Category: Uncategorized
-
Current Events 3
https://www.polygon.com/22988960/elden-ring-invader-hack-corrupted-save-file-fix (I swear I didn’t chose this article just because I wanted to talk about Elden Ring. Promise.) For my second book post I read The Cult of the Dead Cow, a documentary-style novel about the most prestigious hacking group in history. Though they’d go on to coin the term hacktivism and push hacking to…
-
Book-Inspired Post 2- The Cult of the Dead Cow
While reading the Cult of the Dead Cow, it struck me, much like The Cuckoo’s Egg had, how different digital security was viewed back in the early days in the internet. In CDC’s case though, it stood out just how laughably flimsy digital security was in the early days. On the one hand, I can…
-
Current Event 2
https://www.cnn.com/2022/04/06/tech/axie-infinity-hack-binance-a16z-investment/index.html Regarding the Axie Infinity Hack, it’s astonishing to me not only that 625 million dollars were stolen, not only that Axie Ininity’s security was lax enough to for such an enormous breach to occur, but that it took them more than a week to realize someone had pulled more than half a billion dollars…
-
Smallish Post 12
You know, I’ve been thinking recently. We’ve been talking about entrepreneurship in class a lot, and specifically about balancing our need for intentional, productive R&R with hard work and drive. During class I found myself nodding, but then I rode the train home with a pit in my stomach– the pit of hypocrisy. My work…
-
Smallish Post 11
If you were to publish a book today, it would remain under copyright for another hundred and twenty years (or somewhere in that ballpark). When copy right was originally invented, the idea was to protect the works and ideas of innovators and visionaries while encouraging others to be equally innovative and visionary. The laws we…
-
Current Event one
https://www.cnn.com/2022/03/25/tech/eu-big-tech-competition-rules/index.html First as a side note, I’m shocked I’ve never heard of this before. This article alone made me feel the coming repercussions of the DMA. The way this article talks about what the DMA labels “gatekeepers” reminds me of the mega-factories of the industrial revolution; companies who employed you, controlled your market and even…
-
Smallish Post 10
In The Cuckoo’s Egg, the number one security weakness that the hacker exploited was accounts that either had weak passwords or never changed the password from the default. That stuck out to me, because last semester I did a paper about cyber security and the need to police the internet. I argued that more effective…
-
Book Inspired Post- The Cuckoo’s Egg
In The Cuckoo’s Egg, a major problem that the narrator of the story kept running into was the ‘not my bailiwick’ problem. To summarize briefly, as the narrator discovered the further and further sprawling reach of the hacker problem, he reached out (grudgingly) to pretty much every government agency he could snag by the earlobe.…
-
Smallish post 8 -bulleted list
On Monday bought, downloaded, and played Elden Ring. On Tuesday I filled out my homework planner, budgeted out my time for the week, and then played Elden Ring. On Wednesday I sat down to tackle my homework for the day, finished about half a math question, and then played Elden Ring. On Thursday I revised…
-
Smallish Post 7- Bulleted List
Step one, hit the power switch. Step two, grab some snacks. Step three, pull up a chair. Step four, find some good YouTube videos. Step five, look up from your phone every once in a while to see if Windows is done updating.

