WIRED
For Future Reference.
Read our latest ⬇️
New Yorkers have known for a long time that going to a game or concert at Madison Square Garden meant surrendering some privacy. That, as you watched the show, the Garden in a real sense watched you.
Owner James Dolan has watchlists of basketball fans who dared criticize his management. He keeps a close eye on his other venues too, including Radio City Music Hall and The Sphere in Las Vegas.
For this story, WIRED goes deep inside the security operation that allegedly tracked a trans woman, lawyers, protesters, and more. We spoke with seven current and former employees of Dolan’s security service, and we reviewed some of their confidential internal reports and Signal group chat messages.
Tap the 🔗 in bio to read the full story and watch or listen to the accompanying episode from @PabloTorreFindsOut.
🎨: @bypatrikas

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.

The news business isn’t just any business — it serves a vital role in our democracy, recognized by the First Amendment. But media outlets can’t serve that role if they’re bankrupt. And as a result, news readers often find themselves blocked by paywalls from reading important stories about government business.
"That experience is particularly frustrating for readers who are unable to access the groundbreaking investigative reports outlets like Wired magazine have been publishing, particularly over the first couple months of the Trump administration," the Freedom of the Press Foundation release reads. "Fortunately, Wired has a solution — it’s going to stop paywalling articles that are primarily based on public records obtained through the Freedom of Information Act."
Access to journalism based on public records is more important than ever at this moment, with government websites and records disappearing, DOGE doing its best to operate outside the public’s view, and the National Archive in disarray.
We’re excited to be the first publication to partner with @freedomofthepressfoundation to offer this for our new coverage. And if you want to support our journalism directly, you can do so by tapping the 🔗 in bio to subscribe.
In an unexpected turn, the two companies signed a deal for Anthropic to use computing resources from Elon Musk’s xAI. What’s going on?
Tap the 🔗 in bio for more.

The Pentagon released a batch of much-anticipated files about unidentified anomalous phenomena (UAP) on Friday including newly declassified documents that have never been seen by the public before.
The release of roughly 160 documents was rolled out on a new website. Among the trove is video footage and images of tantalizing UAP sightings captured around the world. The files also contain scanned historical material about government UAP and unidentified flying object (UFO) programs dating back to the 1940s and the Apollo program.
While it will take days to comb through the finer details, initial highlights include sightings of “orbs launching orbs” by federal employees in the western US in 2023, a “misshapen and uneven ball of white light” reported by the US military in Syria in 2024, and a compendium of UAP reports from the public during the late 1940s, handwritten or produced by typewriter. The files contain accounts of UAP from the Apollo crews, including a light flash on the lunar surface during Apollo 17.
Some of the visuals include an amoeba-like shape captured by the US Indo-Pacific Command in 2024, a bright round shape filmed by the US Central Command in 2024, and unidentified lights in a picture taken by the Apollo 17 crew from the surface of the Moon.
Tap the 🔗 in bio to read the full story.
In an interview with WIRED ahead of her new concert film “Hit Me Hard and Soft: The Tour (Live in 3D),” @billieeilish talked about whether or not future artists will be able to leverage SoundCloud the way she did.
Interview by Angela Watercutter
Video Produced by @AlanaMYzola
Photo: Aldo Chacon and @djacks.jpg
Tap the 🔗 in bio for more.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.

Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States.
The widely used digital learning platform Canvas was put into “maintenance mode” on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments.
In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though.
In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had “recently experienced a cybersecurity incident perpetrated by a criminal threat actor.” He added on May 2 that “the information involved” for “users at affected institutions” included names, email addresses, student ID numbers, and messages exchanged by users on the platform.
The situation was ultimately marked as “Resolved” on Wednesday. At midday on Thursday, though, the Instructure status page registered an “issue” where “some users are having difficulties logging into Student ePortfolios.” Within a few hours, the company had added another status update: “Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode.” Late Thursday evening, the company said that Canvas was available again “for most users.”
Tap the 🔗 in bio to read the full story.
What do you love about coffee? Is it the caffeine boost in the morning, the creamy sweetness of a cappuccino or latte, the bucket of filter coffee you can sip on all day, or the quick kick of a good espresso? Or is it the zen-like ritual of it all, the measuring of beans and the precision of the perfect extraction?
If the marketing hype is to be believed, you can have it all, thanks to the best in fully automatic coffee machines. These compact countertop cafés promise to deliver a vast menu of drinks at the touch of a button, all with no barista prowess needed. But are the brews actually any good?
WIRED tests a lot of coffee machines—productivity would grind to a halt if we stopped. But for this group blind test, we wanted to see what coffee professionals thought of the drinks produced by the “best” in fully automatic machines, without being influenced by any fancy design or brand awareness. We blindfolded our experts so they couldn’t see which machine was making which coffee, but let them take the blindfolds off so a) they could assess the drinks on looks, and b) not burn themselves.
By the end of our experiment, it was clear that while money can buy you endless choice and push-button convenience, it doesn’t necessarily guarantee barista-grade, café-quality coffee at home.
Tap the 🔗 in bio for more.
This week, the team discusses exactly what is going on with the hantavirus outbreak, and whether we should be worried. Subscribe to or follow Uncanny Valley wherever you get your podcasts.
#UncannyValley
The first two episodes of Robert F. Kennedy Jr.’s new podcast feature him discoursing on food with a reality-TV chef and, for some reason, Mike Tyson. Vaccines are not on the agenda.
Tap the 🔗 in bio for more.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.

