<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
    <title>Nico Kokonas</title>
    <subtitle>Software engineer specializing in scraping and distributed systems.</subtitle>
    <link rel="self" type="application/atom+xml" href="https://nicomee.ai/atom.xml"/>
    <link rel="alternate" type="text/html" href="https://nicomee.ai"/>
    <generator uri="https://www.getzola.org/">Zola</generator>
    <updated>2025-12-01T00:00:00+00:00</updated>
    <id>https://nicomee.ai/atom.xml</id>
    <entry xml:lang="en">
        <title>Get the Fuck Off of GitHub.</title>
        <published>2025-12-01T00:00:00+00:00</published>
        <updated>2025-12-01T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/blog/get-the-fuck-off-github/"/>
        <id>https://nicomee.ai/blog/get-the-fuck-off-github/</id>
        
        <content type="html" xml:base="https://nicomee.ai/blog/get-the-fuck-off-github/">&lt;p&gt;For almost two decades, I poured my life into open-source contributions on GitHub. Commits, issues, pull requests, discussions--a living, breathing portfolio that represented 15-20 years of my professional credibility and passion. Then, without a single explanation, without a notification, without any recourse, it was all erased. Gone. Just like that.&lt;&#x2F;p&gt;
&lt;p&gt;Every person who voiced concerns about EvilCorp&#x27;s acquisition of GitHub was absolutely correct. This isn&#x27;t just an inconvenience; it&#x27;s a brutal, catastrophic loss for any open-source contributor who relies on that history for their professional standing, for interviews, for their very livelihood. It is absolutely disgusting.&lt;&#x2F;p&gt;
&lt;p&gt;There was no way to contact support. In fact, a new account I tried to create to reach out to them was immediately banned, citing rules that prohibit contacting support from a new account. The irony is as infuriating as the situation itself. This is not how a platform that claims to foster a community of developers should operate. This is how a monolithic entity, insulated from consequences, exercises unchecked power over its users.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-warning-signs-were-there&quot;&gt;The Warning Signs Were There&lt;&#x2F;h2&gt;
&lt;p&gt;Many of us watched with apprehension as Microsoft acquired GitHub. The promises of independence and continued support for the open-source ethos felt increasingly hollow as subtle changes began to creep in. The platform that once felt like a true home for developers has transformed into another corporate silo, where user value is secondary to opaque internal policies and uncommunicated decisions.&lt;&#x2F;p&gt;
&lt;p&gt;This isn&#x27;t just about my personal loss. It&#x27;s a stark warning to every developer, every team, and every organization building on GitHub: your history, your contributions, and your entire digital presence are subject to the arbitrary whims of a corporation that offers no transparency and no accountability.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;my-new-home-sr-ht&quot;&gt;My New Home: sr.ht&lt;&#x2F;h2&gt;
&lt;p&gt;I&#x27;ve already begun the migration. My new home for open-source development is &lt;a href=&quot;https:&#x2F;&#x2F;sr.ht&#x2F;&quot;&gt;sr.ht&lt;&#x2F;a&gt;. It&#x27;s a different paradigm, focusing on simple, powerful tools that respect developers and their work. It&#x27;s a breath of fresh air after the suffocating corporate control I&#x27;ve just experienced. It&#x27;s a community-driven platform that puts control back into the hands of developers, offering mailing lists, Git repositories, bug trackers, and build automation. It embodies the true spirit of open source.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;archival-efforts-limited-utility&quot;&gt;Archival Efforts (Limited Utility)&lt;&#x2F;h2&gt;
&lt;p&gt;While my active history on GitHub is effectively erased, some archives of my repositories can still be found. Though their utility is limited--they are static snapshots, not living, breathing projects--they stand as a testament to what once was.&lt;&#x2F;p&gt;
&lt;p&gt;You can find an archive of my former GitHub profile here:
&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20250903093910&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20250903093910&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;p&gt;Repositories:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;*&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee*&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;&lt;em&gt;&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;em&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Stars:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;*&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee*&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;&lt;em&gt;&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;em&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-future-a-ui-for-the-past&quot;&gt;The Future: A UI for the Past&lt;&#x2F;h2&gt;
