The Competition Bureau of Canada has filed an antitrust lawsuit against Google, accusing the tech giant of abusing its dominant position in the online advertising technology market to stifle competition and harm advertisers, publishers, and consumers.
The case, filed with the Competition Tribunal, is the latest in a series of global legal challenges targeting Google’s advertising practices.
The Bureau announced on Thursday that it had filed an application with the Competition Tribunal, seeking an order that would compel Google to sell two of its advertising technology tools and impose a penalty to ensure compliance with Canadian competition laws.
“The Competition Bureau conducted an extensive investigation that found that Google has abused its dominant position in online advertising in Canada by engaging in conduct that locks market participants into using its own ad tech tools, excluding competitors, and distorting the competitive process,” Commissioner of Competition Matthew Boswell said in a statement.
According to the watchdog, Google holds the largest market share across Canada’s ad tech stack and has “abused its dominant position” to entrench its market power.
Allegations of market abuse
The Bureau’s investigation alleges that Google has entrenched its dominance across the ad tech stack — a suite of tools that facilitates the buying and selling digital ad inventory. The Bureau asserts that Google unlawfully tied its ad tech tools together and leveraged its dominant position to distort auction dynamics. These actions reportedly forced market participants to rely on Google’s ecosystem, excluded competitors, and disrupted fair competition.
“Google’s conduct has prevented rivals from being able to compete on the merits of what they have to offer, to the detriment of Canadian advertisers, publishers, and consumers. We are taking our case to the Tribunal to stop this conduct and its harmful effects in Canada,” Boswell added.
The Bureau further claims that Google gave its own tools preferential access to advertising inventory, manipulated pricing to disadvantage rivals, and imposed restrictive terms on publishers transacting with competing platforms.
The Competition Bureau has asked the Tribunal to order Google to divest two of its ad tech tools, impose penalties to ensure compliance with Canada’s Competition Act and prohibit the company from continuing anti-competitive practices.
The Bureau’s investigation, which began in 2013, initially focused on Google’s search engine practices but expanded earlier this year to include its advertising technology services.
A request seeking comment from Google remains unanswered.
Parallel cases in the US and India
The Canadian lawsuit echoes similar antitrust challenges Google is facing globally, including in the US. The US Department of Justice (DOJ) recently concluded closing arguments in its antitrust case against Google, accusing the company of illegally dominating the online advertising market.
In its trial, the DOJ alleged that Google monopolized key ad tech markets, including publisher ad servers and advertiser ad networks, and sought to dominate ad exchanges. Prosecutors argued that Google’s practices “rigged the rules of the road,” preventing fair competition. Google countered by emphasizing the competitiveness of the online ad market and dismissed the DOJ’s claims as mischaracterizations of legitimate business decisions.
Meanwhile, in India, the Competition Commission of India (CCI) on Thursday ordered a probe into Google’s restrictive policies for real-money gaming apps. The investigation follows a complaint from the gaming platform WinZO, which accused Google of discriminatory practices by excluding it from the Google Play Store while allowing competitors.
In 2022, the Indian authority imposed a monetary penalty of around $300 million on the search engine major for various anti-competitive practices.
A global spotlight on Google’s practices
Earlier this month the US DOJ has recommended extensive measures to limit Google’s dominance, including the potential breakup of its Chrome browser and Android operating system. These products are pivotal distribution platforms for Google Search, which was deemed an illegal monopoly in Federal Judge Amit Mehta’s August ruling.
These cases collectively highlight the increasing scrutiny of Google’s practices worldwide as regulators seek to address concerns about its dominance across various markets, including online advertising, app ecosystems, and gaming platforms.
For Google, the stakes remain high, as these lawsuits could lead to significant penalties, structural changes to its business, and a precedent for regulating Big Tech. With competition watchdogs ramping up their efforts globally, the outcomes of these cases could reshape the digital advertising landscape for years to come.
The US Federal Trade Commission (FTC) has launched an antitrust investigation into Microsoft, scrutinizing its cloud computing, software licensing, cybersecurity, and AI businesses.
The inquiry follows over a year of informal interviews with competitors and business partners, Bloomberg reported. FTC antitrust lawyers have sent Microsoft a detailed information demand, spanning hundreds of pages, after receiving approval from FTC Chair Lina Khan, the report said quoting sources familiar with the matter.
In the second week of November, Computer World reported that the FTC was preparing to investigate the business practices of Microsoft. The allegations were on whether Microsoft is abusing its market dominance by deploying restrictive licensing terms, which is not a fair practice.
Focus on market dominance and security practices
The investigation centers on Microsoft’s bundling of office productivity and security software with its cloud services, a practice critics argue disadvantages competitors in the authentication and cybersecurity markets. The FTC is particularly examining Microsoft Entra ID, its user authentication service, amid complaints that licensing terms and integration with its cloud offerings impede rival companies.
Microsoft’s role as a major government contractor and recent cybersecurity incidents involving its products have added urgency to the probe. The company provides billions of dollars in services to US agencies, including the Department of Defense, making its practices critical to national security.
