WIRED
For Future Reference.
Read our latest ⬇️
New Yorkers have known for a long time that going to a game or concert at Madison Square Garden meant surrendering some privacy. That, as you watched the show, the Garden in a real sense watched you.
Owner James Dolan has watchlists of basketball fans who dared criticize his management. He keeps a close eye on his other venues too, including Radio City Music Hall and The Sphere in Las Vegas.
For this story, WIRED goes deep inside the security operation that allegedly tracked a trans woman, lawyers, protesters, and more. We spoke with seven current and former employees of Dolan’s security service, and we reviewed some of their confidential internal reports and Signal group chat messages.
Tap the 🔗 in bio to read the full story and watch or listen to the accompanying episode from @PabloTorreFindsOut.
🎨: @bypatrikas

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.
In an unexpected turn, the two companies signed a deal for Anthropic to use computing resources from Elon Musk’s xAI. What’s going on?
Tap the 🔗 in bio for more.

The Pentagon released a batch of much-anticipated files about unidentified anomalous phenomena (UAP) on Friday including newly declassified documents that have never been seen by the public before.
The release of roughly 160 documents was rolled out on a new website. Among the trove is video footage and images of tantalizing UAP sightings captured around the world. The files also contain scanned historical material about government UAP and unidentified flying object (UFO) programs dating back to the 1940s and the Apollo program.
While it will take days to comb through the finer details, initial highlights include sightings of “orbs launching orbs” by federal employees in the western US in 2023, a “misshapen and uneven ball of white light” reported by the US military in Syria in 2024, and a compendium of UAP reports from the public during the late 1940s, handwritten or produced by typewriter. The files contain accounts of UAP from the Apollo crews, including a light flash on the lunar surface during Apollo 17.
Some of the visuals include an amoeba-like shape captured by the US Indo-Pacific Command in 2024, a bright round shape filmed by the US Central Command in 2024, and unidentified lights in a picture taken by the Apollo 17 crew from the surface of the Moon.
Tap the 🔗 in bio to read the full story.
In an interview with WIRED ahead of her new concert film “Hit Me Hard and Soft: The Tour (Live in 3D),” @billieeilish talked about whether or not future artists will be able to leverage SoundCloud the way she did.
Interview by Angela Watercutter
Video Produced by @AlanaMYzola
Photo: Aldo Chacon and @djacks.jpg
Tap the 🔗 in bio for more.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.
What do you love about coffee? Is it the caffeine boost in the morning, the creamy sweetness of a cappuccino or latte, the bucket of filter coffee you can sip on all day, or the quick kick of a good espresso? Or is it the zen-like ritual of it all, the measuring of beans and the precision of the perfect extraction?
If the marketing hype is to be believed, you can have it all, thanks to the best in fully automatic coffee machines. These compact countertop cafés promise to deliver a vast menu of drinks at the touch of a button, all with no barista prowess needed. But are the brews actually any good?
WIRED tests a lot of coffee machines—productivity would grind to a halt if we stopped. But for this group blind test, we wanted to see what coffee professionals thought of the drinks produced by the “best” in fully automatic machines, without being influenced by any fancy design or brand awareness. We blindfolded our experts so they couldn’t see which machine was making which coffee, but let them take the blindfolds off so a) they could assess the drinks on looks, and b) not burn themselves.
By the end of our experiment, it was clear that while money can buy you endless choice and push-button convenience, it doesn’t necessarily guarantee barista-grade, café-quality coffee at home.
Tap the 🔗 in bio for more.
This week, the team discusses exactly what is going on with the hantavirus outbreak, and whether we should be worried. Subscribe to or follow Uncanny Valley wherever you get your podcasts.
#UncannyValley
The first two episodes of Robert F. Kennedy Jr.’s new podcast feature him discoursing on food with a reality-TV chef and, for some reason, Mike Tyson. Vaccines are not on the agenda.
Tap the 🔗 in bio for more.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.
New research suggests that reliance on AI assistants can have a negative impact on people’s ability to think and problem solve. Tap the 🔗 in bio for more.
A humanoid robot has pledged to devote itself to Buddhism as it was ordained as a monk during a ceremony in South Korea.
The robot, which appears to be a Unitree G1 platform, appeared for the first time at a temple in Seoul administered by the Joyge Order, the country’s largest Buddhist sect.