&lt;p&gt;On my to-do list is building some sort of UI that will allow me to easily query these GitHub archives, pulling up my past repositories and contributions. It&#x27;s a necessary step to reclaim a semblance of the visibility and credibility that was so unceremoniously taken from me. This project will serve as a reminder that while platforms can disappear your work, the spirit of open source, and the determination of its contributors, cannot be extinguished.&lt;&#x2F;p&gt;
&lt;p&gt;It&#x27;s time for all of us to critically re-evaluate where we host our work. The risks are too high, and the consequences too severe, to remain complacent. Get the fuck off of GitHub before it&#x27;s too late.&lt;&#x2F;p&gt;
&lt;p&gt;This tracks with pretty much things I see every day:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;ziglang.org&#x2F;news&#x2F;migrating-from-github-to-codeberg&#x2F;&quot;&gt;Ziglang migrating from GitHub to Codeberg&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>I Miss Christopher Lasch</title>
        <published>2025-01-29T00:00:00+00:00</published>
        <updated>2025-01-29T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/blog/i-miss-christopher-lasch/"/>
        <id>https://nicomee.ai/blog/i-miss-christopher-lasch/</id>
        
        <content type="html" xml:base="https://nicomee.ai/blog/i-miss-christopher-lasch/">&lt;p&gt;In an era defined by profound disquiet--marked by surging populism, widening economic chasms, and a palpable sense of cultural fragmentation--the insights of American historian and social critic Christopher Lasch resonate with an almost prophetic clarity. From his incisive critique of unchecked progress in &lt;em&gt;The True and Only Heaven&lt;&#x2F;em&gt; to his stark diagnosis of elite detachment in &lt;em&gt;The Revolt of the Elites and the Betrayal of Democracy&lt;&#x2F;em&gt;, Lasch offers not just a historical account, but a powerful explanatory framework for understanding the profound malaise afflicting Western democracies today. He delineates a through-line, demonstrating how the very forces championed as drivers of modernity have inadvertently hollowed out the foundations of genuine self-governance.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;lasch-books.jpg&quot; alt=&quot;Christopher Lasch Books&quot; &#x2F;&gt;
&lt;em&gt;Key works by Christopher Lasch that remain essential reading for understanding today&#x27;s democratic crisis&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-illusion-of-progress-and-the-erosion-of-limits&quot;&gt;The Illusion of Progress and the Erosion of Limits&lt;&#x2F;h2&gt;
&lt;p&gt;Lasch&#x27;s intellectual journey began with a profound skepticism toward the prevailing ideology of &lt;strong&gt;&quot;progress.&quot;&lt;&#x2F;strong&gt; In &lt;em&gt;The True and Only Heaven: Progress and Its Critics&lt;&#x2F;em&gt;, he argued that the relentless pursuit of material accumulation and the belief in humanity&#x27;s boundless capacity to master nature had come at a steep cost.&lt;&#x2F;p&gt;
&lt;p&gt;This uncritical faith in progress, he contended, undermined traditional virtues like:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Civic responsibility&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Self-restraint&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Recognition of human limitations&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Both the political left and right, in their own ways, became complicit in this narrative, failing to champion a robust sense of public spiritedness over the insatiable demands of consumerism and economic expansion.&lt;&#x2F;p&gt;
&lt;p&gt;Lasch saw the decline of vibrant local communities and the rise of a centralized, bureaucratic state as directly linked to this ethos of progress. As institutions increasingly assumed functions once held by families and neighborhoods, individuals were progressively &lt;strong&gt;infantilized&lt;&#x2F;strong&gt;, their capacity for self-reliance and collective action diminished.&lt;&#x2F;p&gt;
&lt;p&gt;This paved the way for a &lt;strong&gt;&quot;culture of narcissism,&quot;&lt;&#x2F;strong&gt; where:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Self-absorption replaced civic engagement&lt;&#x2F;li&gt;
&lt;li&gt;Personal gratification overshadowed commitment to the common good&lt;&#x2F;li&gt;
&lt;li&gt;The &quot;American dream&quot; transformed from shared participation into shallow materialism&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-revolt-and-betrayal-of-the-elites&quot;&gt;The Revolt, and Betrayal, of the Elites&lt;&#x2F;h2&gt;
&lt;p&gt;While &lt;em&gt;The True and Only Heaven&lt;&#x2F;em&gt; laid the philosophical groundwork, &lt;em&gt;The Revolt of the Elites and the Betrayal of Democracy&lt;&#x2F;em&gt; offered a searing indictment of the class he believed was actively undermining democratic principles: the educated, affluent upper-echelon of society. Lasch inverted Ortega y Gasset&#x27;s famous thesis, arguing that the true threat to democracy came not from the &lt;strong&gt;&quot;revolt of the masses&quot;&lt;&#x2F;strong&gt; but from the &lt;strong&gt;&quot;revolt of the elites.&quot;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