In November 2023, FTC flagged concerns about the concentrated nature of the cloud market, warning that outages or performance issues could ripple through the economy. The authority had then collected feedback from civil society, industry stakeholders, and academia to prepare its report. As per the feedback, the majority of the concerns were related to competition and licensing practices.
The investigation is among the final actions of Lina Khan, who has led one of the FTC’s most aggressive campaigns against corporate consolidation in decades. Khan is expected to step down as President-elect Donald Trump prepares to take office though there is no official confirmation yet.
Trump’s regulatory stance remains unclear, but his administration could mark a shift from President Joe Biden’s focus on reining in Big Tech. Under Biden, the FTC pursued cases against Amazon and Meta, while the Department of Justice sued Google and Apple.
This renewed scrutiny comes more than 25 years after the government’s landmark antitrust case against Microsoft over bundling its Windows operating system and browser, which ended without a breakup.
The FTC’s investigation could have far-reaching implications for the tech giant’s market practices and the broader cloud and cybersecurity sectors.
There are important accounts to secure, and then there are important accounts to secure. Your Google account falls into that second category, maybe even with a couple of asterisks and some neon orange highlighting added in for good measure.
I mean, really: When you stop and think about how much stuff is associated with that single sign-in — your email, your documents, your photos, your files, your search history, maybe even your contacts, text messages, and location history, if you use Android — saying it’s a “sensitive account” seems like an understatement. Whether you’re using Google for business, personal purposes, or some combination of the two, you want to do everything you possibly can to keep all of that information locked down and completely under your control.
And guess what? Having a password that you hastily set seven years ago isn’t enough. With something as priceless as your personal data, that single key is only the start of a smart security setup. And even it might be due for an upgrade.
Take 10 minutes to go through these steps, then rest easy knowing your Google account is as guarded as can be.
Part I: Reinforce your front door
Step 1: Check up on your Google account password
We’ll start with something simple but supremely important — that aforementioned Google account password. Consider the following questions:
Is your Google password based on your name, the name of your partner or child, your birthday, your street address, or anything else someone could easily figure out by Googling you?
Does your Google password revolve around a common word or easily guessable pattern?
Is your Google password short — less than eight characters, at a minimum?
Do you use your Google password (or any variation of it) to sign into any other app, website, or service?
If the answer to any of those questions is yes, first, bop yourself firmly on the nose. Then use this link to go change your password immediately — preferably to something long, complex, and not involving any easily discoverable personal info, any common words or patterns, or anything you use anywhere else.
Step 2: Give your Google account a second layer of protection
No matter how strong your Google account password is, there’s always still the chance someone could crack it — but you can exponentially reduce the risk of anyone actually getting into your virtual property by enabling two-factor authentication on your account.
With two-factor authentication, you’ll be prompted for a second form of security in addition to your password — ideally something that requires a physical object that’d only ever be in your presence. In its simplest effective form, that could be a prompt or a code generated by your phone. If you want to get really fancy, it could be a button pressed on an actual key you carry (which could be a special USB- or Bluetooth-based dongle or even something built into your phone) — sometimes even called a “passkey,” which is basically just a confusing and overcomplicated way to say the same thing. There’s also an option to have codes sent to you via text message, but that method is relatively easy to hijack and thus not generally advisable to use.
Whatever path you choose, having that second layer in place will make it incredibly difficult for anyone to get into your Google account, even if they do somehow know your password.
Two-factor authentication makes it significantly more difficult for anyone to get into your Google account.
Step 3: Make sure you’re prepared to prove your identity
If Google ever detects some sort of suspicious activity on your account, it might require you to verify your identity before it lets you sign in. And if you haven’t looked at your account verification settings in a while (or ever, for that matter), there’s a decent chance the necessary info might be out of date or missing altogether.
Take a minute now to open up Google’s account security site and look in the section labeled “How you sign in to Google.” There, among other things, you should see two options:
Recovery phone
Recovery email
If the value next to either option is not current and correct, click it and update it immediately.
And with that, we’re ready to move on to our next level of Google account protection.
Part II: Clamp down on connections
Step 4: Review the third-party services with access to your account
When you set up an app that interacts with Google in some way — on your phone, on your computer, or even within a Google service such as Gmail or Docs — that app gets granted a certain level of access to your Google account data.
Depending on the situation, that could mean it’s able to see some of your activity within specific Google services; it could mean it’s able to see everything in your Gmail, Google Calendar, or Google Drive; or it could mean it’s able to see everything across your entire Google account.
It’s all too easy to click through confirmation boxes without giving it careful thought — so look back now and see exactly what apps have access to what types of information. Visit Google’s third-party app access overview and look through the list of connected services. If you see anything there you no longer use or don’t recognize, click its line and then click the button to remove it.
Review your third-party app list and remove any items that no longer need access to your Google account.
JR Raphael / IDG
Allowing apps you know and trust to access your account is perfectly fine, but you want to be sure to revisit the list regularly and keep it as current and concise as possible.
