Brian Boland spent more than a decade figuring out how to build a system that would make Meta money. On Thursday, he told a California jury it incentivized drawing more and more users, including teens, onto Facebook and Instagram — despite the risks.
Technology
Tech security check: Am I doing enough to keep my computer safe?
It’s easy to feel overwhelmed by the number of steps you can take to keep yourself and your computer safe and running smoothly. With the increasing number of cybercriminals, it can feel like you are fighting a losing battle. While it is impossible to be 100% effective all the time, creating some routines in your computer’s maintenance can help you feel more secure and at ease.
That’s why I want to highlight Joe from Hainesport, New Jersey, who has a question about routine steps he could take to stay safe and sane: “I don’t like feeling there is ‘clutter’ or malware lurking on my computer simply because I don’t have the knowledge to keep it orderly. I pay for antivirus software and have … free VPN but still am not confident I am doing all that makes for [good] maintenance. Any comments about that statement?”
Joe, I understand your concerns. It’s important to keep your computer clean and secure. We’re glad to hear that you are using an antivirus program and VPN. I’m on a mission to help you be resilient against today’s privacy and security threats. Below are some additional tips to help you enhance your computer’s security and maintain its function.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
A woman frustrated by her computer (Kurt “CyberGuy” Knutsson)
How to enhance your computer’s security
Here are five steps to help you enhance your computer’s security:
1) Update your antivirus software regularly
It’s great to install antivirus software on your computer, but it is equally important to update it regularly because it ensures that the software can protect your computer against the latest threats. Antivirus updates contain the latest files needed to combat new viruses and protect your computer. These updates often include the latest list and behavior of known viruses, improvements to the scan engine, and patches for security vulnerabilities in operating systems. Without these updates, your computer would be at risk from new viruses that the outdated antivirus software wouldn’t recognize or be able to defend against. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
FREE ANTIVIRUS SOFTWARE: SHOULD YOU USE IT?
2) Scan your computer for malware regularly
There is no use in installing your antivirus if it isn’t actively scanning your computer regularly. Some antivirus software programs can be set up to automatically run on a schedule. If you can’t remember to scan regularly, definitely set up a schedule if your program has that option. If any threats are found when scanning, quarantine or remove them.
Illustration focusing on security on your devices (Kurt “CyberGuy” Knutsson)
HOW TO KNOW IF YOUR COMPUTER GOT HACKED, WHAT TO DO NEXT
3) Update your operating system and applications
If you keep your operating system’s software as well as the applications you regularly use updated, you are less likely to be exposed to certain vulnerabilities. Even if you have set your devices to automatically update, it’s worth forcing a manual update when a security flaw has been patched.
4) Remove unnecessary applications
Older, unused applications take up space on your drive and can pose security threats, especially ones that can no longer be updated to ward against new vulnerabilities. Remove applications from your phone or tablet you haven’t used in a while.
TIDY UP YOUR TECH: TIPS FOR SAFEGUARDING YOUR DATA
5) Use a high quality VPN
A virtual private network (VPN) enhances your digital security by encrypting your internet connection and concealing your IP address. This makes it significantly more challenging for unauthorized parties to intercept your data or track your online activities. However, it’s important to be mindful of the limitations of free VPN services. Here are six reasons why you might want to avoid using a free VPN:
Limited data and speed: Free VPNs often have data caps and slower speeds, hindering your browsing experience.
Security risks: Some free VPNs may not use strong encryption, leaving your data vulnerable.
Privacy concerns: Free VPNs may collect and sell your browsing data to third parties.
Ad intrusions: To support their service, free VPNs might show intrusive ads, which can be annoying and potentially dangerous.
Limited server options: You may have fewer servers to choose from, which can affect your connection’s reliability and speed.
Customer support: Free VPNs typically offer limited customer support, if any.
While no system can guarantee complete invulnerability, these practices can substantially reduce the risk of cyberthreats. Always exercise caution when handling sensitive information on the internet. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
A woman using a VPN on her laptop (Kurt “CyberGuy” Knutsson)
HOW TO TELL IF YOUR BROWSER HAS BEEN HIJACKED
How to ‘declutter’ your computer
Here are four steps to help you declutter your computer and enhance its operation.
1) Remove old apps
Free up space on your drive and help you find the apps you use most frequently by searching for and removing old apps that you no longer use.
