-
Investing
Encouraging a Weaker US Dollar is Bad Economic Policy
Jai Kedia The US dollar (USD) is the world’s reserve currency and has served as a safe haven for investors…
Read More » -
Economy
AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says
AI search engine Perplexity is using stealth bots and other tactics to evade websites’ no-crawl directives, an allegation that if…
Read More » -
Investing
Zenger at 290: The Jury’s Duty to Say No to Government Oppression
Mike Fox Two hundred ninety years ago today, in what would come to be known as a celebrated early example…
Read More » -
Investing
Trump Accounts Won’t Replace Social Security or Help Americans Build Significant Wealth
Adam N. Michel The newly created Trump Accounts in the One Big Beautiful Bill are being pitched as a way…
Read More » -
Investing
How Special Interests Keep Bad Laws on the Books: The Case of the Jones Act
Colin Grabow Seven years ago, the Cato Institute launched its project on reforming the Jones Act—the 1920 law that restricts…
Read More » -
Economy
At $250 million, top AI salaries dwarf those of the Manhattan Project and the Space Race
Silicon Valley’s AI talent war just reached a compensation milestone that makes even the most legendary scientific achievements of the…
Read More » -
Investing
No, Tariffs Are Not Similar to Consumption Taxes Like a VAT
Kyle Handley Some tariff supporters have tried to rebrand tariffs as nothing more than a consumption tax, arguing they’re just…
Read More » -
Investing
Friday Feature: Thales Academy
Colleen Hroncich Thales Academy was founded in 2007 by entrepreneur Bob Luddy, who was frustrated when he realized how poorly…
Read More » -
Investing
Are Stablecoins CBDCs in Disguise? No
Nicholas Anthony A growing concern has emerged in recent years that stablecoins are secretly central bank digital currencies (CBDCs) in…
Read More » -
Economy
Microsoft catches Russian hackers targeting foreign embassies
Russian-state hackers are targeting foreign embassies in Moscow with custom malware that gets installed using adversary-in-the-middle attacks that operate at…
Read More »