Brian Boland spent more than a decade figuring out how to build a system that would make Meta money. On Thursday, he told a California jury it incentivized drawing more and more users, including teens, onto Facebook and Instagram — despite the risks.
Technology
Who's really behind that random strange text from nowhere?
These days, our phones are constantly buzzing with notifications, and it’s becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:
“Twice in the last week I’ve received texts supposedly sent elsewhere. The last one asked if I was ‘available tomorrow evening.’ I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn’t Mrs. Amy and had never been, but it was a problem.
“A return text came thanking me for being so polite and the texter’s appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?”
Bill’s experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let’s dive into the world of text message scams and learn how to protect ourselves.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
A man texting on his phone (Kurt “CyberGuy” Knutsson)
The anatomy of a text message scam
Text message scams, also known as “smishing,” a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:
Unfamiliar numbers: The message comes from a number you don’t recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.
Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: “Hey! Long time no see. How have you been?”
Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: “Hi Sarah, it’s Mike from the book club. Are you coming to the meeting next week?”
Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: “Congratulations! You’ve won a $500 gift card. Click here to claim your prize!”
Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: “This is your bank. We need to verify your account. Please reply with your account number and PIN.”
Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.
A person texting on a phone (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
Understanding the scammer’s strategy
In Bill’s case, the scammer employed a “long-play” strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:
Phishing for information: Gradually collecting personal details that can be used for identity theft.
Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.
Financial scams: Building trust to eventually request money or financial information.
A person texting on a phone (Kurt “CyberGuy” Knutsson)
HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID
How to identify suspicious texts
To protect yourself from text message scams, follow these steps:
- Check the sender: Look at the full email address or phone number, not just the display name.
- Analyze the content: Be wary of messages with urgent subjects, grammatical errors, or strange URLs.
- Verify independently: If the message claims to be from a known entity, contact them through official channels to confirm.
- Trust your instincts: If something feels off, it probably is. Don’t let politeness override your judgment.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
A man texting on his phone (Kurt “CyberGuy” Knutsson)
SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18’S NEW “SEND LATER” FEATURE
What to do if you suspect a scam
If you believe you’ve received a scam text, here are six steps to follow:
1. Don’t respond: Avoid engaging with the scammer to prevent further attempts.
2. Block the number: Use your phone’s built-in blocking features to prevent further contact.
- For iPhone: Open the message, tap the sender’s name or number, select “Info,” then “Block Caller.”
- For Android: Open the message, long-press the conversation, tap the three-dot menu and select “Block” or “Block & Report Spam.” You may be asked to confirm your decision by clicking Yes. Settings may vary depending on your Android phone’s manufacturer.
3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.
4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.
5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
Kurt’s key takeaways
While it’s natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won’t mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.
How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The executive that helped build Meta’s ad machine is trying to expose it
Boland’s testimony came a day after Meta CEO Mark Zuckerberg took the stand in a case over whether Meta and YouTube are liable for allegedly harming a young woman’s mental health. Zuckerberg framed Meta’s mission as balancing safety with free expression, not revenue. Boland’s role was to counter this by explaining how Meta makes money, and how that shaped its platforms’ design. Boland testified that Zuckerberg fostered a culture that prioritized growth and profit over users’ wellbeing from the top down. He said he’s been described as a whistleblower — a term Meta has broadly sought to limit for fear it would prejudice the jury, but which the judge has generally allowed. Over his 11 years at Meta, Boland said he went from having “deep blind faith” in the company to coming to the “firm belief that competition and power and growth were the things that Mark Zuckerberg cared about most.”
Boland last served as Meta’s VP of partnerships before leaving in 2020, working to bring content to the platform that it could monetize, and previously worked in a variety of advertising roles beginning in 2009. He testified that Facebook’s infamous early slogan of “move fast and break things” represented “a cultural ethos at the company.” He said the idea behind the motto was generally, “don’t really think about what could go wrong with a product, but just get it out there and learn and see.” At the height of its prominence internally, employees would sit down at their desks to see a piece of paper that said, “what will you break today?” Boland testified.
“The priorities were on winning growth and engagement”
Zuckerberg consistently made his priorities for the company abundantly clear, according to Boland. He’d announce them in all hands meetings and leave no shadow of a doubt what the company should be focused on, whether it was building its products to be mobile-first, or getting ahead of the competition. When Zuckerberg realized that then-Facebook had to get into shape to compete with a rumored Google social network competitor (which he didn’t name, but seemed to refer to Google+), Boland recalled a digital countdown clock in the office that symbolized how much time they had left to achieve their goals during what the company called a “lockdown.” During his time at the company, Boland testified, there was never a lockdown around user safety, and Zuckerberg allegedly instilled in engineers that “the priorities were on winning growth and engagement.”