Step 5: Review the devices with access to your account
In addition to apps, you’ve almost certainly signed into your Google account on a variety of physical devices over the past several months (and beyond). And often, once you’ve signed in at the system level, a device remains connected to your account and able to access it — no matter how long it’s been since you’ve actually used the thing.
You can close that loop and take back control by going to Google’s device activity page. If you see any device there that you no longer use or don’t recognize, click the three-dot menu icon within its box and sign it out of your account right then and there.
Step 6: Look over app permissions on your phone
Another important app-related consideration: If you’re using Android, some system-level permissions — such as those connected to your contacts and calendar — can effectively control access to areas of your Google account data, since services such as Google Contacts and Google Calendar sync that data between your phone and the cloud.
Head into the Security & Privacy section of your phone’s system settings and look for the line labeled “Permission manager.” (Depending on your device, you might have to tap a line labeled “Privacy controls” before you see it.) If you can’t find it, try searching your system settings for the phrase permission manager instead.
Once you get there, you can look through each type of permission and see which apps are authorized to access it — and, with a couple more taps, revoke the permission from any apps where that level of access doesn’t seem necessary.
Android makes it easy to review and adjust an app’s permission, if you know where to look.
JR Raphael / IDG
Step 7: Look over extension permissions in your browser
On the desktop, extensions added into Chrome or any other browser have the potential to expand your browser’s capabilities — but they also have the potential to put your privacy at risk.
Extensions could require access to anything from your complete browsing history to your system clipboard. They can often read and change data on sites you’re actively viewing, too — either any and all sites or only specific pertinent URLs, depending on the specific permissions requested.
None of this is necessarily bad, so long as the extension in question is reputable and requesting only the permissions it genuinely requires for the function it provides. But sometimes, even the most well-intending developers can get lazy and go with a broader permission than what their software actually needs. And in such an instance, an extension that does something as simple as enhancing the Gmail interface or allowing you to save articles for later could have access to everything you do in your browser — and the sort of broad data that’s typically kept under lock and key inside your Google account could be shared with external entities for no good reason.
So let’s do a quick little assessment, shall we? If you’re using Chrome, type chrome:extensions into your browser’s address bar. If you’re using another browser, look in its main menu to find the equivalent option for managing extensions or add-ons, as they’re sometimes also called.
Once you’re looking a list of all your installed extensions, click the “Details” or “Options” button for every extension on the page. Peek at the “Permissions” section within each one and then take a close look at the “Site access” section, in particular. Think carefully about the level of access that’s granted there and whether it’s genuinely needed — or whether it’d make sense to bring it down a notch and make it more limited in nature.
With Chrome and other Chrome-based browsers — like Microsoft Edge and Vivaldi — if the extension seems like it really only needs access to a specific site or domain and it’s requesting access to your activity on all sites, click the dropdown menu in that area and change its setting from “On all sites” to “On specific sites” (which lets you provide a specific, limited list of URLs on which the extension will have full visibility).
Chrome and other Chrome-based browsers make it easy to view and adjust the permissions for any browser extension you’re using.
JR Raphael / IDG
Just remember that many extensions do legitimately need certain levels of access in order to operate — so make these changes cautiously and only after carefully thinking through the potential implications. Worst-case scenario, though, if you bring an extension’s access down and then find it’s no longer working as expected, you can always come back to this same area of your browser’s settings later and change it back.
Firefox, incidentally, doesn’t allow this level of granular permission-granting — so if you find an extension there is accessing more than you’re comfortable with, your only real option is to uninstall it entirely.
Speaking of which…
Step 8: Get rid of any mobile apps and browser extensions you don’t need
While you’re thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better — and if you aren’t even using something, there’s no reason to keep it connected.
And with that, we’re ready for our final two parts of account-protecting possibilities.
Part III: Plan for the worst
Step 9: Set up or confirm your virtual Google will
Thinking about worst-case scenarios is never particularly pleasant — I’d much rather be eating crumpets, myself — but just as it’s important to have a plan in place for your physical and financial possessions, creating a virtual will for your Google account will make matters infinitely easier for your loved ones if and when you ever develop a mild case of death.
For company-managed Google Workspace accounts, someone at your organization would be able to take control of your account in the event that you were no longer able to access it. But with an individual Google account, no such system for passing along access exists.
Google has a simple system in place to manage this: Open up the Inactive Account Manager, and you’ll find tools for determining exactly what should happen if your account ever becomes inactive for a certain period of time. You can specify the number of months that must go by without any sign of your presence, along with the email addresses and phone numbers Google should use to contact you for confirmation. And then, you can give Google the email addresses of any people you want to be notified once it’s clear that you’re no longer available.
From there, you can specify exactly what types of information your chosen contacts will be able to access. You’ll even be able to leave a message for those people, if you want, and optionally create a broad autoreply that’ll be sent to anyone who emails you once your inactive period has begun (creepy!).
Google’s Inactive Account Manager is like a virtual estate planning tool for all of your account-associated data.
