<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Crofton Black - Freelance Contributor]]></title>
        <description><![CDATA[Crofton Black - Freelance Contributor]]></description>
        <link>https://www.bloomberg.com/authors/AViyAeO0yU0/crofton-black</link>
        <generator>RSS for Node</generator>
        <lastBuildDate>Fri, 08 May 2026 16:27:24 GMT</lastBuildDate>
        <atom:link href="https://www.bloomberg.com/authors/AViyAeO0yU0/crofton-black.rss" rel="self" type="application/rss+xml"/>
        <copyright><![CDATA[Copyright 2026 BLOOMBERG L.P. ALL RIGHTS RESERVED]]></copyright>
        <language><![CDATA[en]]></language>
        <item>
            <title><![CDATA[How a Tiny Middleman Could Access Two-Factor Login Codes From Tech Giants]]></title>
            <description><![CDATA[An investigation into the complexity of the global telecom system shows weaknesses in the transmission of secret codes sent via SMS.]]></description>
            <link>https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</link>
            <guid isPermaLink="true">https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</guid>
            <category><![CDATA[world]]></category>
            <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
            <pubDate>Mon, 16 Jun 2025 11:00:32 GMT</pubDate>
            <media:content url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg" type="image/jpeg">
                <media:thumbnail url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg"/>
                <media:description></media:description>
            </media:content>
        </item>
        <item>
            <title><![CDATA[Swiss Firm Executive Operates Secret Surveillance Operation, Sources Say]]></title>
            <description><![CDATA[Mitto AG’s network used to track people via mobile phones, former employees say.]]></description>
            <link>https://www.bloomberg.com/news/articles/2021-12-06/this-swiss-tech-exec-is-said-to-have-operated-a-secret-surveillance-operation</link>
            <guid isPermaLink="true">https://www.bloomberg.com/news/articles/2021-12-06/this-swiss-tech-exec-is-said-to-have-operated-a-secret-surveillance-operation</guid>
            <category><![CDATA[world]]></category>
            <dc:creator><![CDATA[Ryan Gallagher]]></dc:creator>
            <pubDate>Mon, 06 Dec 2021 06:00:09 GMT</pubDate>
            <media:content url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i60P9rsGIGMU/v0/piHJkQ_WoLj1E/-1x-1.jpg" type="image/jpeg">
                <media:thumbnail url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i60P9rsGIGMU/v0/piHJkQ_WoLj1E/-1x-1.jpg"/>
                <media:description></media:description>
            </media:content>
        </item>
    </channel>
</rss>