Is AI Dangerous? A Clear Explanation from “My Favorite Evil Machine” I call it “my favorite evil machine” — partly to amuse myself, partly to remind everyone that AI isn’t plotting world domination… yet humans often are. That’s why the image for this article is so on the nose. It’s […]
Codifying the Unwritten Rules
Codifying the Unwritten Rules | Why Neutral, Low‑Noise Rooms Matter in Technical Communities For decades, the most effective teams in the world have relied on a simple truth: high‑performance environments only work when the noise stays low. We don’t need silence, conformity, or ideology. We do need clarity, courtesy, and focus. In […]
Why So Many Websites Read Like War and Peace
Why So Many Websites Read Like War and Peace and Why That’s Not an Accident If you’ve ever landed on a website and thought, “Why is this so long?”—you’re not wrong. Somewhere between the opening paragraph and the fifteenth subheading, many modern web pages begin to feel less like explanations […]
StormWatch | Lessons from the CISA ChatGPT Incident
StormWatch | When Public AI Meets Government Secrets | Lessons from the CISA ChatGPT Incident What Happened The Acting Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA)—Madhu Gottumukkala—uploaded government documents marked “for official use only” to a public version of ChatGPT last summer. These were not classified documents, […]
Why I Removed Social Media Sharing Buttons
Why I Removed Social Media Sharing Buttons | Refusing to Feature Without Blocking For a long time, I featured social media sharing buttons prominently on my website. I didn’t find them especially useful. However, I thought they improved the experience for readers. Other people expected them. I believed, at the […]
Serious Horseplay | When Gifts Become Trojan Horses
Gifts as Trojan Horses | The Security Risk of Swag, Pins, and USB Drives Why high-trust tokens can create low-noise risk, and what “good tradecraft” looks like. The Gift That Keeps on Giving It’s a shame, but it’s reality: sometimes the easiest way into a sensitive environment isn’t hacking […]
Public AI, Private Data | Why Uploading Sensitive Information Is a Systemic Failure—Not an AI Problem
StormWatch | Public AI, Private Data | Why Uploading Sensitive Information Is a Systemic Failure—Not an AI Problem Executive Summary A recent, widely reported incident involving a senior government cybersecurity official uploading sensitive—but unclassified—documents into a public AI system triggered alarms and internal reviews. Predictably, the conversation veered toward […]






