<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Gabriel Geiger - Freelance Contributor]]></title><description><![CDATA[Gabriel Geiger - Freelance Contributor]]></description><link>https://www.bloomberg.com/authors/AXfPe3p4NF0/gabriel-geiger</link><image><url>https://www.bloomberg.com/feeds/static/images/bloomberg_logo_black.png</url><title>Gabriel Geiger - Freelance Contributor</title><link>https://www.bloomberg.com/authors/AXfPe3p4NF0/gabriel-geiger</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 02 Sep 2025 21:01:04 GMT</lastBuildDate><copyright><![CDATA[Copyright 2025 BLOOMBERG L.P. ALL RIGHTS RESERVED]]></copyright><language><![CDATA[en]]></language><atom:link href="https://www.bloomberg.com/authors/AXfPe3p4NF0/gabriel-geiger.rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[How a Tiny Middleman Could Access Two-Factor Login Codes From Tech Giants]]></title><description><![CDATA[An investigation into the complexity of the global telecom system shows weaknesses in the transmission of secret codes sent via SMS.]]></description><link>https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</link><guid isPermaLink="true">https://www.bloomberg.com/news/articles/2025-06-16/two-factor-authentication-codes-take-insecure-path-to-users</guid><category><![CDATA[world]]></category><dc:creator><![CDATA[Ryan Gallagher]]></dc:creator><pubDate>Mon, 16 Jun 2025 11:00:32 GMT</pubDate><media:content url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg" type="image/jpeg"><media:thumbnail url="https://assets.bwbx.io/images/users/iqjWHBFdfxIU/i0bFN9_2AdV4/v0/piHJkQ_WoLj1E/-1x-1.jpg"/><media:description/></media:content></item></channel></rss>