2) Delete unnecessary system files
Deleting unnecessary system files on your PC and Mac is important for several reasons:
- Free up disk space: Unnecessary files take up valuable storage space that could be used for other applications or data.
- Improve system performance: Too many unused files can slow down your computer’s performance, as they consume resources and make file searches more time-consuming.
- Enhance system security: Some of these files could potentially be exploited by malicious software. Removing them reduces this risk.
- Maintain system hygiene: Regularly cleaning out unnecessary files helps keep your system organized and makes it easier to manage.
More:
3) Organize your files
Keeping your files and folders organized can make it easier to find what you need and make your computer feel less cluttered. You can also group files within folders by type, which might help you sort through what you need to keep or delete.
4) Regularly clean your inbox
A cluttered inbox can make it harder to find important emails. Regularly delete or archive emails you no longer need. Create filters or flag specific individuals or companies as a priority so that they don’t get lost in the shuffle, deleted accidentally or redirected to your spam or junk folder.
Update antivirus software regularly (Kurt “CyberGuy” Knutsson)
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Have strong antivirus software
Make sure you have strong antivirus software installed on all your devices to safeguard your private information. With strong antivirus protection, you can prevent malware from sneaking in through malicious links, keeping your personal data secure. Additionally, it will alert you to phishing emails and ransomware scams, keeping your digital life secure. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Kurt’s key takeaways
Regularly employing the security and decluttering strategies listed above doesn’t just keep your computer more secure but also keeps your computer running more smoothly and efficiently. While no process is foolproof, utilizing these strategies on a regular basis can give you greater peace of mind and ease of use. If you’re unsure about how to implement any of the strategies, you can look into the more in-depth articles or seek professional help. There is a reason why these professionals exist, and it is always better to be safe than sorry.
Do you feel like you’re doing enough to keep your computer safe and running well? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
The executive that helped build Meta’s ad machine is trying to expose it
Boland’s testimony came a day after Meta CEO Mark Zuckerberg took the stand in a case over whether Meta and YouTube are liable for allegedly harming a young woman’s mental health. Zuckerberg framed Meta’s mission as balancing safety with free expression, not revenue. Boland’s role was to counter this by explaining how Meta makes money, and how that shaped its platforms’ design. Boland testified that Zuckerberg fostered a culture that prioritized growth and profit over users’ wellbeing from the top down. He said he’s been described as a whistleblower — a term Meta has broadly sought to limit for fear it would prejudice the jury, but which the judge has generally allowed. Over his 11 years at Meta, Boland said he went from having “deep blind faith” in the company to coming to the “firm belief that competition and power and growth were the things that Mark Zuckerberg cared about most.”
Boland last served as Meta’s VP of partnerships before leaving in 2020, working to bring content to the platform that it could monetize, and previously worked in a variety of advertising roles beginning in 2009. He testified that Facebook’s infamous early slogan of “move fast and break things” represented “a cultural ethos at the company.” He said the idea behind the motto was generally, “don’t really think about what could go wrong with a product, but just get it out there and learn and see.” At the height of its prominence internally, employees would sit down at their desks to see a piece of paper that said, “what will you break today?” Boland testified.
“The priorities were on winning growth and engagement”
Zuckerberg consistently made his priorities for the company abundantly clear, according to Boland. He’d announce them in all hands meetings and leave no shadow of a doubt what the company should be focused on, whether it was building its products to be mobile-first, or getting ahead of the competition. When Zuckerberg realized that then-Facebook had to get into shape to compete with a rumored Google social network competitor (which he didn’t name, but seemed to refer to Google+), Boland recalled a digital countdown clock in the office that symbolized how much time they had left to achieve their goals during what the company called a “lockdown.” During his time at the company, Boland testified, there was never a lockdown around user safety, and Zuckerberg allegedly instilled in engineers that “the priorities were on winning growth and engagement.”
Meta has repeatedly denied that it tries to maximize users’ engagement on its platforms over safeguarding their wellbeing. In the past weeks, both Zuckerberg and Instagram CEO Adam Mosseri testified that building platforms that users enjoy and feel good on is in their long-term interest, and that’s what drives their decisions.
Boland disputes this. “My experience was that when there were opportunities to really try to understand what the products might be doing harmfully in the world, that those were not the priority,” he testified. “Those were more of a problem than an opportunity to fix.”