JR Raphael / IDG
Even if you’ve gone through this process before, it’s worth going back in and revisiting your preferences occasionally to confirm the info is all still complete and accurate — not only in the specific contacts you have set to be notified but also in what specific areas of your account those people will be able to access, if this situation ever actually arises.
For that latter piece of the puzzle, be sure to click the pencil-shaped icon next to the email address of each person you have listed. After you confirm their address, that’ll show you a list of account-related areas — everything from Contacts and Calendar to Google Chat, Google Photos, and even your location history (if you’re using a device that contributes to such a collection).
Virtually every time I’ve ever looked at that, I’ve found a handful of newer account-related areas weren’t selected to be shared — presumably because they didn’t exist when I had last reviewed the options. I had to manually check them all to be sure they’d be included in any post-consciousness account sharing.
Part IV: Turn your protection up to the max
Step 10: Think about Google’s Advanced Protection Program
Last but not least is a step that won’t be right for everyone but could be hugely consequential for certain types of Google users. For anyone at a higher risk of a targeted attack, Google offers an elevated form of account security called the Advanced Protection Program.
The program is described as being appropriate for business leaders, IT admins, activists, journalists, and anyone else who’s in the public eye and likely to be sought out by someone looking to do damage. It puts a series of heavy-duty restrictions on your Google account to make it especially difficult for anyone else to gain access — but as a result, it also makes things a bit more difficult for you.
The core part of the Advanced Protection Program is a requirement to have a physical security key the first time you sign into your account on any new device. That means in addition to your password, you’ll need that specific form of two-factor authentication — either an approved key built into your phone or a standalone dongle — in order to access your email, documents, or any other area of your Google account.
As part of the added security, you also won’t be able to connect most third-party apps to your Google account — including those that require access to your Gmail or Google Drive in order to operate. That could create some challenges (such as signing into an Android TV device, curiously enough) and require some compromises (such as no longer being able to use most third-party email clients with Gmail). And if you ever can’t get into your account for any reason, you’ll have to go through an extra-involved, multiday recovery process in order to restore access. You can read more about what the Advanced Protection Program is like to live with in this thoughtful overview.
Ultimately, only you can decide if the added inconveniences are worth the extra assurance. If you want the utmost in security for your Google account, though — and particularly if you’re someone who’s at a higher-than-average risk of being targeted — it’s something well worth considering.
If you do want to make the leap and add this extra layer of intense security onto your Google account, head over to Google’s Advanced Protection Program website to get started. With a personal account, you’ll be able to get yourself up and running in a matter of minutes. With an account that’s part of a paid company Workspace plan, your plan administrator will have to enable Advanced Protection for the organization before you’re able to do it. Once you start the enrollment process, you’ll see pretty quickly if it’s already available for your account or not — and if not, you can contact your company admin to ask about the possibility of allowing it.
And with that, give yourself a pat on the back: Now that these 10 steps are behind you, your Google account security is officially in tiptop shape — and you shouldn’t have to devote an ounce of thought to this area again anytime soon.
Just set yourself a reminder to revisit this page and review the steps within it once a year for good measure. (I’ll continue to update and expand the specific instructions as needed over time.) Do the same with security smarts in other areas — like your Android security settings, if you’re using an Android device of any sort — and then rest easy knowing your most important digital info is as secure as it can possibly be.
This article was originally published in February 2020 and updated in November 2024.
Intel’s $7.86 billion subsidy agreement with the US government imposes strict conditions on the company’s ability to divest stakes in its chipmaking division if the unit becomes independent.
In a recent securities filing, Intel disclosed that it must maintain at least 50.1% ownership of Intel Foundry if the division is spun off as a privately held entity.
If the unit goes public and Intel is no longer the largest stakeholder, the sale of stakes to any single investor would be limited to 35%.
This follows Intel CEO Pat Gelsinger’s September announcement to spin off the company’s chip production division into an independent subsidiary aimed at securing independent funding and optimizing capital structure.
Earlier this week, the US Commerce Department finalized a $7.86 billion subsidy for Intel, reduced from the $8.5 billion announced in March.
This comes as Intel faces heightened scrutiny over its financial challenges, compounded by intensifying competition from AMD and Nvidia in the AI chip market and recent workforce reductions.
Challenges ahead for Intel
The sale restrictions tied to the subsidy underscore the US intention to reinforce domestic semiconductor production under the CHIPS Act.
“The subsidy definitely comes with strings attached and is designed to ensure accountability for the recipient,” said Neil Shah, VP of research and partner at Counterpoint Research. “In this case, it’s Intel, and if a majority shareholder in the future decides not to comply or pivots to a strategy that doesn’t align with the goals of the US CHIPS Act, it could create significant issues.”
The challenge for Intel is securing consistent capital to sustain and grow its foundry business while keeping pace with rival TSMC’s heavy investments.
With its core businesses in PCs and servers underperforming – once key contributors to funding R&D and fabrication infrastructure – Intel’s ability to remain competitive has come under strain.
