<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Crofton Black - Freelance Contributor]]></title><description><![CDATA[Crofton Black - Freelance Contributor]]></description><link>https://www.bloomberg.com/authors/AViyAeO0yU0/crofton-black</link><image><url>https://www.bloomberg.com/feeds/static/images/bloomberg_logo_black.png</url><title>Crofton Black - Freelance Contributor</title><link>https://www.bloomberg.com/authors/AViyAeO0yU0/crofton-black</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 02 Sep 2025 21:01:03 GMT</lastBuildDate><copyright><![CDATA[Copyright 2025 BLOOMBERG L.P. ALL RIGHTS RESERVED]]></copyright><language><![CDATA[en]]></language><atom:link href="https://www.bloomberg.com/authors/AViyAeO0yU0/crofton-black.rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[How a Tiny Middleman Could Access Two-Factor Login Codes From Tech Giants]]></title><description><![CDATA[An investigation into the complexity of the global telecom system shows weaknesses in the transmission of secret codes sent via SMS.]]></description><link>https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</link><guid isPermaLink="true">https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</guid><category><![CDATA[world]]></category><dc:creator><![CDATA[Ryan Gallagher]]></dc:creator><pubDate>Mon, 16 Jun 2025 11:00:32 GMT</pubDate><media:content url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg" type="image/jpeg"><media:thumbnail url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg"/><media:description/></media:content></item><item><title><![CDATA[Swiss Firm Executive Operates Secret Surveillance Operation, Sources Say]]></title><description><![CDATA[Mitto AG’s network used to track people via mobile phones, former employees say.]]></description><link>https://www.bloomberg.com/news/articles/2021-12-06/this-swiss-tech-exec-is-said-to-have-operated-a-secret-surveillance-operation</link><guid isPermaLink="true">https://www.bloomberg.com/news/articles/2021-12-06/this-swiss-tech-exec-is-said-to-have-operated-a-secret-surveillance-operation</guid><category><![CDATA[world]]></category><dc:creator><![CDATA[Ryan Gallagher]]></dc:creator><pubDate>Mon, 06 Dec 2021 06:00:09 GMT</pubDate><media:content url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i60P9rsGIGMU/v0/piHJkQ_WoLj1E/-1x-1.jpg" type="image/jpeg"><media:thumbnail url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i60P9rsGIGMU/v0/piHJkQ_WoLj1E/-1x-1.jpg"/><media:description/></media:content></item></channel></rss>