When safety issues came up through press reports or regulatory questions, Boland said, “the primary response was to figure out how to manage through the press cycle, to what the media was saying, as opposed to saying, ‘let’s take a step back and really deeply understand.” Though Boland said he told his advertising-focused team that they should be the ones to discover “broken parts,” rather than those outside the company, he said that philosophy didn’t extend to the rest of the company.
On the stand the day before, Zuckerberg pointed to documents around 2019 showing disagreement among his employees with his decisions, saying they demonstrated a culture that encourages a diversity of opinion. Boland, however, testified that while that might have been the case earlier in his tenure, it later became “a very closed down culture.”
“There’s not a moral algorithm, that’s not a thing … Doesn’t eat, doesn’t sleep, doesn’t care”
Since the jury can only consider decisions and products that Meta itself made, rather than content it hosted from users, lead plaintiff attorney Mark Lanier also had Boland describe how Meta’s algorithm works, and the decisions that went into making and testing it. Algorithms have an “immense amount of power,” Boland said, and are “absolutely relentless” in pursuing their programmed goals — in many cases at Meta, that was allegedly engagement. “There’s not a moral algorithm, that’s not a thing,” Boland said. “Doesn’t eat, doesn’t sleep, doesn’t care.”
During his testimony on Wednesday, Zuckerberg commented that Boland “developed some strong political opinions” toward the end of his time at the company. (Neither Zuckerberg nor Boland offered specifics, but in a 2025 blog post, Boland indicated he was deleting his Facebook account in part over disagreements with how Meta handled events like January 6th, writing that he believed “Facebook had contributed to spreading ‘Stop the Steal’ propaganda and enabling this attempted coup.”) Lanier spent time establishing that Boland was respected by peers, showing a CNBC article about his departure that quoted a glowing statement from his then-boss, and a reference to an unnamed source who reportedly described Boland as someone with a strong moral character.
On cross examination, Meta attorney Phyllis Jones clarified that Boland didn’t work on the teams tasked with understanding youth safety at the company. Boland agreed that advertising business models are not inherently bad, and neither are algorithms. He also admitted that many of his concerns involved the content users were posting, which is not relevant to the current case.
During his direct examination, Lanier asked if Boland had ever expressed his concerns to Zuckerberg directly. Boland said he’d told the CEO he’d seen concerning data showing “harmful outcomes” of the company’s algorithms and suggested that they investigate further. He recalled Zuckerberg responding something to the effect of, “I hope there’s still things you’re proud of.” Soon after, he said, he quit.
Boland said he left upwards of $10 million worth of unvested Meta stock on the table when he departed, though he admitted he made more than that over the years. He said he still finds it “nerve-wracking” every time he speaks out about the company. “This is an incredibly powerful company,” he said.
Technology
Panera Bread data breach exposes 5.1M customers
NEWYou can now listen to Fox News articles!
Another major consumer brand has joined the growing list of companies hit by serious data breaches. Panera Bread has confirmed a cybersecurity incident after the hacking group ShinyHunters claimed it stole millions of customer records.
The breach exposes a wide range of personal details, raising real concerns for anyone who has ever placed an order, created an account or shared contact information with the popular bakery chain.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
Panera Bread confirmed a data breach after hackers claimed they stole millions of customer records containing contact information. (AP Photo)
What happened in the Panera Bread data breach?
ShinyHunters added Panera Bread to its data leak site earlier this year, initially claiming it had stolen more than 14 million customer records. According to the group, the stolen data includes names, email addresses, phone numbers, home addresses and account-related information.
Panera Bread has since confirmed a cybersecurity incident. In a statement to media outlets, the company described the exposed data as customer “contact information” and said it has contacted law enforcement and taken steps to address the incident. Panera has not shared technical details about how the attack occurred or whether customers need to take specific actions.
Even “contact information” can be dangerous in the wrong hands. When combined, these details can be used for identity theft, targeted phishing and highly convincing social-engineering scams.
ShinyHunters claims the attackers accessed Panera’s systems through Microsoft Entra single sign-on (SSO). While Panera has not confirmed that claim, it closely mirrors recent warnings from Okta about a surge in voice-phishing attacks targeting SSO platforms.