&lt;p&gt;These new elites, largely drawn from the top 20% of income earners, were characterized by:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Rootlessness&lt;&#x2F;strong&gt; and detachment from place&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Globalized, cosmopolitan identity&lt;&#x2F;strong&gt; over national belonging&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Marked disinterest&lt;&#x2F;strong&gt; in the fate of their own nations&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Lasch famously described them as &lt;strong&gt;&quot;tourists in their own countries,&quot;&lt;&#x2F;strong&gt; their allegiances often more global than local. They segregated themselves in &lt;strong&gt;&quot;voluntary ghettos&quot;&lt;&#x2F;strong&gt; of wealth and privilege--exclusive neighborhoods, private schools, private healthcare--effectively withdrawing from the shared institutions and common life that bind a democratic society.&lt;&#x2F;p&gt;
&lt;p&gt;This detachment had profound consequences:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Degradation of Public Discourse&lt;&#x2F;strong&gt;: Lasch observed that elites increasingly controlled the terms of public debate, narrowing it to issues relevant to their own class while dismissing the legitimate concerns of ordinary citizens. Informed deliberation gave way to ideological posturing and facile name-calling.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Erosion of Shared Standards&lt;&#x2F;strong&gt;: The ascendancy of a &quot;meritocracy,&quot; which Lasch saw as a &quot;parody of democracy,&quot; replaced a belief in general competence and shared civic responsibility with an emphasis on specialized expertise and individual professional advancement. This fostered a contempt for manual labor and a widening gap between the &quot;thinking classes&quot; and the working class.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Spiritual and Moral Decay&lt;&#x2F;strong&gt;: Having jettisoned traditional moral and ethical guidelines, often under the guise of scientific progress or &quot;liberation,&quot; these elites cultivated a culture of cynicism, detached from any sense of collective purpose or shared destiny.&lt;&#x2F;p&gt;
&lt;p&gt;The &lt;strong&gt;&quot;betrayal of democracy,&quot;&lt;&#x2F;strong&gt; in Lasch&#x27;s view, was multifaceted:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Abandonment of public institutions&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Intellectual disdain&lt;&#x2F;strong&gt; for the common person&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Prioritization of private advantage&lt;&#x2F;strong&gt; over public good&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Systematic hollowing out&lt;&#x2F;strong&gt; of civic infrastructure necessary for functioning democracy&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;connecting-to-our-current-crisis&quot;&gt;Connecting to Our Current Crisis&lt;&#x2F;h2&gt;
&lt;p&gt;Lasch&#x27;s analysis, written decades ago, feels acutely relevant to our present moment of crisis.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Political Polarization and Populism&lt;&#x2F;strong&gt;: The rise of populist movements across the Western world, from the election of Donald Trump to Brexit and the ascent of far-right parties in Europe, can be seen as a direct consequence of the elite detachment Lasch described. Large segments of the population feel &quot;left behind&quot; and unrepresented by traditional political establishments, leading them to embrace figures who articulate grievances against &quot;the elites.&quot; The often-vituperative nature of contemporary political discourse, where nuance is lost to ideological purity tests and mutual condemnation, directly echoes Lasch&#x27;s concern about the degradation of public debate.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Economic Inequality and Social Fragmentation&lt;&#x2F;strong&gt;: The widening gap between the rich and the rest, a defining feature of the 21st century, exacerbates the sense of elite detachment. Billionaires who fund private space ventures while public infrastructure crumbles, or tech magnates who advocate for &quot;disruption&quot; while workers face precarity, embody the &quot;secession of the successful.&quot; This economic stratification reinforces cultural fragmentation, as different socio-economic groups increasingly inhabit distinct realities, with limited shared experiences or common institutions.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Erosion of Trust in Institutions&lt;&#x2F;strong&gt;: From mainstream media to government bodies and academic institutions, trust is at an all-time low. Lasch would argue that this is not merely a failure of communication, but a symptom of the elite&#x27;s withdrawal and their perceived indifference to the concerns of the broader public. When elites are seen as self-serving and detached, the institutions they lead are inevitably viewed with suspicion. The &quot;meritocracy&quot; he critiqued has led to a perceived lack of accountability and an alienation from traditional pathways to social mobility for many.