WIRED
For Future Reference.
Read our latest ⬇️
New Yorkers have known for a long time that going to a game or concert at Madison Square Garden meant surrendering some privacy. That, as you watched the show, the Garden in a real sense watched you.
Owner James Dolan has watchlists of basketball fans who dared criticize his management. He keeps a close eye on his other venues too, including Radio City Music Hall and The Sphere in Las Vegas.
For this story, WIRED goes deep inside the security operation that allegedly tracked a trans woman, lawyers, protesters, and more. We spoke with seven current and former employees of Dolan’s security service, and we reviewed some of their confidential internal reports and Signal group chat messages.
Tap the 🔗 in bio to read the full story and watch or listen to the accompanying episode from @PabloTorreFindsOut.
🎨: @bypatrikas

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.
In an unexpected turn, the two companies signed a deal for Anthropic to use computing resources from Elon Musk’s xAI. What’s going on?
Tap the 🔗 in bio for more.

The Pentagon released a batch of much-anticipated files about unidentified anomalous phenomena (UAP) on Friday including newly declassified documents that have never been seen by the public before.
The release of roughly 160 documents was rolled out on a new website. Among the trove is video footage and images of tantalizing UAP sightings captured around the world. The files also contain scanned historical material about government UAP and unidentified flying object (UFO) programs dating back to the 1940s and the Apollo program.
While it will take days to comb through the finer details, initial highlights include sightings of “orbs launching orbs” by federal employees in the western US in 2023, a “misshapen and uneven ball of white light” reported by the US military in Syria in 2024, and a compendium of UAP reports from the public during the late 1940s, handwritten or produced by typewriter. The files contain accounts of UAP from the Apollo crews, including a light flash on the lunar surface during Apollo 17.
Some of the visuals include an amoeba-like shape captured by the US Indo-Pacific Command in 2024, a bright round shape filmed by the US Central Command in 2024, and unidentified lights in a picture taken by the Apollo 17 crew from the surface of the Moon.
Tap the 🔗 in bio to read the full story.
In an interview with WIRED ahead of her new concert film “Hit Me Hard and Soft: The Tour (Live in 3D),” @billieeilish talked about whether or not future artists will be able to leverage SoundCloud the way she did.
Interview by Angela Watercutter
Video Produced by @AlanaMYzola
Photo: Aldo Chacon and @djacks.jpg
Tap the 🔗 in bio for more.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.
What do you love about coffee? Is it the caffeine boost in the morning, the creamy sweetness of a cappuccino or latte, the bucket of filter coffee you can sip on all day, or the quick kick of a good espresso? Or is it the zen-like ritual of it all, the measuring of beans and the precision of the perfect extraction?
If the marketing hype is to be believed, you can have it all, thanks to the best in fully automatic coffee machines. These compact countertop cafés promise to deliver a vast menu of drinks at the touch of a button, all with no barista prowess needed. But are the brews actually any good?
WIRED tests a lot of coffee machines—productivity would grind to a halt if we stopped. But for this group blind test, we wanted to see what coffee professionals thought of the drinks produced by the “best” in fully automatic machines, without being influenced by any fancy design or brand awareness. We blindfolded our experts so they couldn’t see which machine was making which coffee, but let them take the blindfolds off so a) they could assess the drinks on looks, and b) not burn themselves.
By the end of our experiment, it was clear that while money can buy you endless choice and push-button convenience, it doesn’t necessarily guarantee barista-grade, café-quality coffee at home.
Tap the 🔗 in bio for more.
This week, the team discusses exactly what is going on with the hantavirus outbreak, and whether we should be worried. Subscribe to or follow Uncanny Valley wherever you get your podcasts.
#UncannyValley
The first two episodes of Robert F. Kennedy Jr.’s new podcast feature him discoursing on food with a reality-TV chef and, for some reason, Mike Tyson. Vaccines are not on the agenda.
Tap the 🔗 in bio for more.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.
New research suggests that reliance on AI assistants can have a negative impact on people’s ability to think and problem solve. Tap the 🔗 in bio for more.
A humanoid robot has pledged to devote itself to Buddhism as it was ordained as a monk during a ceremony in South Korea.
The robot, which appears to be a Unitree G1 platform, appeared for the first time at a temple in Seoul administered by the Joyge Order, the country’s largest Buddhist sect.
According to South Korea’s Yonhap news agency, the robot was given the name “Gabi,” which derives from the Korean word for “mercy.” The Unitree G1 platform can act autonomously, but it was not clear whether the robot was being teleoperated when it became the first humanoid robot to take part in the ritual.
The Instagram Story Viewer is an easy tool that lets you secretly watch and save Instagram stories, videos, photos, or IGTV. With this service, you can download content and enjoy it offline whenever you like. If you find something interesting on Instagram that you’d like to check out later or want to view stories while staying anonymous, our Viewer is perfect for you. Anonstories offers an excellent solution for keeping your identity hidden. Instagram first launched the Stories feature in August 2023, which was quickly adopted by other platforms due to its engaging, time-sensitive format. Stories let users share quick updates, whether photos, videos, or selfies, enhanced with text, emojis, or filters, and are visible for only 24 hours. This limited time frame creates high engagement compared to regular posts. In today’s world, Stories are one of the most popular ways to connect and communicate on social media. However, when you view a Story, the creator can see your name in their viewer list, which may be a privacy concern. What if you wish to browse Stories without being noticed? Here’s where Anonstories becomes useful. It allows you to watch public Instagram content without revealing your identity. Simply enter the username of the profile you’re curious about, and the tool will display their latest Stories. Features of Anonstories Viewer: - Anonymous Browsing: Watch Stories without showing up on the viewer list. - No Account Needed: View public content without signing up for an Instagram account. - Content Download: Save any Stories content directly to your device for offline use. - View Highlights: Access Instagram Highlights, even beyond the 24-hour window. - Repost Monitoring: Track the reposts or engagement levels on Stories for personal profiles. Limitations: - This tool works only with public accounts; private accounts remain inaccessible. Benefits: - Privacy-Friendly: Watch any Instagram content without being noticed. - Simple and Easy: No app installation or registration required. - Exclusive Tools: Download and manage content in ways Instagram doesn’t offer.
Keep track of Instagram updates discreetly while protecting your privacy and staying anonymous.
View profiles and photos anonymously with ease using the Private Profile Viewer.
This free tool allows you to view Instagram Stories anonymously, ensuring your activity remains hidden from the story uploader.
Anonstories lets users view Instagram stories without alerting the creator.
Works seamlessly on iOS, Android, Windows, macOS, and modern browsers like Chrome and Safari.
Prioritizes secure, anonymous browsing without requiring login credentials.
Users can view public stories by simply entering a username—no account needed.
Downloads photos (JPEG) and videos (MP4) with ease.
The service is free to use.
Content from private accounts can only be accessed by followers.
Files are for personal or educational use only and must comply with copyright rules.
Enter a public username to view or download stories. The service generates direct links for saving content locally.