“The only way to raise capital is to spin off and secure new investors through an IPO or other means, which would dilute Intel’s stake,” Shah said. “To stay competitive, Intel needs to invest tens of billions of dollars annually. These restrictions could leave Intel stuck unless they manage to renegotiate terms with the US government.”
If Intel fails to remain competitive, customers may shift towards competitors like TSMC. This could lead to enterprises becoming more dependent on infrastructure and devices built with chips primarily produced by TSMC, further strengthening TSMC’s market position.
This shift could drive up chip prices, diminishing the purchasing power of enterprises and their equipment suppliers. It could also negatively impact US efforts to achieve leadership in semiconductor manufacturing.
“While such restrictions could enhance resilience against global supply chain disruptions and strengthen the US semiconductor ecosystem, it might come at the expense of slower scalability,” said Manish Rawat, semiconductor analyst at TechInsights.
Implications for enterprises
For enterprise customers, the restrictions bring both challenges and opportunities, according to Rawat. Intel’s limited access to external investors and potential delays in scaling its foundry operations could raise supply chain reliability concerns during peak demand.
“This could create uncertainties for customers relying on Intel for advanced manufacturing to meet their future technology needs,” Rawat said. “Additionally, concerns may arise over the foundry’s long-term strategic direction. If Intel Foundry’s ownership structure lacks the flexibility to adapt to market conditions, enterprise customers could experience disruptions in semiconductor supply reliability, particularly if Intel struggles to keep up with demand.”
On the other hand, a US-centric Intel Foundry could boost confidence among enterprises prioritizing supply chain security and adherence to “buy American” policies amid escalating geopolitical tensions. “This shift could also strengthen the domestic semiconductor supply chain, providing significant benefits, especially for industries involved in critical defense and national security-related applications,” Rawat added.
For the past two or three weeks, upstart social network Bluesky has been attracting large numbers of new users every day, a crowd that quite evidently includes many Apple device users — the app has at times topped Apple’s App Store charts in the run-up to Thanksgiving in the US. I’ve been using it for a little while and have collected a handful of hints and services that can optimize the experience for anyone migrating to the increasingly busy social network.
What’s interesting about Bluesky is that while it lacks some of the features you can find on other social sites, the conversation seems subjectively better and the lack of ads and sponsored posts — along with the absence of algorithmic recommendations from people you don’t want to hear from — make for a pleasant social media experience.
A place for friends?
One thing about the service is that it is a good internet citizen, which means it does not throttle outbound links and does not punish posters by reducing visibility of their posts simply for sharing them.
Among other things, this means traffic from the service to TheBoston Globe is already three times what that publication achieves from Threads. It also means the Globe is seeing significantly more of those readers converting to a subscription account.
In other words, while at roughly 22 million users, Bluesky remains a relatively small service. But the people using it appear to be actively doing so, which means it can generate decent traffic. That openness also means that data you share via the service is in the clear and can and will be picked up to train AI models and so on. There is no privacy there, and this should be clearly understood — everything you post is out in the open, so don’t share what you don’t want everyone to know. At the same time, by virtue of the service being so open, it can deliver an even better experience with the help from third-party tools and services like these.
Thread summaries
One thing we all used to use in X, thread summaries aren’t natively available on Bluesky, but you can use Skyview to quickly and easily create summaries. Just mention @skyview.social with “unroll” anywhere in a thread and receive a link to view/share the entire conversation. The downside might be that all the unroll requests end up being visible on Skyview’s account (though to be fair, everything you do is already stored somewhere on every social media service — it’s just that Skyview lets you see it, too).
Publish threads
Back in the olden days it was possible to publish entire conversations using a link from what was then Twitter. These turned up across numerous websites and within innumerable stories. Then it got switched off. The good news is that to some extent the good times are back. To turn a thread into a shareable web page use Skywriter.blue, which turns a Bluesky post URL into a shareable webpage. While this doesn’t yet work as an embed, it is at least now a page.
Mute a thread
You might need to know this in case you get involved in a conversation that blows up and you don’t want to receive additional alerts concerning it. To mute a thread, just tap the three dots on the right of any post in that thread and then choose “Mute Thread” from the options there. Additional tools you’ll find when you tap those three dots include:
Translate
Copy post text
Send via direct message
Share
Mute words & tags
Hide reply for me.
What lists are you on?
If you are interested in finding out what lists you are on, who you have blocked, and who has blocked you, visit clearsky.app, enter the relevant handle, and take a look.
Find more Starter Packs
You’ll find a directory of all Starter Packs — collections of recommended people to follow usually chosen to represent specific topics or subject areas — at Blueskydirectory.com. Explore here to find more collections from which to cherry-pick those you wish to follow, or just explore the comic genius of this Starter Pack about men called Geoff.
Starter Packs can become lists
BlueSky users are incredibly busy building Starter Packs. They cover multiple bases — independent book publishers, RStats Ecosystem Maintainers, dogs of Bluesky, for example — and are maintained and provided by volunteers. The idea is that you can visit these collections and select people you want to follow or follow the entire list. It’s a good way to build a solid selection of feeds for your interests.