In these attacks, criminals pose as IT or helpdesk staff and call employees directly. They pressure targets to approve authentication requests or enter login credentials on fake SSO pages. Once attackers capture session tokens or credentials, they can bypass some forms of multifactor authentication and move laterally through company systems. This approach relies on human trust rather than technical exploits, making it increasingly effective.
How many people were actually affected?
At first glance, claims that 14 million customers were affected suggested an enormous breach. However, researchers at Have I Been Pwned? later clarified that the attackers stole 14 million records, not data tied to 14 million unique individuals.
After reviewing the leaked dataset, researchers now estimate the breach affected approximately 5.1 million unique people. The exposed information includes email addresses along with associated names, phone numbers, and physical addresses.
That distinction matters, but it does not eliminate risk. Once stolen data is released publicly, it can spread quickly across criminal forums and be reused for years.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
The hacking group ShinyHunters leaked stolen Panera customer data online after an attempted extortion failed. (Panera Bread)
Hackers leaked the data after extortion failed
ShinyHunters reportedly attempted to extort Panera Bread before publishing the stolen data. When those efforts failed, the group released a 760MB archive containing millions of customer records on its leak site.
This reflects a broader shift in cybercrime. Instead of locking systems with ransomware, many groups now focus on quietly stealing data and threatening public exposure. These attacks are faster, harder to detect, and often just as profitable.
ShinyHunters has used similar tactics in other high-profile incidents involving Bumble, Match Group, Crunchbase and other consumer platforms.
Lawsuits filed after Panera breach disclosure
The breach has already triggered legal fallout. Multiple class-action lawsuits have been filed in U.S. federal court, alleging that Panera failed to adequately protect customer data.
The lawsuits claim Panera knew or should have known about security weaknesses and seek damages, improved security practices, and long-term identity theft protection for affected customers. Panera has not publicly commented on the litigation.
A troubling pattern for Panera Bread
This is not Panera Bread’s first major security lapse. In 2018, a cybersecurity researcher revealed that Panera had left millions of customer records exposed online in plain text. That incident later led to lawsuits and settlements.
Repeated breaches often point to deeper challenges. Large organizations can struggle to secure cloud services, identity systems, and employee access at scale. When attackers target identity platforms instead of infrastructure, a single mistake can expose millions of records.
We reached out to Panera Bread for a comment, but did not hear back before our deadline.
GRUBHUB CONFIRMS DATA BREACH AMID EXTORTION CLAIMS
Exposed contact details like names, emails, and addresses can fuel phishing scams and identity theft long after a breach becomes public. (Donato Fasano/Getty Images)
7 steps you can take to protect yourself following the Panera data breach
When a major consumer brand suffers a breach, customers often don’t realize the risk until weeks or months later. These steps help limit what attackers can do with your information if your Panera data falls into the wrong hands.
1) Use a strong, unique password for every account
If you ever created a Panera Bread account, reset its password immediately. If you reused that password anywhere else, those accounts are now at risk, too. Attackers routinely test breached passwords across email, shopping and banking sites.
A password manager helps by generating strong, unique passwords for every account and storing them securely so you never need to reuse credentials. Many password managers also alert you if your email or passwords appear in known data breaches, giving you an early warning to lock things down fast.
Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
2) Enable two-factor authentication (2FA) wherever possible
Two-factor authentication (2FA) adds a second step to the login process, usually through an app or device you control. Even if someone gets your password through phishing or a breach, 2FA makes it much harder for them to access your account.
3) Be cautious of phishing messages
Cybercriminals often follow up breaches with fake emails or in-app messages pretending to offer help or security updates. Always double-check the sender and avoid clicking links. When in doubt, open the app or website directly rather than responding to the message. Using strong antivirus software adds another layer of protection by flagging malicious links and blocking known threats before they can do harm. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) Limit the personal details you share
When names, email addresses, phone numbers and physical addresses are exposed, identity theft becomes a real risk. Identity theft-protection services monitor your personal information, alert you if it appears on the dark web, and watch for attempts to open new accounts in your name.
If something does go wrong, these services often include recovery support to help freeze accounts, dispute fraud, and guide you through the cleanup process.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
5) Reduce your digital footprint with a data removal service
Scammers don’t rely on one breach alone. They combine leaked data with information from data broker sites to build detailed profiles. Data removal services help remove your phone number, home address and other personal details from hundreds of these sites.