Meta has repeatedly denied that it tries to maximize users’ engagement on its platforms over safeguarding their wellbeing. In the past weeks, both Zuckerberg and Instagram CEO Adam Mosseri testified that building platforms that users enjoy and feel good on is in their long-term interest, and that’s what drives their decisions.
Boland disputes this. “My experience was that when there were opportunities to really try to understand what the products might be doing harmfully in the world, that those were not the priority,” he testified. “Those were more of a problem than an opportunity to fix.”
When safety issues came up through press reports or regulatory questions, Boland said, “the primary response was to figure out how to manage through the press cycle, to what the media was saying, as opposed to saying, ‘let’s take a step back and really deeply understand.” Though Boland said he told his advertising-focused team that they should be the ones to discover “broken parts,” rather than those outside the company, he said that philosophy didn’t extend to the rest of the company.
On the stand the day before, Zuckerberg pointed to documents around 2019 showing disagreement among his employees with his decisions, saying they demonstrated a culture that encourages a diversity of opinion. Boland, however, testified that while that might have been the case earlier in his tenure, it later became “a very closed down culture.”
“There’s not a moral algorithm, that’s not a thing … Doesn’t eat, doesn’t sleep, doesn’t care”
Since the jury can only consider decisions and products that Meta itself made, rather than content it hosted from users, lead plaintiff attorney Mark Lanier also had Boland describe how Meta’s algorithm works, and the decisions that went into making and testing it. Algorithms have an “immense amount of power,” Boland said, and are “absolutely relentless” in pursuing their programmed goals — in many cases at Meta, that was allegedly engagement. “There’s not a moral algorithm, that’s not a thing,” Boland said. “Doesn’t eat, doesn’t sleep, doesn’t care.”
During his testimony on Wednesday, Zuckerberg commented that Boland “developed some strong political opinions” toward the end of his time at the company. (Neither Zuckerberg nor Boland offered specifics, but in a 2025 blog post, Boland indicated he was deleting his Facebook account in part over disagreements with how Meta handled events like January 6th, writing that he believed “Facebook had contributed to spreading ‘Stop the Steal’ propaganda and enabling this attempted coup.”) Lanier spent time establishing that Boland was respected by peers, showing a CNBC article about his departure that quoted a glowing statement from his then-boss, and a reference to an unnamed source who reportedly described Boland as someone with a strong moral character.
On cross examination, Meta attorney Phyllis Jones clarified that Boland didn’t work on the teams tasked with understanding youth safety at the company. Boland agreed that advertising business models are not inherently bad, and neither are algorithms. He also admitted that many of his concerns involved the content users were posting, which is not relevant to the current case.
During his direct examination, Lanier asked if Boland had ever expressed his concerns to Zuckerberg directly. Boland said he’d told the CEO he’d seen concerning data showing “harmful outcomes” of the company’s algorithms and suggested that they investigate further. He recalled Zuckerberg responding something to the effect of, “I hope there’s still things you’re proud of.” Soon after, he said, he quit.
Boland said he left upwards of $10 million worth of unvested Meta stock on the table when he departed, though he admitted he made more than that over the years. He said he still finds it “nerve-wracking” every time he speaks out about the company. “This is an incredibly powerful company,” he said.
Technology
Panera Bread data breach exposes 5.1M customers
NEWYou can now listen to Fox News articles!
Another major consumer brand has joined the growing list of companies hit by serious data breaches. Panera Bread has confirmed a cybersecurity incident after the hacking group ShinyHunters claimed it stole millions of customer records.
The breach exposes a wide range of personal details, raising real concerns for anyone who has ever placed an order, created an account or shared contact information with the popular bakery chain.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
Panera Bread confirmed a data breach after hackers claimed they stole millions of customer records containing contact information. (AP Photo)
What happened in the Panera Bread data breach?
ShinyHunters added Panera Bread to its data leak site earlier this year, initially claiming it had stolen more than 14 million customer records. According to the group, the stolen data includes names, email addresses, phone numbers, home addresses and account-related information.
Panera Bread has since confirmed a cybersecurity incident. In a statement to media outlets, the company described the exposed data as customer “contact information” and said it has contacted law enforcement and taken steps to address the incident. Panera has not shared technical details about how the attack occurred or whether customers need to take specific actions.
