UNMITIGATED RISK
Confidential Computing’s Inconvenient Truth
What Is Confidential Computing, What It Isn’t, and How to Think About It
Why Nobody Can Verify What Booted Your Server
We Built It With Slide Rules. Then We Forgot How.
The WebPKI and Client Authentication Are at a Crossroads
Introducing the WebPKI Observatory
Signed, Auditable, Offline-Tolerant, PQ Secure QR Codes
When Compliance Records Become the Only Honest Signal
The Signal They Chose to Ignore
Duplicates Are Not the Problem
Teach to the Median, Punish the Variance
The Data Doesn’t Support the Narrative
When Building Gets Cheap, Distribution Becomes Destiny
Domain Control Validation Grew Up. It Only Took Thirty Years.
Disdain or Design?
You’re Not Outsourcing Infrastructure. You’re Outsourcing Capability.
Agents Are More Like Humans Than Workloads. Here’s Why That Matters for Identity.
“A Few Hours” and the Slow Erosion of Auditable Commitments
The Housing Affordability Crisis
Intuition Comes Last
The Impossible Equation
Attestation, What It Really Proves and Why Everyone Is About to Care
The Vanishing On-Ramp
Beyond Gutenberg: How AI Is Teaching Us to Think About Thinking
Compliance at the Speed of Code
Gradually, Then Suddenly: Compliance as a Vital Sign of Organizational Decay
Beyond the Mathematics, Deploying Advanced Crypto Successfully
Another Sleeping Giant: Microsoft’s Root Program and the 1.1.1.1 Certificate Slip
How Microsoft Code Signing Became Part of a Trust Subversion Toolchain
From Persistent to Ephemeral: Why AI Agents Need Fresh Identity for Every Mission
Talent Isn’t a Security Strategy
History Doesn’t Repeat, But It Rhymes: The AI Panic Edition
When Automation Becomes Bureaucracy
How a $135 Billion Fraud Bootstrapped America’s Digital Identity System