var varname = "wijax_b696abd3be5fd23e351a7cfcacee9a2c"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:8.1081081081081%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=encryption\" class=\"term-link\" title=\"3 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:8.1081081081081%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=cybersecurity\" class=\"term-link\" title=\"3 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=malware\" class=\"term-link\" title=\"2 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=smartphones\" class=\"term-link\" title=\"2 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bitcoin\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bitcoin\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=bitcoin\" class=\"term-link\" title=\"2 topics\">Bitcoin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"virtual currency\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/virtual-currency\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=virtual-currency\" class=\"term-link\" title=\"2 topics\">virtual currency<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PRISM\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/prism\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=prism\" class=\"term-link\" title=\"1 topics\">PRISM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iCloud\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/icloud\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=icloud\" class=\"term-link\" title=\"1 topics\">iCloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"openssl\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/openssl\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=openssl\" class=\"term-link\" title=\"1 topics\">openssl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Xbox\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/xbox\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=xbox\" class=\"term-link\" title=\"1 topics\">Xbox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=cloud-computing\" class=\"term-link\" title=\"1 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet of things (IoT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet-of-things-iot\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=internet-of-things-iot\" class=\"term-link\" title=\"1 topics\">internet of things (IoT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"email\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/email\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=email\" class=\"term-link\" title=\"1 topics\">email<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/storage\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=storage\" class=\"term-link\" title=\"1 topics\">storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Heartbleed\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/heartbleed\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=heartbleed\" class=\"term-link\" title=\"1 topics\">Heartbleed<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"search\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/search\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=search\" class=\"term-link\" title=\"1 topics\">search<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SSL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ssl\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=ssl\" class=\"term-link\" title=\"1 topics\">SSL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iTunes\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/itunes\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=itunes\" class=\"term-link\" title=\"1 topics\">iTunes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PlayStation\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/playstation\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=playstation\" class=\"term-link\" title=\"1 topics\">PlayStation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"OAuth\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/oauth\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;technology=oauth\" class=\"term-link\" title=\"1 topics\">OAuth<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:24.324324324324%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=national-security-agency-nsa\" class=\"term-link\" title=\"9 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:13.513513513514%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=google\" class=\"term-link\" title=\"5 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:10.810810810811%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=apple\" class=\"term-link\" title=\"4 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:10.810810810811%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=microsoft\" class=\"term-link\" title=\"4 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Government Communications Headquarters (GCHQ)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/government-communications-headquarters-gchq\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=government-communications-headquarters-gchq\" class=\"term-link\" title=\"2 topics\">Government Communications Headquarters (GCHQ)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=sony\" class=\"term-link\" title=\"2 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=cisco-systems\" class=\"term-link\" title=\"2 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"IBM\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ibm\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=ibm\" class=\"term-link\" title=\"2 topics\">IBM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony Pictures\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony-pictures\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=sony-pictures\" class=\"term-link\" title=\"2 topics\">Sony Pictures<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Juniper Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/juniper-networks\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=juniper-networks\" class=\"term-link\" title=\"2 topics\">Juniper Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Huawei\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/huawei\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=huawei\" class=\"term-link\" title=\"2 topics\">Huawei<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Twitter\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/twitter\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=twitter\" class=\"term-link\" title=\"2 topics\">Twitter<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Reddit\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/reddit\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=reddit\" class=\"term-link\" title=\"1 topics\">Reddit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"McAfee\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mcafee\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=mcafee\" class=\"term-link\" title=\"1 topics\">McAfee<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Malaysia Airlines\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/malaysia-airlines\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=malaysia-airlines\" class=\"term-link\" title=\"1 topics\">Malaysia Airlines<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Seagate\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/seagate\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=seagate\" class=\"term-link\" title=\"1 topics\">Seagate<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Target\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/target\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=target\" class=\"term-link\" title=\"1 topics\">Target<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Maxtor\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/maxtor\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=maxtor\" class=\"term-link\" title=\"1 topics\">Maxtor<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Snapchat\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/snapchat\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=snapchat\" class=\"term-link\" title=\"1 topics\">Snapchat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ericsson\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ericsson\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=ericsson\" class=\"term-link\" title=\"1 topics\">Ericsson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=facebook\" class=\"term-link\" title=\"1 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Intel\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/intel\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=intel\" class=\"term-link\" title=\"1 topics\">Intel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. State Department\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-state-department\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=u-s-state-department\" class=\"term-link\" title=\"1 topics\">U.S. State Department<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Der Spiegel\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/der-spiegel\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=der-spiegel\" class=\"term-link\" title=\"1 topics\">Der Spiegel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dell\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dell\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=dell\" class=\"term-link\" title=\"1 topics\">Dell<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The New York Times\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/the-new-york-times\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=the-new-york-times\" class=\"term-link\" title=\"1 topics\">The New York Times<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Samsung\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/samsung\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=samsung\" class=\"term-link\" title=\"1 topics\">Samsung<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Avast\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/avast\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=avast\" class=\"term-link\" title=\"1 topics\">Avast<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=u-s-federal-government\" class=\"term-link\" title=\"1 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hewlett-Packard (HP)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=hewlett-packard-hp\" class=\"term-link\" title=\"1 topics\">Hewlett-Packard (HP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BBC\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/bbc\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=bbc\" class=\"term-link\" title=\"1 topics\">BBC<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dropbox\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dropbox\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=dropbox\" class=\"term-link\" title=\"1 topics\">Dropbox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ebay\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ebay\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=ebay\" class=\"term-link\" title=\"1 topics\">ebay<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CHS\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/chs\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=chs\" class=\"term-link\" title=\"1 topics\">CHS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/blackberry\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=blackberry\" class=\"term-link\" title=\"1 topics\">BlackBerry<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireEye\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fireeye\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=fireeye\" class=\"term-link\" title=\"1 topics\">FireEye<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tresorit\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/tresorit\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=tresorit\" class=\"term-link\" title=\"1 topics\">Tresorit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Massachusetts Institute of Technology (MIT)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/massachusetts-institute-of-technology-mit\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=massachusetts-institute-of-technology-mit\" class=\"term-link\" title=\"1 topics\">Massachusetts Institute of Technology (MIT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mt. Gox\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mt-gox\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;company=mt-gox\" class=\"term-link\" title=\"1 topics\">Mt. Gox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Edward Snowden\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/\"><span class=\"bar\" style=\"width:8.1081081081081%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;person=edward-snowden\" class=\"term-link\" title=\"3 topics\">Edward Snowden<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mark Karpeles\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mark-karpeles\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;person=mark-karpeles\" class=\"term-link\" title=\"1 topics\">Mark Karpeles<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Aaron Swartz\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/aaron-swartz\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;person=aaron-swartz\" class=\"term-link\" title=\"1 topics\">Aaron Swartz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/author\/superglaze\/\" class=\"term-link\" title=\"37 