Even “contact information” can be dangerous in the wrong hands. When combined, these details can be used for identity theft, targeted phishing and highly convincing social-engineering scams.
ShinyHunters claims the attackers accessed Panera’s systems through Microsoft Entra single sign-on (SSO). While Panera has not confirmed that claim, it closely mirrors recent warnings from Okta about a surge in voice-phishing attacks targeting SSO platforms.
In these attacks, criminals pose as IT or helpdesk staff and call employees directly. They pressure targets to approve authentication requests or enter login credentials on fake SSO pages. Once attackers capture session tokens or credentials, they can bypass some forms of multifactor authentication and move laterally through company systems. This approach relies on human trust rather than technical exploits, making it increasingly effective.
How many people were actually affected?
At first glance, claims that 14 million customers were affected suggested an enormous breach. However, researchers at Have I Been Pwned? later clarified that the attackers stole 14 million records, not data tied to 14 million unique individuals.
After reviewing the leaked dataset, researchers now estimate the breach affected approximately 5.1 million unique people. The exposed information includes email addresses along with associated names, phone numbers, and physical addresses.
That distinction matters, but it does not eliminate risk. Once stolen data is released publicly, it can spread quickly across criminal forums and be reused for years.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
The hacking group ShinyHunters leaked stolen Panera customer data online after an attempted extortion failed. (Panera Bread)
Hackers leaked the data after extortion failed
ShinyHunters reportedly attempted to extort Panera Bread before publishing the stolen data. When those efforts failed, the group released a 760MB archive containing millions of customer records on its leak site.
This reflects a broader shift in cybercrime. Instead of locking systems with ransomware, many groups now focus on quietly stealing data and threatening public exposure. These attacks are faster, harder to detect, and often just as profitable.
ShinyHunters has used similar tactics in other high-profile incidents involving Bumble, Match Group, Crunchbase and other consumer platforms.
Lawsuits filed after Panera breach disclosure
The breach has already triggered legal fallout. Multiple class-action lawsuits have been filed in U.S. federal court, alleging that Panera failed to adequately protect customer data.
The lawsuits claim Panera knew or should have known about security weaknesses and seek damages, improved security practices, and long-term identity theft protection for affected customers. Panera has not publicly commented on the litigation.
A troubling pattern for Panera Bread
This is not Panera Bread’s first major security lapse. In 2018, a cybersecurity researcher revealed that Panera had left millions of customer records exposed online in plain text. That incident later led to lawsuits and settlements.
Repeated breaches often point to deeper challenges. Large organizations can struggle to secure cloud services, identity systems, and employee access at scale. When attackers target identity platforms instead of infrastructure, a single mistake can expose millions of records.
We reached out to Panera Bread for a comment, but did not hear back before our deadline.
GRUBHUB CONFIRMS DATA BREACH AMID EXTORTION CLAIMS
Exposed contact details like names, emails, and addresses can fuel phishing scams and identity theft long after a breach becomes public. (Donato Fasano/Getty Images)
7 steps you can take to protect yourself following the Panera data breach
When a major consumer brand suffers a breach, customers often don’t realize the risk until weeks or months later. These steps help limit what attackers can do with your information if your Panera data falls into the wrong hands.
1) Use a strong, unique password for every account
If you ever created a Panera Bread account, reset its password immediately. If you reused that password anywhere else, those accounts are now at risk, too. Attackers routinely test breached passwords across email, shopping and banking sites.
A password manager helps by generating strong, unique passwords for every account and storing them securely so you never need to reuse credentials. Many password managers also alert you if your email or passwords appear in known data breaches, giving you an early warning to lock things down fast.
Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
2) Enable two-factor authentication (2FA) wherever possible
Two-factor authentication (2FA) adds a second step to the login process, usually through an app or device you control. Even if someone gets your password through phishing or a breach, 2FA makes it much harder for them to access your account.
3) Be cautious of phishing messages
Cybercriminals often follow up breaches with fake emails or in-app messages pretending to offer help or security updates. Always double-check the sender and avoid clicking links. When in doubt, open the app or website directly rather than responding to the message. Using strong antivirus software adds another layer of protection by flagging malicious links and blocking known threats before they can do harm. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) Limit the personal details you share
When names, email addresses, phone numbers and physical addresses are exposed, identity theft becomes a real risk. Identity theft-protection services monitor your personal information, alert you if it appears on the dark web, and watch for attempts to open new accounts in your name.