Lists are another thing. Lists are groups of accounts that can be used to curate feeds, follow interests, and so on. You might use these to track your favorite writers, researchers, or other high-profile people you want to keep an eye on — that way you don’t need to follow them. The great thing about lists is that, unlike Starter Packs, you can choose to create a separate feed in your own window that follows posts from that list; I follow the BlueSky Team list, for example. This lets me monitor posts in that list without following more people.
But what if you want to turn a Starter Pack into a list, so you can create your own window to follow? You can! Just use the Pack2List web app, where you can paste the URL of that Starter Pack and choose to follow it as a list. That means that all the content in one of those Starter Packs can be made easily available on your account without you following each person on the list.
More people to follow
One quick way to find other like-minded souls might be to find people you do not yet follow who are followed by lots of people you do follow. You do this using the Bluesky network analyzer, which you’ll find right here.
Use Bluesky like Tweetdeck
Anyone out there with a memory that extends further than a few of months might remember Tweetdeck, the incredibly useful tool used by so many professionals to read and manage Tweets. Something very like it is now available to Bluesky users. Deck.Blue is an app you can connect to an account that lets you explore your “skeets’ in a multi-column layout, so you can monitor all your posts, posts from lists you follow, searches, notifications, hashtags — whatever you need. You can also use Deck.Blue to schedule posts, though this is currently a fee-based feature. The tool also works with Buffer, so you can monitor your LinkedIn, Mastodon, and Bluesky channels in one place.
Search tools
The search tools in Bluesky can help you in several ways, for example:
Find a specific phrase: Use quotes around keywords, such as “Austrian Airlines” to find skeets that include that phrase.
Hashtag search: Use any term with an # prefix to find any post with that tag.
Find people: You can search for posts that mention specific people using their Bluesky handle or use from: and a user handle to find all posts from a user.
URL: Paste in a URL to see all the posts that have shared that URL.
There are many more. Two additional third-party tools you should find useful are Skythread, which lets you search for a thread and comments using the thread link, and Label Scanner, which enables you to verify which labels have been applied to an account.
Alternative clients
Bluesky offers its own client, but the experience on an iPad is pretty bad. If you want to use the service on an iPad, take a look at Skeets, which is better and includes a host of additional features, some of which you must pay for. Other alternative Bluesky browsers include the aforementioned Deck.blue, SkyFeed, and SkeetDeck. There are more, and with millions migrating to the service, it is likely additional options will appear pretty swiftly for a while.
You will need an app password to make any of these services work. Rather than using your actual account password, I utterly urge you to create an auxiliary app password. You can use this to give the clients the access they need to work for you, while keeping your primary password secure. Finally, for even more insights into using Bluesky, visit this page.
A US federal judge indicated that the trial addressing the Department of Justice’s proposals to curb Google’s dominance in online search will proceed as scheduled in April 2025, even if DOJ officials under President-elect Donald Trump seek to revise the remedies.
The move signals the urgency in resolving the case, which could lead to a historic shake-up of the tech giant’s operations, Reuters reported.
US District Judge Amit Mehta, overseeing the case in Washington, confirmed Tuesday that the trial will proceed as scheduled despite potential changes in DOJ leadership and priorities under President-elect Donald Trump’s administration.
“If there is going to be a re-evaluation of the remedies that are being requested, it needs to be done quickly,” the report said quoting Judge Mehta from a hearing.
The DOJ has proposed sweeping remedies to curb Google’s influence, including a forced divestiture of its Chrome browser and potentially its Android operating system. Both products serve as critical distribution channels for Google Search, a service found to operate as an illegal monopoly in Mehta’s August ruling.
For context, Trump is likely to pursue ongoing lawsuits against Big Tech, several of which originated during his first term. However, his recent remarks expressing skepticism about a potential Google breakup underscore the significant influence he will wield in shaping the direction of these cases.
“If you do that (splitting Google), are you going to destroy the company? What you can do without breaking it up is make sure it’s more fair,” Trump said at an event in Chicago in October.
The Justice Department first filed the antitrust lawsuit against Google in 2020, during former President Donald Trump’s first term. It accused Google of leveraging its dominance in search and advertising markets to stifle competition.
In August 2024, Mehta ruled that Google violated US antitrust laws, setting the stage for the ongoing debate over remedies. The DOJ under President Joe Biden proposed additional measures, including requiring Google to share search data with competitors, limiting investments in rival technologies, and restricting acquisitions of companies in search or query-based AI.
Google’s pushback and trial stakes
Google has sharply criticized the DOJ’s proposals, calling them “staggering” and warning that they could harm American technological leadership. The company argued that measures like forced divestitures and data-sharing mandates could weaken its competitive edge and disrupt the broader digital ecosystem.
“We’ve invested billions of dollars in Chrome and Android. Breaking them would change their business models, raise the cost of devices, and undermine competition with Apple,” Google said in a blog post in October.