While no service can erase everything, reducing what’s publicly available makes it much harder for criminals to target you with convincing scams or identity fraud. This is one of the most effective long-term ways to lower your risk after any major breach.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Secure your email account
Your email account controls password resets for most services. Protect it with a strong password and 2FA. Regularly review login activity and recovery settings, so attackers can’t use your email to take over other accounts.
7) Watch for account changes after breach news
Not every breach leads to immediate account takeovers. In some cases, attackers quietly test access weeks later. That is why staying alert after breach reports matters. Watch for password reset emails you did not request, profile changes you did not make, or new messages you did not send. Unexpected logouts or security alerts are also red flags. If you notice anything unusual, change your password immediately and review your security settings.
Kurt’s key takeaway
The Panera Bread data breach is another reminder that even familiar brands can become major cyber targets. While Panera says only contact information was exposed, that data is often enough to fuel scams and identity theft long after headlines fade. Staying proactive after breach news is now part of protecting your digital life.
Do you still trust large brands to protect your personal information, or have repeated breaches changed how much data you’re willing to share? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
It’s MAGA v Broligarch in the battle over prediction markets
Hello and welcome to Regulator, a newsletter for Verge subscribers about the love-hate (but mostly hate) relationship between Silicon Valley and Washington. I hope everyone got to celebrate George Washington’s birthday in their preferred manner: skiing, staycationing, subscribing to The Verge if you haven’t already, etc.
Prediction: this is going to be a mess
Political alliances are rarely permanent, so it’s somewhat predictable that the MAGA-tech bro alliance seems to have fallen apart in the span of a single year. Which side the administration would actually choose, though, was more difficult to foresee.
Last winter, it appeared that two groups were in a tenuous relationship, held together by Elon Musk’s shameless execution of the DOGE agenda and Big Tech signing massive checks to settle Donald Trump’s lawsuits against them. But last night, the Trump administration made a choice: the money. The Commodity Futures Trading Commission (CFTC) announced that they would sue any state who tried to regulate prediction markets like Kalshi — even the Republican states.
On Tuesday, the CFTC filed an amicus brief to the Ninth Circuit Court of Appeals, officially opposing an onslaught of lawsuits filed by the states against betting markets like Kalshi, Polymarket, Coinbase, and Crypto.com. (The latter two, known primarily as cryptocurrency exchanges, have partnered with Kalshi and created a standalone prediction market called OG, respectively.) But unusually, the brief was accompanied by a threat — posted on X, of all places. In a video directly facing the camera posted on Tuesday night, sole CFTC chairman Michael Selig asserted his commission’s authority to regulate prediction markets and stated that the federal government was prepared to sue: “To those who seek to challenge our authority in this space, let me be clear: we will see you in court.”
Had Selig simply written a staid Wall Street Journal op-ed asserting the CFTC’s authority (which he also did), that would have barely raised an eyebrow. But in 2026, a video threat, especially one posted on X, is basically grounds to instigate a political firestorm — one that Spencer Cox, the Republican Governor of Utah, gladly kindled. “Mike, I appreciate you attempting this with a straight face, but I don’t remember the CFTC having authority over the ‘derivative market’ of LeBron James rebounds,” he posted in response (also on X). “These prediction markets you are breathlessly defending are gambling—pure and simple. They are destroying the lives of families and countless Americans, especially young men. They have no place in Utah.” He promised that Utah would continue to pursue litigation and beat the federal government in court if need be.
This wouldn’t be the first time that Utah and Cox have voiced their opposition to federal overreach regarding emerging technology. Last year, they publicly opposed an executive order that would have given the Justice Department the power to sue states passing and enforcing AI regulatory laws. The prediction markets issue hits a particular nerve in Utah: nearly half of the state is Mormon, and the Church of Jesus Christ of Latter-day Saints officially opposes all government-sanctioned forms of gambling, even state lotteries. But Cox’s declaration is what’s known in political circles as a “weathervane”: if one deeply Republican state is pushing back against the Trump administration on a new front, who else on the right might follow suit — and what sorts of new broligarch technologies would they fight against?
