Security
Permission systems, access control, authentication methods, data exposure models, and how software manages trust and authorization.
3 lessons in this category
May 2026
-
22 May 5 min
Estonian Prime Minister Michal: We are facing increasing cyberattacks from Russia - CNN
Estonia's Prime Minister discussing increased Russian cyberattacks touches ordinary people's days through the internet infrastructure they rely on. We can teach how cyberattacks actually work—what happens when a nation-state targets another country's digital systems, what makes critical infrastructure vulnerable, and how defensive cybersecurity operates in practice.
-
21 May 7 min
The power of A.I. lobbyists in U.S. statehouses - NBC New York
AI lobbyists are actively shaping state legislation that will govern how artificial intelligence affects ordinary people's lives — from employment to privacy to public services. We can teach how lobbying actually works: who gets access to legislators, what information shapes bills before the public sees them, and why state-level regulation often determines technology's real-world impact before federal law catches up.
-
18 May 7 min
What 'Link Your Bank Account' Actually Means
ChatGPT can now link bank accounts. What does 'link' actually mean, what data flows, and how do you evaluate whether convenience justifies exposure?