The upcoming trial is expected to highlight the role of artificial intelligence in reshaping the online search landscape. Prosecutors plan to call witnesses from major AI players, including OpenAI, Perplexity, Microsoft, and Meta Platforms, to underscore the competitive challenges Google’s practices pose to innovation.
Political dynamics and antitrust implications
President-elect Trump, who expressed skepticism about a Google breakup, has yet to outline his administration’s stance on the DOJ’s proposals. However, Judge Mehta’s decision to maintain the trial timeline suggests limited patience for political recalibrations.
The case represents the most aggressive antitrust action against a tech company since the DOJ’s unsuccessful attempt to break up Microsoft two decades ago. If successful, the remedies could significantly alter the competitive dynamics in online search and advertising markets while setting a precedent for regulating the tech industry.
The trial remains a critical test of the federal government’s ability to rein in Silicon Valley’s most powerful players in an era where technology increasingly shapes global markets.
Nvidia on Monday showed off a new generative AI (genAI) model that can be used to create all kinds of sounds and music: Fugatto (which stands for Foundational Generative Audio Transformer Opus 1).
By entering a text prompt, a user can make Fugatto create basically any sound, such as a trumpet barking like a dog. The genAI model can also be used to change the dialect of a singer or turn a piano piece into a song, according to Reuters.
Fugatto has been trained on open source data, and there is currently no official release date. However, the idea is that the model will eventually be used in the production of music, films and games.
The video below from Nvidia highlights some of Fugatto can do.
Brazil’s antitrust body has joined a chorus of regulators to demand that Apple permit external payment methods in iOS apps. It’s just the latest page in an ongoing story, but might be enough to break this camel’s backbone.
What this means, at the risk of stating the obvious, is that Apple now faces so much pressure to open up to external payment systems, it could finally make sense for it to bite the bullet and open up across all its territories rather than continue to fight.
Apple has already been forced to open up in this way — and also to third-party app stores — in the EU, and to let US developers sell in-app content outside the App Store. It now faces similar pressure in the UK. But while it resists each of these moves, there is a cost to the company in legal fees and reputational damage attached to each battle in this conflict — at some point, it might make better business sense to cede the field.
A potential opportunity
While I don’t expect Apple is at all thrilled at how these cookies are crumbling, perhaps there is a way to turn all of this adversity into opportunity. If there’s ever been a time to add features and improvements to the payment systems Apple already provides, this is it.
It might also be time for Apple to take its payments infrastructure to other platforms and markets. Why shouldn’t you be able to pay for Android apps using Apple’s payment systems? Why not offer Apple payments to gamers from within Fortnite? Why not turn payments into products and grab an Apple-sized slice of the wider payments pie?
Customers from inside other ecosystems might be ready to embrace Apple’s rock-solid, highly secure, privacy-first payment system. What I’m saying is that Apple has a unique chance to compete, one from which it can continue to evangelize the advantages of the services (and platforms) it already provides for in-app purchases and everything else. At the end of the day, the best way to keep people using its payments systems is to convince them that they want to use that system — even if they have a choice of others to use.
With choice being imposed on the company, the company has an excuse to compete right back at competitors.
Who will lose?
Apple will not be blind to this, but support for external payment systems on its platforms remains very new and is only visible in a small number of markets. Given the potential risks of fraud and worse, it makes sense for Apple (and everyone else) to take a wait-and-see approach to extending this openness to new markets. It is just good practice to monitor what scams, frauds, and other attacks will emerge as third-party services are used on iOS in the EU. It’s not inconceivable that part of Apple’s reluctance to open up more widely yet (other than the money) is a desire to assess the perils and pitfalls of doing so — a trial in which Apple’s European customers are the crash test dummies.
But regulators don’t seem terribly keen to wait and see. Regulators in India, Brazil, UK, US, Japan, South Korea, and elsewhere now seem to agree that Apple must lift restrictions on payment methods for in-app purchases. It’s going to happen in the end.
What price platform integrity?
Even then, another problem Apple faces in that is that each nation could demand slightly different approaches to lifting those restrictions. The problem is that there is a development and infrastructure support cost, not to mention legal expenses, to each of those dictated approaches. What that means is that the less harmonious Apple lets payments on iOS become, the higher the cost of business.
To avoid weakening the platform with a thousand cuts, it just makes more sense to lift the restrictions internationally, while also putting in place firm safeguards that permit Apple to swiftly remove any payment services identified as fraudulent or lax in security from its platforms.
Now, I’m on the record arguing that I think there is a very high probability that once payment systems in apps are opened up this way we will see fraud, identity theft, and other forms of financial crime affect against Apple’s so-far highly secure platform. I think that’s inevitable.
Consumers will be damaged, and in the case of those using non-Apple payment services or app stores they cannot expect to get support from Apple. They may have accessed a non-Apple service on an Apple device, but the exchange will be between them and the service, not them and Apple. There will be confusion and broken hearts. This is what will happen.
