Each of the selected readings has to deal with online security hacking and virtuous destruction, leading up to the eventual demise of a person’s cyber life. For example, in both of Mat Honan’s articles “How Apple and Amazon Security Flaws Led to My Epic Hacking” and “How I got my Digital Life Back” include how […]