In recent weeks both MAGA and left-wing influencers have found something they agree on: President Donald Trump, they say, is staging his own assassination attempts.
Within minutes of the Secret Service detaining an alleged attacker at the White House Correspondents’ Dinner on April 25, social media was flooded with baseless claims the attack was “STAGED.”
In the days since, these claims have led some prominent pundits and creators to reassess the 2024 assassination attempt on Trump’s life in Butler, Pennsylvania, with many alleging, without evidence, that it was also staged.
Bluesky, X, and TikTok are filled with comments related to Butler and the WHCD, with an endless feed of posts and videos claiming that the Correspondents’ Dinner incident is further proof that the Butler assassination was staged. Novelist Joyce Carol Oates, who in recent weeks has posted extensively about whether or not Butler was staged, wrote on X last week, “We can see now, placing Butler PA & the WH correspondents incident side by side, that the same scenario was planned in each instance.”
WIRED has looked at the main claims that conspiracy theorists point to when claiming both the Butler and Correspondents’ Dinner shootings were staged, and why none of the claims stand up to scrutiny.
Tap the 🔗 in bio to read the full story.
New research suggests that reliance on AI assistants can have a negative impact on people’s ability to think and problem solve. Tap the 🔗 in bio for more.
A humanoid robot has pledged to devote itself to Buddhism as it was ordained as a monk during a ceremony in South Korea.
The robot, which appears to be a Unitree G1 platform, appeared for the first time at a temple in Seoul administered by the Joyge Order, the country’s largest Buddhist sect.
According to South Korea’s Yonhap news agency, the robot was given the name “Gabi,” which derives from the Korean word for “mercy.” The Unitree G1 platform can act autonomously, but it was not clear whether the robot was being teleoperated when it became the first humanoid robot to take part in the ritual.
Instagram Hikaye Görüntüleyici, Instagram hikayelerini, videoları, fotoğrafları veya IGTV'yi gizlice izleyip kaydetmenizi sağlayan basit bir araçtır. Bu hizmetle, içerikleri indirip istediğiniz zaman çevrimdışı olarak keyfini çıkarabilirsiniz. Instagram'da daha sonra görmek istediğiniz bir şey bulduysanız veya anonim kalmak isterseniz, bizim Görüntüleyicimiz sizin için mükemmeldir. Anonstories, kimliğinizi gizli tutmak için mükemmel bir çözüm sunar. Instagram, Hikaye özelliğini Ağustos 2023'te başlatmış ve bu format, etkileşimi yüksek ve zaman sınırlı olduğu için hızla diğer platformlar tarafından benimsenmiştir. Hikayeler, kullanıcıların hızlı güncellemeler paylaşmasını sağlar; fotoğraflar, videolar veya selfie'ler, metin, emojiler veya filtrelerle zenginleştirilmiş ve sadece 24 saat görünür. Bu sınırlı süre, normal gönderilere göre yüksek etkileşim yaratır. Bugünlerde, Hikayeler sosyal medyada bağlantı kurmanın ve iletişim kurmanın en popüler yollarından biridir. Ancak, bir Hikaye görüntülediğinizde, yaratıcısı adınızı görüntüleyici listesinde görebilir ki bu da gizlilik endişesi yaratabilir. Peki ya Hikayeleri fark edilmeden görüntülemek isterseniz? İşte burada Anonstories devreye girer. Kimliğinizi ifşa etmeden, kamuya açık Instagram içeriğini izlemenizi sağlar. Sadece merak ettiğiniz profilin kullanıcı adını girin, araç size en son Hikayelerini gösterecektir. Anonstories Görüntüleyicisinin Özellikleri: - Anonim Tarama: Hikayeleri görüntüleyici listesine düşmeden izleyin. - Hesap Gerekmez: Instagram hesabı oluşturmadan kamuya açık içeriği görüntüleyin. - İçerik İndirme: Hikaye içeriklerini cihazınıza indirip çevrimdışı olarak kullanabilirsiniz. - Öne Çıkanlar Görüntüleme: Instagram Öne Çıkanlarına erişin, 24 saatlik süreyi aşarak da. - Yeniden Paylaşım Takibi: Kişisel profillerin Hikayeleri üzerindeki paylaşımları veya etkileşim seviyelerini takip edin. Kısıtlamalar: - Bu araç yalnızca açık hesaplarla çalışır; özel hesaplar erişilemez. Yararları: - Gizlilik Dostu: Herhangi bir Instagram içeriğini fark edilmeden izleyin. - Basit ve Kolay: Uygulama yükleme veya kayıt gerekmez. - Özel Araçlar: Instagram’ın sunmadığı şekilde içerik indirme ve yönetme.
Instagram güncellemelerini gizlice takip edin, gizliliğinizi koruyun ve anonim kalın.
Özel Profil Görüntüleyicisi ile profilleri ve fotoğrafları anonim olarak kolayca görüntüleyin.
Bu ücretsiz araç, hikaye yükleyicisine görünmeden Instagram Hikayelerini anonim olarak görüntülemenizi sağlar.
Anonstories, kullanıcıların Instagram hikayelerini yaratıcıyı uyarmadan görüntülemelerini sağlar.
iOS, Android, Windows, macOS ve Chrome ile Safari gibi modern tarayıcılarda sorunsuz çalışır.
Giriş bilgisi gerektirmeden güvenli, anonim taramayı ön planda tutar.
Kullanıcılar, sadece bir kullanıcı adı girerek halka açık hikayeleri görüntüleyebilir—hesap gerekmez.
Fotoğrafları (JPEG) ve videoları (MP4) kolayca indirir.
Hizmet ücretsizdir.
Özel hesaplardan içerikler yalnızca takipçiler tarafından erişilebilir.
Dosyalar yalnızca kişisel veya eğitimsel kullanım içindir ve telif hakkı kurallarına uymalıdır.
Bir kamu kullanıcı adı girin, hikayeleri görüntüleyin veya indirin. Hizmet, içeriği yerel olarak kaydetmek için doğrudan bağlantılar oluşturur.