There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with “white-hat” hackers, who guard your online security. But Read More …
Category: Soapbox
I might rat on a few things in this field here and there.
How you build a personal brand
To my kids…….. Personal branding is all about how you present yourself to the world, especially on social media and other online platforms. As you enter your teenage years, it’s a great time to think about how you want others to see you. Your personal brand is shaped by your interests, values, and the way Read More …
The Natal Conference
The Natal Conference, an event that has drawn attention for its controversial connections to eugenics and the political right’s increasing embrace of extreme measures regarding population and reproductive policies. The conference, organized by individuals with ties to the pronatalist movement, aims to promote higher birth rates, particularly among certain demographics, which raises significant ethical concerns. Read More …
Security is underwater
Also , there are no life preservers. In a recent reflection on conversations I’ve had, I’ve noticed a recurring theme that highlights the disconnect between non-IT professionals and security experts regarding data handling and application deployment. Non-IT individuals often enthusiastically present their newly developed applications that utilize specific data and share it with various users, Read More …
Chats with AI – Shadows in the Cloud
In the bustling city of Techhaven, where skyscrapers gleamed with digital screens and the hum of innovation filled the air, a tech company named Cloud Sphere was making waves. Known for its cutting-edge cloud solutions, Cloud Sphere had rapidly become a leader in the industry. However, beneath the surface of success, a storm was brewing. Read More …
Chat with AI – Cloud Only Hacker
Attackers are increasingly able to meet their objectives by compromising corporate cloud accounts and subsequently moving laterally within the cloud environment, often without needing to breach individual endpoints. Several factors are driving this trend: Expanded Attack Surface in the Cloud: As organizations increasingly adopt cloud services and SaaS solutions, the attack surface has grown larger Read More …
What is Urbit OS?
Urbit is a decentralized, peer-to-peer network and operating system designed to give users complete control over their digital activities and data, offering a more private, secure, and durable alternative to the current internet. Here’s a more detailed breakdown: [2, 4, 6] Decentralized and Peer-to-Peer: Unlike the traditional client-server internet model, Urbit is built on a Read More …
How Tech Billionaires Plan to Destroy America
A look into how the tech leaders may be using the new administration to achieve their own agenda. Looking specifically at Peter Thiel, Elon Musk, Marc Andreessen, Ben Horowitz, Brian Armstrong, and David Sacks as well as their relationship with figures like JD Vance, Balaji Srinivasan, and Curtis Yarvin. There is a focused discussion on Read More …
The Dangers of Project Russia
A wonderfully frightening read. My friends and family will attest, that many times I have stated that we are in open warfare with Russia in the internet/ technological realm of things. The Russia Information Warfare Manual is a very good read. The books offered a detailed program of spiritual warfare against Western democracies culminating in Read More …
Don’t track my kids
A blurb of a post this time, but something I want to make sure everyone is aware of. Remember, Remember If your kids are a member Then they became the product and the future is out of luck Don’t track my kids We need to make sure our kids get a chance to be kids, Read More …