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Cultural Wars and Identity Politics&lt;&#x2F;strong&gt;: While Lasch was critical of identity politics when it devolved into moralistic self-indulgence (as he explored in The Culture of Narcissism), his broader critique of a fragmented public sphere provides context for the intensity of today&#x27;s cultural wars. Without shared civic values or a common cultural ground, society risks dissolving into warring factions, each retreating into its own &quot;lifestyle enclave&quot; or ideological bubble, precisely as Lasch feared.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;lasch-s-explanatory-framework&quot;&gt;Lasch&#x27;s Explanatory Framework&lt;&#x2F;h2&gt;
&lt;p&gt;Christopher Lasch provides a powerful through-line to our current democratic malaise by shifting the focus from the failures of the &lt;strong&gt;&quot;masses&quot;&lt;&#x2F;strong&gt; to the failures of the &lt;strong&gt;&quot;elites.&quot;&lt;&#x2F;strong&gt; He argues that the uncritical embrace of &quot;progress&quot; and the subsequent detachment of the educated and wealthy have systematically weakened the democratic fabric.&lt;&#x2F;p&gt;
&lt;p&gt;His work suggests that the current crisis is not a sudden aberration but the culmination of long-term trends:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;The erosion of civic virtue&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The decline of shared public life&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The intellectual and moral capitulation&lt;&#x2F;strong&gt; of those entrusted with democratic stewardship&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;He compels us to confront uncomfortable truths: that a healthy democracy requires not just formal institutions, but:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;A robust civic culture&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;A commitment to common standards&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;A recognition of limits&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Mutual obligation between all citizens&lt;&#x2F;strong&gt;, regardless of class&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;For Lasch, the democratic project demands &lt;strong&gt;humility&lt;&#x2F;strong&gt;, &lt;strong&gt;self-restraint&lt;&#x2F;strong&gt;, and a &lt;strong&gt;rootedness in shared experience&lt;&#x2F;strong&gt;--qualities that he argued have been systematically undermined by the very forces that define modern elite culture.&lt;&#x2F;p&gt;
&lt;p&gt;His legacy forces us to ask whether our elites, by their actions and their worldview, have indeed &lt;strong&gt;betrayed democracy&lt;&#x2F;strong&gt;, and whether a renewal of democratic life can only emerge from a &lt;strong&gt;radical re-engagement with the common good&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>The Dark Web Monitoring Scam</title>
        <published>2025-01-25T00:00:00+00:00</published>
        <updated>2025-01-25T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/blog/scamification-security/"/>
        <id>https://nicomee.ai/blog/scamification-security/</id>
        
        <content type="html" xml:base="https://nicomee.ai/blog/scamification-security/">&lt;p&gt;Every major data breach brings a fresh wave of companies pushing &quot;dark web monitoring&quot; services with the predictability of vultures circling carrion.&lt;&#x2F;p&gt;
&lt;p&gt;Within hours of headlines announcing that millions of records have been compromised, your inbox fills with urgent offers from companies promising to scour the internet&#x27;s seedy underbelly, alerting you the moment your personal information surfaces on some shadowy hacker forum. The marketing is slick, the dashboards are impressive, and the value proposition sounds compelling: real-time protection against the digital underworld&#x27;s most dangerous criminals.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;It&#x27;s also largely, by any rational measure, &lt;em&gt;useless&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt;--a multibillion-dollar industry built on security theater and monetized anxiety.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;what-dark-web-monitoring-actually-does-spoiler-not-much&quot;&gt;What Dark Web Monitoring Actually Does (Spoiler: Not Much)&lt;&#x2F;h2&gt;
&lt;h3 id=&quot;the-marketing-promise&quot;&gt;The Marketing Promise&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s what these services &lt;strong&gt;claim&lt;&#x2F;strong&gt; in their carefully crafted marketing materials:&lt;&#x2F;p&gt;
