netflix will control a substantial portion of the streaming market when — and or if — it acquires Warner Bros. and its streaming service HBO Max, it’s hard to criticize Netflix without bringing up YouTube.
“YouTube is not just cat videos anymore. YouTube is TV.”
For years now, Netflix has been trying to topple YouTube as the most-watched streaming service. Data from Nielsen says Netflix made up 9 percent of total TV and streaming viewing in the US in December 2025, while Warner Bros. Discovery’s services made up 1.4 percent. Combining the two doesn’t even stack up to YouTube, which held a 12.7 percent share of viewership during that time. “YouTube is not just cat videos anymore,” Sarandos told the subcommittee. “YouTube is TV.”
Unlike Netflix, YouTube is free and has an ever-growing library of user-created content that doesn’t require it to spend billions of dollars in production costs and licensing fees. YouTube doesn’t have to worry about maintaining subscribers, as anyone with access to a web browser or phone can open up and watch YouTube. The setup brings YouTube a constant stream of viewers that it can rope in with a slew of content it can recommend to watch next.
But not all creators on YouTube are striving for quality. As my colleague Mia Sato wrote, YouTube is home to creators who try to feed an algorithm that boosts inflammatory content and attempts to hook viewers, in addition to an array of videos that may be less than ideal for kids.
Like it or not, YouTube is the dominant streamer, with an endless supply of potentially offensive agendas for just about anyone. But for some reason, it’s not the target of this culture war. If these lawmakers actually cared about what their kids are watching, maybe they’d start looking more closely at how YouTube prioritizes content. Or, if they don’t like the shows and movies on Netflix, they could just do what Sarandos suggested during the hearing: unsubscribe.
Technology
Microsoft crosses privacy line few expected
NEWYou can now listen to Fox News articles!
For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit.
In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.
This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS
In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)
What happened in the Guam BitLocker case?
Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key.
Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.
We reached out to Microsoft for comment, but did not hear back before our deadline.
How Microsoft was able to unlock encrypted data
According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”
Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”
Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”
Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”
In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.
“With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”
WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK
When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)
Why this matters for data privacy
This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”
When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.
How other tech giants handle encryption differently
Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.
What we can do to protect our privacy
The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”
That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”
Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”
When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.
700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS
Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)
Practical steps you can take today
You do not need to be a security expert to protect your data. A few practical checks can go a long way.
1) Start by checking where your encryption keys live
Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft.
For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.
2) Avoid cloud-based key backups unless you truly need them
Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.
3) Choose services that encrypt data before it reaches the cloud
Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.
4) Review default security settings on every new device
Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.
iPhone: tighten iCloud and account recovery
Turn on Advanced Data Protection for iCloud (strongest iCloud protection)
- Open Settings
- Tap your name
- Tap iCloud
- Scroll down and tap Advanced Data Protection
- Tap Turn On Advanced Data Protection
- Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key
Review iCloud Backup
- Open Settings
- Tap your name
- Tap iCloud
- Tap iCloud Backup
- Decide if you want it on or off, based on your privacy comfort level
Strengthen your Apple ID security
- Open Settings
- Tap your name
- Tap Sign-In & Security
- Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
- Review trusted phone numbers and devices
Android: lock your Google account and backups
Review and control device backup
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Backup (or All services then Backup)
- Tap Manage backup
- Choose what backs up and confirm which Google account stores it
NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS
Strengthen your screen lock, since it protects the device itself
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Security or Security & privacy
- Set a strong PIN or password
- Turn on biometrics if you want, but keep the PIN strong either way
Secure your Google account
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Manage your Google Account
- Go to Security
- Turn on 2-Step Verification and review recent security activity
Mac: enable FileVault and review iCloud settings
Turn on FileVault disk encryption
- Click the Apple menu
- Select System Settings
- Click Privacy & Security
- Scroll down and click FileVault
- Click Turn On
- Save your recovery method securely
Review iCloud syncing
- Open System Settings
- Click your name
- Click iCloud
- Review what apps and data types sync
- Turn off anything you do not want stored in the cloud
Windows PC: check BitLocker and where the recovery key is stored
Confirm BitLocker status and settings
- Open Settings
- Go to Privacy & security
- Tap Device encryption or BitLocker (wording varies by device)
Check whether your BitLocker recovery key is stored in your Microsoft account
- Go to your Microsoft account page
- Open Devices
- Select your PC
- Look for Manage recovery keys or a BitLocker recovery key entry
- If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.
If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.
5) Treat convenience features as privacy tradeoffs
Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it.
These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.
Strengthen protection beyond encryption
Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.
Strong antivirus software adds device-level protection
Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com
An identity theft protection service helps when exposure turns into fraud
If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
Kurt’s key takeaways
Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.
Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Substack data breach exposed users’ emails and phone numbers
Substack is notifying some users that the email addresses and phone numbers linked to their accounts were exposed in a “security incident” last year. In an email to account holders, Substack CEO Chris Best said that a hacker had accessed internal data without authorization in October 2025, but that passwords, credit card numbers, and other financial information remain secure.
“On February 3rd, we identified evidence of a problem with our systems that allowed an unauthorized third party to access limited user data without permission, including email addresses, phone numbers, and other internal metadata,” Best said in the email. “We do not have evidence that this information is being misused, but we encourage you to take extra caution with any emails or text messages you receive that may be suspicious.”
Substack says that it has since fixed the security problem, and is now conducting a full investigation alongside bolstering its systems “to prevent this type of issue from happening in the future.” The platform didn’t provide any details regarding what the security issue was, or how many users have been impacted — myself and several Verge colleagues who also use Substack did not receive the email. We have reached out to Substack for clarification.
“I’m incredibly sorry this happened,” Best said in the email to users. “We take our responsibility to protect your data and your privacy seriously, and we came up short here.”
-
Indiana4 days ago13-year-old rider dies following incident at northwest Indiana BMX park
-
Massachusetts5 days agoTV star fisherman, crew all presumed dead after boat sinks off Massachusetts coast
-
Tennessee6 days agoUPDATE: Ohio woman charged in shooting death of West TN deputy
-
Movie Reviews1 week agoVikram Prabhu’s Sirai Telugu Dubbed OTT Movie Review and Rating
-
Indiana3 days ago13-year-old boy dies in BMX accident, officials, Steel Wheels BMX says
-
Politics1 week agoVirginia Democrats seek dozens of new tax hikes, including on dog walking and dry cleaning
-
Austin, TX6 days ago
TEA is on board with almost all of Austin ISD’s turnaround plans
-
Texas5 days agoLive results: Texas state Senate runoff