If something does go wrong, these services often include recovery support to help freeze accounts, dispute fraud, and guide you through the cleanup process.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
5) Reduce your digital footprint with a data removal service
Scammers don’t rely on one breach alone. They combine leaked data with information from data broker sites to build detailed profiles. Data removal services help remove your phone number, home address and other personal details from hundreds of these sites.
While no service can erase everything, reducing what’s publicly available makes it much harder for criminals to target you with convincing scams or identity fraud. This is one of the most effective long-term ways to lower your risk after any major breach.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Secure your email account
Your email account controls password resets for most services. Protect it with a strong password and 2FA. Regularly review login activity and recovery settings, so attackers can’t use your email to take over other accounts.
7) Watch for account changes after breach news
Not every breach leads to immediate account takeovers. In some cases, attackers quietly test access weeks later. That is why staying alert after breach reports matters. Watch for password reset emails you did not request, profile changes you did not make, or new messages you did not send. Unexpected logouts or security alerts are also red flags. If you notice anything unusual, change your password immediately and review your security settings.
Kurt’s key takeaway
The Panera Bread data breach is another reminder that even familiar brands can become major cyber targets. While Panera says only contact information was exposed, that data is often enough to fuel scams and identity theft long after headlines fade. Staying proactive after breach news is now part of protecting your digital life.
Do you still trust large brands to protect your personal information, or have repeated breaches changed how much data you’re willing to share? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
It’s MAGA v Broligarch in the battle over prediction markets
Hello and welcome to Regulator, a newsletter for Verge subscribers about the love-hate (but mostly hate) relationship between Silicon Valley and Washington. I hope everyone got to celebrate George Washington’s birthday in their preferred manner: skiing, staycationing, subscribing to The Verge if you haven’t already, etc.
Prediction: this is going to be a mess
Political alliances are rarely permanent, so it’s somewhat predictable that the MAGA-tech bro alliance seems to have fallen apart in the span of a single year. Which side the administration would actually choose, though, was more difficult to foresee.
Last winter, it appeared that two groups were in a tenuous relationship, held together by Elon Musk’s shameless execution of the DOGE agenda and Big Tech signing massive checks to settle Donald Trump’s lawsuits against them. But last night, the Trump administration made a choice: the money. The Commodity Futures Trading Commission (CFTC) announced that they would sue any state who tried to regulate prediction markets like Kalshi — even the Republican states.
On Tuesday, the CFTC filed an amicus brief to the Ninth Circuit Court of Appeals, officially opposing an onslaught of lawsuits filed by the states against betting markets like Kalshi, Polymarket, Coinbase, and Crypto.com. (The latter two, known primarily as cryptocurrency exchanges, have partnered with Kalshi and created a standalone prediction market called OG, respectively.) But unusually, the brief was accompanied by a threat — posted on X, of all places. In a video directly facing the camera posted on Tuesday night, sole CFTC chairman Michael Selig asserted his commission’s authority to regulate prediction markets and stated that the federal government was prepared to sue: “To those who seek to challenge our authority in this space, let me be clear: we will see you in court.”
Had Selig simply written a staid Wall Street Journal op-ed asserting the CFTC’s authority (which he also did), that would have barely raised an eyebrow. But in 2026, a video threat, especially one posted on X, is basically grounds to instigate a political firestorm — one that Spencer Cox, the Republican Governor of Utah, gladly kindled. “Mike, I appreciate you attempting this with a straight face, but I don’t remember the CFTC having authority over the ‘derivative market’ of LeBron James rebounds,” he posted in response (also on X). “These prediction markets you are breathlessly defending are gambling—pure and simple. They are destroying the lives of families and countless Americans, especially young men. They have no place in Utah.” He promised that Utah would continue to pursue litigation and beat the federal government in court if need be.
This wouldn’t be the first time that Utah and Cox have voiced their opposition to federal overreach regarding emerging technology. Last year, they publicly opposed an executive order that would have given the Justice Department the power to sue states passing and enforcing AI regulatory laws. The prediction markets issue hits a particular nerve in Utah: nearly half of the state is Mormon, and the Church of Jesus Christ of Latter-day Saints officially opposes all government-sanctioned forms of gambling, even state lotteries. But Cox’s declaration is what’s known in political circles as a “weathervane”: if one deeply Republican state is pushing back against the Trump administration on a new front, who else on the right might follow suit — and what sorts of new broligarch technologies would they fight against?