&lt;p&gt;They&#x27;ll deploy sophisticated algorithms and expert analysts to continuously monitor dark web marketplaces, underground forums, and criminal databases for your personal information--email addresses, passwords, social security numbers, credit card details, driver&#x27;s license numbers, and even medical records. They paint a picture of digital vigilantes, working tirelessly in the shadows to protect your identity from the forces of cyber evil.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-reality&quot;&gt;The Reality&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s what they &lt;strong&gt;&lt;em&gt;actually&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; do:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;They run automated scripts that check a handful of publicly accessible databases and paste sites (many of which aren&#x27;t even on the actual dark web but rather the regular internet with a .onion mirror)&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;They look for exact string matches of the information you&#x27;ve provided them--ironically requiring you to hand over the very data you&#x27;re worried about protecting&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;Then, with great fanfare and urgent-sounding notifications, they tell you what you probably already know: that your email address from the 2019 Capital One breach is still floating around in the same database dump that&#x27;s been recycled through seventeen different &quot;MEGA BREACH COMPILATION&quot; torrents&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-fundamental-problems&quot;&gt;The Fundamental Problems&lt;&#x2F;h2&gt;
&lt;h3 id=&quot;1-it-s-reactive-not-preventive&quot;&gt;1. It&#x27;s Reactive, Not Preventive&lt;&#x2F;h3&gt;
&lt;blockquote&gt;
&lt;p&gt;By the time your information appears on any forum these services can actually monitor, the horse hasn&#x27;t just left the barn--it&#x27;s already been sold at auction, shipped overseas, and is winning races under a different name.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;p&gt;The damage is done. Your data has been exfiltrated, packaged, sold on private channels, potentially used for multiple fraudulent purposes, and only then--as an afterthought--dumped on some public forum where monitoring services might eventually spot it.&lt;&#x2F;p&gt;
&lt;p&gt;Consider the typical lifecycle of stolen data:&lt;&#x2F;p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Breach&lt;&#x2F;strong&gt;: Hackers quietly exfiltrate information&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Processing&lt;&#x2F;strong&gt;: They sort, validate, and package the data&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Private Sales&lt;&#x2F;strong&gt;: High-value targets are sold privately to trusted buyers&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Public Dumps&lt;&#x2F;strong&gt;: What eventually appears on public forums is typically the dregs&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;p&gt;By the time a monitoring service alerts you that your information has been &quot;discovered,&quot; you&#x27;re essentially being notified that your house has been burglarized, your valuables have been sold, and the empty boxes are now visible in the neighborhood dumpster.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;2-coverage-is-laughably-incomplete&quot;&gt;2. Coverage Is Laughably Incomplete&lt;&#x2F;h3&gt;
&lt;p&gt;The &quot;dark web&quot; isn&#x27;t some monolithic entity with a helpful central directory and search function. It&#x27;s a chaotic ecosystem of:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Thousands of constantly shifting forums&lt;&#x2F;li&gt;
&lt;li&gt;Private Telegram channels with rotating invite links&lt;&#x2F;li&gt;
&lt;li&gt;Discord servers that exist for days before vanishing&lt;&#x2F;li&gt;
&lt;li&gt;Encrypted marketplaces requiring proof of criminal activity to join&lt;&#x2F;li&gt;
&lt;li&gt;Private exchanges happening entirely through encrypted messaging apps&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;No monitoring service can cover even a fraction of where stolen data actually gets traded.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;p&gt;The most valuable criminal exchanges happen in invite-only forums that require:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Vouching from existing members&lt;&#x2F;li&gt;
&lt;li&gt;Proof of criminal capabilities&lt;&#x2F;li&gt;
&lt;li&gt;Substantial cryptocurrency deposits&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;What monitoring services actually watch are the digital equivalent of pawn shop windows--places where everyone can see what&#x27;s for sale, but where nothing of real value appears anymore.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;3-the-information-is-usually-old&quot;&gt;3. The Information Is Usually Old&lt;&#x2F;h3&gt;
