Merry Christmas 2025 | A Wish for the People Who Never Fully Get the Day Off Originally published December 24, 2025 It’s Christmas Eve in the United States, and I’m saying, “Merry Christmas!” Everyone is free to call it whatever they like. That part isn’t the point. The point […]
Quantum Technology and Security Status 2025
Quantum Technology and Security Status | 2025 Prepared as a Comprehensive Enterprise / Expert Briefing This briefing provides an overview of the delta in quantum technology and quantum security from 2023 through 2025. Structure of this briefing: Introduction → Tech Landscape → Vendors → Standards → Regulatory → Applications […]
Outbound Links, Digital Reputation, and Institutional Process
Outbound Links, Digital Reputation, and Institutional Process | Lessons from Real-World Experience Linking to authoritative online sources is essential for accuracy, trust, and user safety online. However, independent researchers face challenges like blocked links, digital reputation attacks, and labor-intensive site maintenance. This article shares real-world experience, offers practical solutions, […]
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP
When the “Good Guys” Normalize Theft | Hacking Human Ethics and IP Abstract In fields built on trust, integrity, and protection, such as cybersecurity, research, and intelligence-adjacent work, the normalization of intellectual theft and plagiarism represents not a minor ethical lapse, but a systemic failure. This article explains why […]
User-First Marketing Email Defaults | A Rare Example of Doing It Right
Finally, a Company Doing Email Defaults Right | A Case for Common Sense Privacy Preferences It’s been years since I’ve seen a company implement email preferences in a way that actually respects the user. And yes, I say this often: I’d love for just one company to “get it […]
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering
The Unveiling of Hacking Humans | The Ports and Services Model of Social Engineering Hunter Storm’s Hacking Humans | The Ports and Services Model of Social Engineering framework is the first predictive framework for human-layer threat modeling, built starting in 1994, fully matured by 2000, and presented publicly in […]
Playing Reindeer Games | Documenting Accuracy, Intervention, and Integrity
Playing Reindeer Games | Documenting Accuracy, Intervention, and Integrity It’s always the right time of year to keep an eye on published content. That’s especially true in my case, where I work with sensitive topics and information. That’s why I’m writing about how some of my professional pages, including […]





