Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Hack
zeynep tufekci
zeynep
Remarkable that a media person can write "Do you think a single person outside the Beltway gives a hoot..." without realizing it means that so many of in media failed
Read more
David Doak
SouthPoint1000
We are about to see a massive attack on Joe Biden, from paid advertising, from hidden digital, paid ads and troll bots. There are many theories on how one handles
Read more
Oath Keepers
Oathkeepers
1) Volunteer anti-looter security in Kenosha, WI are chased by angry mob. One rifleman trips, mob attacks, he shoots several, then regains his feet and walks toward responding police. Eight
Read more
nicole
nwilliams030
teenagers vandalizing open source street maps to include fake bodies of water near their homes so that rare waterbased Pokémon would spawn more often is a particularly important variety of
Read more
Teddy Mitrosilis
TMitrosilis
Your nights determine your days.7 things you should do every evening: 1. Make a Quick Start listPlanning your day the night before is good.But what’s more important is how you
Read more
Kris
dreammapper
IVANKA DIRECTED TRUMP'S TWITTER OF WIKILEAKS / RUSSIA"Ivanka Trump tasked the Campaign's sr. officials (incl. Bannon, Scavino, Stephen Miller & Jason Miller) w preparing 2 Trump tweets every day linking
Read more
O. Hybridity
ShillSphinx
I should be in bed, time to uncork a big bottle of game design thoughts:this is probably a personal hangup but few things take the wind out of a system's
Read more
FBI
FBI
#FBI Deputy Director David Bowdich will join our partners from the @TheJusticeDept for a press conference today regarding a national security matter. You can watch live at 1 p.m. EST
Read more
𝐍𝐚𝐲𝐚𝐧
sovereigneur
The Facts To Know About Crypto Storage.Don't lose your crypto.// THREAD Keeping your crypto assets secure is the most crucial aspect of your cryptocurrency journey. Your - research, - chart
Read more
CodesUcq
CodesUcq
1.Seth Rich Timeline: Kim DotCom claimed in Dec 2014 that he would be HRC's worst nightmare.Note the date Seth Rich started working with DNC computers being 2014. 2.05/13/2015 Kim Dotcom:
Read more
Lisa ‘Mockingjay’ Newens (A.K.A. ‘Optimus Prime’)
PerfumeFlogger
1:On the subject of VETTING, I’d like to impress upon you all how vitally important it is to vet every account you follow and that follows you!In this critical run
Read more
Ali
alinajaf
I think that one of the biggest divides between tech ICs and management comes from an inability to have an honest conversation about day-to-day executive function and the anxiety surrounding
Read more
Stephen Timoney
MySuccessTheory
The 7 key rules of productivity: What is the secret to high performance and productivity?You need foundations and structure.Unless you have core rules you believe in and follow, all the
Read more
ria | minmintober⁷
soupjms
okay so first of all this app is not safe and can access your things and even your camera it will start to send you extremely disturbing and triggering messages
Read more
Tom Lange
TomLangeYYC
If you want to do better at political discourse, stop calling every academic (particularly female academics, I’ve noticed) who disagrees with a UCP policy an NDP partisan hack. Stop calling
Read more
Annie Duke
AnnieDuke
The most dangerous category of poor decisions are ones that remain easily hidden from view because any instance of that type of decision is so easy to rationalize. 1/12 Trying
Read more
‹
1
2
...
40
41
42
43
44
45
46
...
99
100
›