Managed decline
But Apple can manage the experience and focus on showing the many ways it offers a better and safer system to use. It also means bowing to the inevitable and building something that satisfies regulators enough that they don’t choose to force Apple to build a system that dilutes its own platform.
So, why has Apple resisted so much? Perhaps because it knows there are other criticisms reaching the anti-trust runway. Perhaps it feels that it makes sense to put up a fight on this particular hill in order to give it time to shore up better defenses on the other hills it currently holds.
All the same, the judgment coming out of Brazil suggests the company is running out of time to prepare for other battles, and now might be time to concede on this particular point. Despite which, if I were in Apple (or a regulator’s) shoes, I’d still try to delay any such move until the first casualties from the European experiment are identified and lessons learned.
For decades, enterprises have allowed their workers to use whatever free browser they wanted to access the most sensitive files possible. CIOs believed that security software in the environment — such as endpoint security apps or supposedly secure web gateways — would deliver any needed protections.
And until 2020, that view was somewhat valid. But when various pandemic-fueled changes hit the workplace, almost everything changed. But as extreme browser exposure became far more dangerous, the shift was so gradual that almost no one in IT noticed any danger. Those changes included massive numbers of new remote sites; skyrocketing shifts away from on-premises tools and apps to the cloud; and far more SaaS deployments.
The browser issue here actually arises from two distinct problems: virtually no limits on which browser can be used and no protections at the enterprise level that sit atop those browsers.
The first is the most bizarre.
Somehow, IT permits any browser to be used in their sensitive environments. Can you imagine that being permitted for anything else? How many CIOs would tell workers they can use whichever VPN app they want, including free consumer-grade VPNs? Would an enterprise CIO be OK with someone in finance ignoring the corporate license for Excel and instead opting to put sensitive payroll details into a freeware spreadsheet found at a gaming site in China? Or maybe an employee could forego a company-paid Zoom account for discussions of that upcoming acquisition and use a freebie service no one’s ever heard of?
IT typically maintains strict controls over all software that touches their privileged areas, but browsers are a security free-for-all?
Let’s delve briefly into the history. When graphical browsers first moved into the enterprise in large numbers (don’t forget that the earliest browsers, such as Cello and Lynx, were pure text) around 1994, the goal was to make it as easy as possible for people to interact with the web. The internet at that point had been around for decades, but the web had only recently become popularized.
The problem is that as environments became exponentially more complex and access to ultra-sensitive data soared, IT didn’t stop to reconsider ancient browser policies.
If IT admins were to choose one specific browser to mandate, controls would become light-years easier. They could even require users to access the latest version from IT, allowing for updates to be strictly maintained. Internal web pages could be designed for that browser, making it far more likely to deliver an identical experience for all users.
I routinely run into secure areas where critical text (such as the “next” button) is offscreen. That means trying three or four browsers until one works. Imagine that problem disappearing simply by mandating one browser for all.
That kind of corporate mandate brings up a few issues:
Desktop vs. mobile. Some enterprises might need to consider standardizing on one browser for desktop and possibly a different browser for mobile.
IT political issues. Some of the browsers with major market share are deeply integrated with one vendor’s environments, such as Google Chrome and Microsoft Edge. Depending on how your environments are integrated with different platforms, this could be an issue.
Compliance. Some of the browser makers are more aggressive at pushing privacy and other data boundaries, especially when generative AI is involved. Standardizing on one of those might lead to corporate compliance issues, especially if you have a substantial presence in Western Europe, Australia or Canada.
Geography. Beyond the compliance issues, there are language and other regional support issues to consider, especially if you have a major presence in Asia.
That brings us to problem two. Browsers were never designed to be even a little bit secure in the early days — and not much has changed today. That’s why IT needs to insist that something act as a secure layer between your environment and any browser — even your hand-chosen favorite browser.
Because the needs of every enterprise are different, there’s no one-size-fits-all browser security solution. The browser security layer must play well with your existing systems and your particular compliance needs — colored by geography and verticals — are critical factors.
“The browser is the number one app that everyone is using. The browsers of today are much more powerful than the older versions,” said Dor Zvi, CEO of security firm Red Access. “They allow you to run Javascript, login and tokens and render HTML. The browser today is so powerful that it acts almost like an operating system.”
Zvi argues that there is a reason those browser capabilities are so dangerous.
“A lot of the attacks today can now happen entirely within the browser. It is happening inside the frame of the browser, which means it is not on the network side and not on the endpoint side. The browser now holds the cookies and tokens for all of your applications,” he said. “Let’s say someone is trying to steal my Okta two-factor authentication. [The attacker] can run it by solely using the browser privileges and no one will ever know about it.”
Another problem with allowing any browser from around the world to access your systems involves browser extensions. In the same way Apple and Google can’t adequately police their apps to detect and remove malicious ones, browser teams can’t verify the legitimacy of extensions. A malicious browser often has unlimited access to everything the browser can do or see. That’s why standardizing on one browser is important; it allows IT to also rein in browser extensions.
It’s a lot to think about — but preferably not right before bed.