According to South Korea’s Yonhap news agency, the robot was given the name “Gabi,” which derives from the Korean word for “mercy.” The Unitree G1 platform can act autonomously, but it was not clear whether the robot was being teleoperated when it became the first humanoid robot to take part in the ritual.
Instagram Story Viewer to proste narzędzie, które pozwala na ciche oglądanie i zapisywanie historii Instagram, filmów, zdjęć lub IGTV. Dzięki tej usłudze możesz pobrać zawartość i cieszyć się nią offline, kiedy chcesz. Jeśli znajdziesz coś interesującego na Instagramie, co chcesz sprawdzić później, lub chcesz oglądać historie pozostając anonimowym, nasz Viewer jest idealny dla Ciebie. Anonstories oferuje doskonałe rozwiązanie do ukrywania swojej tożsamości. Instagram po raz pierwszy uruchomił funkcję historii w sierpniu 2023 roku, która szybko została zaadoptowana przez inne platformy ze względu na jej angażujący, czasowo ograniczony format. Historie pozwalają użytkownikom dzielić się szybkimi aktualizacjami, czy to zdjęciami, filmami, czy selfie, wzbogaconymi o tekst, emotikony lub filtry, i są widoczne tylko przez 24 godziny. Ten ograniczony czas sprawia, że historie cieszą się dużym zaangażowaniem w porównaniu do zwykłych postów. W dzisiejszym świecie historie to jeden z najpopularniejszych sposobów komunikacji na mediach społecznościowych. Jednak gdy oglądasz historię, twórca może zobaczyć Twoje imię na liście oglądających, co może stanowić problem związany z prywatnością. Co jeśli chcesz przeglądać historie, nie będąc zauważonym? Tutaj Anonstories staje się przydatne. Umożliwia oglądanie publicznej zawartości Instagram bez ujawniania tożsamości. Wystarczy wpisać nazwę użytkownika profilu, który Cię interesuje, a narzędzie wyświetli ich najnowsze historie. Cechy Anonstories Viewer: - Anonimowe przeglądanie: Oglądaj historie bez pojawiania się na liście oglądających. - Brak konta: Oglądaj publiczną zawartość bez logowania się na konto Instagram. - Pobieranie zawartości: Zapisuj dowolną zawartość historii bezpośrednio na swoje urządzenie do użytku offline. - Przeglądaj najważniejsze: Dostęp do Instagram Highlights, nawet po 24 godzinach. - Monitorowanie repostów: Śledź reposty lub poziom zaangażowania w historię na prywatnych profilach. Ograniczenia: - Narzędzie działa tylko z publicznymi kontami; konta prywatne pozostają niedostępne. Korzyści: - Przyjazne dla prywatności: Oglądaj zawartość Instagram bez bycia zauważonym. - Proste i łatwe: Brak potrzeby instalacji aplikacji lub rejestracji. - Ekskluzywne narzędzia: Pobieraj i zarządzaj zawartością w sposób, którego Instagram nie oferuje.
Śledź aktualizacje na Instagramie dyskretnie, chroniąc swoją prywatność i pozostając anonimowym.
Oglądaj profile i zdjęcia anonimowo za pomocą Prywatnego Viewera.
To darmowe narzędzie pozwala oglądać historie Instagram anonimowo, zapewniając, że Twoja aktywność pozostaje ukryta przed twórcą historii.
Anonstories pozwala użytkownikom oglądać historie na Instagramie bez informowania twórcy.
Funkcjonuje płynnie na iOS, Android, Windows, macOS i nowoczesnych przeglądarkach takich jak Chrome i Safari.
Priorytetem jest bezpieczne, anonimowe przeglądanie bez konieczności logowania się.
Użytkownicy mogą oglądać publiczne historie, wpisując nazwę użytkownika – bez konieczności zakładania konta.
Pobiera zdjęcia (JPEG) i filmy (MP4) z łatwością.
Usługa jest bezpłatna.
Treści z prywatnych kont mogą być dostępne tylko dla obserwujących.
Pliki są przeznaczone do użytku osobistego lub edukacyjnego i muszą być zgodne z przepisami dotyczącymi praw autorskich.
Wpisz publiczną nazwę użytkownika, aby oglądać lub pobrać historie. Usługa generuje bezpośrednie linki do zapis