Is it a coincidence that Anthropic CEO Dario Amodei’s big visit to Washington happened just as the Pentagon was reconsidering its relationship with the AI company? Over the past two weeks, Amodei published a 38-page letter to Congress warning of the rising existential risks of artificial intelligence, conducted an interview with Axios’s Mike Allen (and sponsored their newsletter), and met with Sens. Elizabeth Warren (D-MA) and Jim Banks (R-IN) on Capitol Hill to support their bill banning the sale of advanced AI chips to China.
But Amodei barely finished his capitol blitz when Axios broke the news over the weekend that the Pentagon wasn’t just impatient with Anthropic’s reticence to use Claude for unrestricted purposes, but that it would actively punish Anthropic for refusing to cooperate by designating them a “supply-chain risk.” If it goes through, any company that wants to work with the military would have to cut ties with Anthropic. As one Pentagon official described it, “It will be an enormous pain in the ass to disentangle, and we are going to make sure they pay a price for forcing our hand like this.”
The Pentagon’s move makes no sense for anyone who sees Claude as a superior AI enterprise product to its competitors at the Pentagon (Gemini, ChatGPT, and Grok). If viewed through the lens of every former interaction that Trump’s had with companies that voiced ideological opposition to his agenda however, their treatment of Anthropic is par for the course. Years ago, for instance, Trump threatened to cut off Amazon’s access to their sweetheart deal with the US Postal Service, in retaliation for Jeff Bezos’ ownership of the then highly critical Washington Post.
But for me, the question is: exactly what caused the ideological break, and how much of it was even about national security? In the past few months, there’s been a bizarre spurt of online messaging from right-wing influencers trying to claim that Anthropic, of all the AI companies, was too woke — the kind of woke that could convince kids to become trans, or DEI-pill them, or whatever lib-coded nightmares a MAGA personality could dream up. There wasn’t much proof that they could point to, other than its employees expressing opinions that could be lib-coded, if you’re not fully reading the entire tweet:
Screenshot va @KatieMiller/X.
Speaking of influencers eating their own:
- Steve Bannon is under MAGA siege for his 2018 texts with Jeffrey Epstein, newly unearthed from the Justice Department’s Epstein Files, wherein he suggested that Trump should be removed from office using the 25th Amendment. Influencers calling for him to be questioned include Rep. Marjorie Taylor Greene, who broke from Trump and the GOP for trying to bury the Epstein Files, and retired Gen. Mike Flynn. Notably, both of them rose to prominence in 2020 by backing QAnon, the online conspiracy theory that claimed that an elite ring of Satan-worshipping pedophiles were in control of the government. (It may not help Bannon that he called Epstein “God” in one of the texts).
- Mike Davis, an anti-Big Tech lawyer who previously represented Trump in his lawsuits against Meta, took credit for the ouster of former friend and ally Gail Slater from the Department of Justice’s antitrust division, according to texts obtained by The Free Press. Though the two were once allies due to their shared interest in holding Big Tech accountable, their relationship started fracturing over disagreements about when to enforce antitrust laws and when to go for settlements.
- And we’re back to Bannon: per The Bulwark, he and fellow MAGA political operative Boris Epshteyn are being sued for their own shady cryptocurrency operation.
The White House is convening a third meeting between the crypto industry and the banking industry this week, continuing to hash out which major financial entity gets to reap the interests from yield-bearing stablecoin accounts (or if they get to bear interest at all). They have until March 1st to deliver draft language for the Senate. Good luck, y’all!
And finally, looksmaxxing Recess.
Can we all agree that HHS Secretary Robert F. Kennedy is framemogging Kid Rock in this video?
See you next week, and send all tips to every way that we list here.
-
Oklahoma2 days agoWildfires rage in Oklahoma as thousands urged to evacuate a small city
-
Health1 week agoJames Van Der Beek shared colorectal cancer warning sign months before his death
-
Science1 week agoA SoCal beetle that poses as an ant may have answered a key question about evolution
-
Movie Reviews1 week ago“Redux Redux”: A Mind-Blowing Multiverse Movie That Will Make You Believe in Cinema Again [Review]
-
Technology1 week agoHP ZBook Ultra G1a review: a business-class workstation that’s got game
-
Politics1 week agoCulver City, a crime haven? Bondi’s jab falls flat with locals
-
Politics1 week agoTim Walz demands federal government ‘pay for what they broke’ after Homan announces Minnesota drawdown
-
Fitness1 week ago‘I Keep Myself Very Fit’: Rod Stewart’s Age-Defying Exercise Routine at 81