Is it a coincidence that Anthropic CEO Dario Amodei’s big visit to Washington happened just as the Pentagon was reconsidering its relationship with the AI company? Over the past two weeks, Amodei published a 38-page letter to Congress warning of the rising existential risks of artificial intelligence, conducted an interview with Axios’s Mike Allen (and sponsored their newsletter), and met with Sens. Elizabeth Warren (D-MA) and Jim Banks (R-IN) on Capitol Hill to support their bill banning the sale of advanced AI chips to China.
But Amodei barely finished his capitol blitz when Axios broke the news over the weekend that the Pentagon wasn’t just impatient with Anthropic’s reticence to use Claude for unrestricted purposes, but that it would actively punish Anthropic for refusing to cooperate by designating them a “supply-chain risk.” If it goes through, any company that wants to work with the military would have to cut ties with Anthropic. As one Pentagon official described it, “It will be an enormous pain in the ass to disentangle, and we are going to make sure they pay a price for forcing our hand like this.”
The Pentagon’s move makes no sense for anyone who sees Claude as a superior AI enterprise product to its competitors at the Pentagon (Gemini, ChatGPT, and Grok). If viewed through the lens of every former interaction that Trump’s had with companies that voiced ideological opposition to his agenda however, their treatment of Anthropic is par for the course. Years ago, for instance, Trump threatened to cut off Amazon’s access to their sweetheart deal with the US Postal Service, in retaliation for Jeff Bezos’ ownership of the then highly critical Washington Post.
But for me, the question is: exactly what caused the ideological break, and how much of it was even about national security? In the past few months, there’s been a bizarre spurt of online messaging from right-wing influencers trying to claim that Anthropic, of all the AI companies, was too woke — the kind of woke that could convince kids to become trans, or DEI-pill them, or whatever lib-coded nightmares a MAGA personality could dream up. There wasn’t much proof that they could point to, other than its employees expressing opinions that could be lib-coded, if you’re not fully reading the entire tweet:
Screenshot va @KatieMiller/X.
Speaking of influencers eating their own:
- Steve Bannon is under MAGA siege for his 2018 texts with Jeffrey Epstein, newly unearthed from the Justice Department’s Epstein Files, wherein he suggested that Trump should be removed from office using the 25th Amendment. Influencers calling for him to be questioned include Rep. Marjorie Taylor Greene, who broke from Trump and the GOP for trying to bury the Epstein Files, and retired Gen. Mike Flynn. Notably, both of them rose to prominence in 2020 by backing QAnon, the online conspiracy theory that claimed that an elite ring of Satan-worshipping pedophiles were in control of the government. (It may not help Bannon that he called Epstein “God” in one of the texts).
- Mike Davis, an anti-Big Tech lawyer who previously represented Trump in his lawsuits against Meta, took credit for the ouster of former friend and ally Gail Slater from the Department of Justice’s antitrust division, according to texts obtained by The Free Press. Though the two were once allies due to their shared interest in holding Big Tech accountable, their relationship started fracturing over disagreements about when to enforce antitrust laws and when to go for settlements.
- And we’re back to Bannon: per The Bulwark, he and fellow MAGA political operative Boris Epshteyn are being sued for their own shady cryptocurrency operation.
The White House is convening a third meeting between the crypto industry and the banking industry this week, continuing to hash out which major financial entity gets to reap the interests from yield-bearing stablecoin accounts (or if they get to bear interest at all). They have until March 1st to deliver draft language for the Senate. Good luck, y’all!
And finally, looksmaxxing Recess.
Can we all agree that HHS Secretary Robert F. Kennedy is framemogging Kid Rock in this video?
See you next week, and send all tips to every way that we list here.
-
Oklahoma2 days agoWildfires rage in Oklahoma as thousands urged to evacuate a small city
-
Health1 week agoJames Van Der Beek shared colorectal cancer warning sign months before his death
-
Science1 week agoA SoCal beetle that poses as an ant may have answered a key question about evolution
-
Movie Reviews1 week ago“Redux Redux”: A Mind-Blowing Multiverse Movie That Will Make You Believe in Cinema Again [Review]
-
Technology1 week agoHP ZBook Ultra G1a review: a business-class workstation that’s got game
-
Politics1 week agoCulver City, a crime haven? Bondi’s jab falls flat with locals
-
Politics1 week agoTim Walz demands federal government ‘pay for what they broke’ after Homan announces Minnesota drawdown
-
Fitness1 week ago‘I Keep Myself Very Fit’: Rod Stewart’s Age-Defying Exercise Routine at 81