RSS.Social

UNMITIGATED RISK

follow: @[email protected]

Posts

Confidential Computing’s Inconvenient Truth

What Is Confidential Computing, What It Isn’t, and How to Think About It

Why Nobody Can Verify What Booted Your Server

We Built It With Slide Rules. Then We Forgot How.

The WebPKI and Client Authentication Are at a Crossroads

Introducing the WebPKI Observatory

Signed, Auditable, Offline-Tolerant, PQ Secure QR Codes

When Compliance Records Become the Only Honest Signal

The Signal They Chose to Ignore

Duplicates Are Not the Problem

Teach to the Median, Punish the Variance

The Data Doesn’t Support the Narrative

When Building Gets Cheap, Distribution Becomes Destiny

Domain Control Validation Grew Up. It Only Took Thirty Years.

Disdain or Design?

You’re Not Outsourcing Infrastructure. You’re Outsourcing Capability.

Agents Are More Like Humans Than Workloads. Here’s Why That Matters for Identity.

“A Few Hours” and the Slow Erosion of Auditable Commitments

The Housing Affordability Crisis

Intuition Comes Last

The Impossible Equation

Attestation, What It Really Proves and Why Everyone Is About to Care

The Vanishing On-Ramp

Beyond Gutenberg: How AI Is Teaching Us to Think About Thinking

Compliance at the Speed of Code

Gradually, Then Suddenly: Compliance as a Vital Sign of Organizational Decay

Beyond the Mathematics, Deploying Advanced Crypto Successfully

Another Sleeping Giant: Microsoft’s Root Program and the 1.1.1.1 Certificate Slip

How Microsoft Code Signing Became Part of a Trust Subversion Toolchain

From Persistent to Ephemeral: Why AI Agents Need Fresh Identity for Every Mission

Talent Isn’t a Security Strategy

History Doesn’t Repeat, But It Rhymes: The AI Panic Edition

When Automation Becomes Bureaucracy

How a $135 Billion Fraud Bootstrapped America’s Digital Identity System