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>37<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:54.054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+security\/?authors=superglaze\" class=\"term-link\" title=\"20 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>20<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:16.216216216216%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+china\/?authors=superglaze\" class=\"term-link\" title=\"6 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/surveillance\/\"><span class=\"bar\" style=\"width:13.513513513514%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+surveillance\/?authors=superglaze\" class=\"term-link\" title=\"5 topics\">surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:13.513513513514%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+privacy\/?authors=superglaze\" class=\"term-link\" title=\"5 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"asia\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/asia\/\"><span class=\"bar\" style=\"width:10.810810810811%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+asia\/?authors=superglaze\" class=\"term-link\" title=\"4 topics\">asia<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Belgacom\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/belgacom\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+belgacom\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">Belgacom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"North Korea\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/north-korea\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+north-korea\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">North Korea<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Russia\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/russia\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+russia\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">Russia<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ukraine\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/ukraine\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+ukraine\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">ukraine<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cyberattack\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyberattack\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+cyberattack\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">cyberattack<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Germany\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/germany\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+germany\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">Germany<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+denial-of-service-dos\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"anonymous\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/anonymous\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+anonymous\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">anonymous<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lizard Squad\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/lizard-squad\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+lizard-squad\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">Lizard Squad<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The Interview\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/the-interview\/\"><span class=\"bar\" style=\"width:5.4054054054054%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+the-interview\/?authors=superglaze\" class=\"term-link\" title=\"2 topics\">The Interview<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"two-factor authentication\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/two-factor-authentication\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+two-factor-authentication\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">two-factor authentication<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Network backbone\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/network-backbone\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+network-backbone\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Network backbone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Angela Merkel\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/angela-merkel\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+angela-merkel\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Angela Merkel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"swatting\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/swatting\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+swatting\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">swatting<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"G20\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/g20\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+g20\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">G20<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BSI\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/bsi\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+bsi\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">BSI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data breach\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-breach\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+data-breach\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">data breach<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Switzerland\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/switzerland\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+switzerland\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Switzerland<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"South Korea\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/south-korea\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+south-korea\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">South Korea<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mass surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mass-surveillance\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+mass-surveillance\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Mass surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intelligence community\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/intelligence-community\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+intelligence-community\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">intelligence community<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"strong crypto\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/strong-crypto\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+strong-crypto\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">strong crypto<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Backdoor\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/backdoor\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+backdoor\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Backdoor<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intelligence agencies\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/intelligence-agencies\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+intelligence-agencies\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">intelligence agencies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Greece\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/greece\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+greece\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Greece<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Martin Schulz\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/martin-schulz\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+martin-schulz\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Martin Schulz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Child pornography\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/child-pornography\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+child-pornography\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Child pornography<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silk Road\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silk-road\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+silk-road\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Silk Road<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Duma\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/duma\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+duma\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Duma<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"crypto wars\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/crypto-wars\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+crypto-wars\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">crypto wars<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CyberBerkut\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyberberkut\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+cyberberkut\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">CyberBerkut<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Spies\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spies\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+spies\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Spies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Austerity\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/austerity\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+austerity\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Austerity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"spear phishing\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spear-phishing\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+spear-phishing\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">spear phishing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"pastebin\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/pastebin\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+pastebin\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">pastebin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"drugs\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/drugs\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+drugs\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">drugs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Vladimir Putin\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/vladimir-putin\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+vladimir-putin\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Vladimir Putin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Pornography\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/pornography\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+pornography\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Pornography<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Selfies\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/selfies\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+selfies\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Selfies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jennifer Lawrence\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jennifer-lawrence\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+jennifer-lawrence\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Jennifer Lawrence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Botnet\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/botnet\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+botnet\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Botnet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Omand\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/david-omand\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+david-omand\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">David Omand<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"consumer electronics\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/consumer-electronics\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+consumer-electronics\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">consumer electronics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Escrow\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/escrow\/\"><span class=\"bar\" style=\"width:2.7027027027027%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking+escrow\/?authors=superglaze\" class=\"term-link\" title=\"1 topics\">Escrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"David Meyer\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/superglaze\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/\" class=\"term-link\" title=\"37 topics\">David Meyer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>37<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:91.891891891892%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;go-type=news-post\" class=\"term-link\" title=\"34 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>34<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:91.891891891892%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;go-property=gigaom\" class=\"term-link\" title=\"34 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>34<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/tag\/hacking\/?authors=superglaze&#038;go-availability=free\" class=\"term-link\" title=\"37 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>37<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