&lt;p&gt;Most of the data these services triumphantly &quot;discover&quot; comes from breaches that happened &lt;strong&gt;years ago&lt;&#x2F;strong&gt;:&lt;&#x2F;p&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Alert Type&lt;&#x2F;th&gt;&lt;th&gt;Actual Source&lt;&#x2F;th&gt;&lt;th&gt;Age&lt;&#x2F;th&gt;&lt;&#x2F;tr&gt;&lt;&#x2F;thead&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&quot;Your password was compromised!&quot;&lt;&#x2F;td&gt;&lt;td&gt;LinkedIn breach&lt;&#x2F;td&gt;&lt;td&gt;2012&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;&quot;Email found in new database!&quot;&lt;&#x2F;td&gt;&lt;td&gt;MySpace dump&lt;&#x2F;td&gt;&lt;td&gt;2013&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;&quot;SSN detected on dark web!&quot;&lt;&#x2F;td&gt;&lt;td&gt;Equifax breach&lt;&#x2F;td&gt;&lt;td&gt;2017&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;&#x2F;tbody&gt;&lt;&#x2F;table&gt;
&lt;p&gt;The cybercriminal economy operates on freshness:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;New data&lt;&#x2F;strong&gt;: Premium prices&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Month-old data&lt;&#x2F;strong&gt;: Heavily discounted&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Year-old data&lt;&#x2F;strong&gt;: Given away as loss leaders&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;You&#x27;re essentially paying someone to tell you that your LinkedIn password from 2012 is still in that same database dump everyone already knows about, available on Have I Been Pwned for free.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;h3 id=&quot;4-the-alerts-are-useless-unless-you-can-actually-do-something&quot;&gt;4. The Alerts Are Useless (Unless You Can Actually Do Something)&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s where &lt;strong&gt;traditional&lt;&#x2F;strong&gt; monitoring services reveal their fundamental absurdity. What exactly are you supposed to do when you get that urgent 3 AM notification saying your social security number was found on the dark web?&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;You can&#x27;t change your SSN&lt;&#x2F;li&gt;
&lt;li&gt;You can&#x27;t make the data disappear from criminal forums&lt;&#x2F;li&gt;
&lt;li&gt;Traditional monitoring services have no answer&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;But there is one option that actually works:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; buying your data back and removing it from circulation.&lt;&#x2F;p&gt;
&lt;p&gt;This approach was formally recognized as legal by the U.S. Department of Justice in their February 2020 guidance &lt;a href=&quot;https:&#x2F;&#x2F;www.justice.gov&#x2F;criminal-ccips&#x2F;page&#x2F;file&#x2F;1252341&#x2F;download&quot;&gt;Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;To my knowledge, my startup &lt;a href=&quot;https:&#x2F;&#x2F;mindwise.io&quot;&gt;MINDWISE&lt;&#x2F;a&gt; was the only service that actually took that approach.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-real-business-model-monetizing-fear&quot;&gt;The Real Business Model: Monetizing Fear&lt;&#x2F;h2&gt;
&lt;p&gt;Dark web monitoring represents a perfect case study in what happens when the cybersecurity industry realizes that &lt;strong&gt;fear sells better than actual security&lt;&#x2F;strong&gt;. It&#x27;s security theater at its finest--designed to make you feel like you&#x27;re doing something proactive while accomplishing virtually nothing.&lt;&#x2F;p&gt;
&lt;p&gt;These services exploit:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Technological ignorance&lt;&#x2F;strong&gt;: Most people don&#x27;t understand what the &quot;dark web&quot; actually is&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Justified concern&lt;&#x2F;strong&gt;: Data breaches are real and scary&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The knowledge gap&lt;&#x2F;strong&gt;: People don&#x27;t realize criminal activity happens in places no monitoring service can reach&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;The result? Monthly fees ranging from $10 to $30 per person for automated searches of already-public breach databases combined with scary-sounding weekly reports.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-broader-scamification-pattern&quot;&gt;The Broader Scamification Pattern&lt;&#x2F;h2&gt;
&lt;p&gt;This isn&#x27;t unique to cybersecurity. We&#x27;re watching the systematic financialization of every possible anxiety in modern life.&lt;&#x2F;p&gt;
&lt;p&gt;The &quot;scamification&quot; of modern life is a deliberate, scalable business model that preys on uncertainty and fear. It&#x27;s not unique to dark web monitoring or even cybersecurity--it&#x27;s a blueprint replicated across industries, from finance to health to personal privacy. The formula is simple: identify a legitimate concern, inflate its urgency, offer a shiny but hollow solution, and charge a recurring fee for the illusion of control. This anxiety-to-revenue pipeline thrives because it exploits human psychology and systemic vulnerabilities, creating a self-perpetuating cycle of fear and expenditure.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;how-it-works-the-anatomy-of-the-pipeline&quot;&gt;How It Works: The Anatomy of the Pipeline&lt;&#x2F;h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identify a Real Fear&lt;&#x2F;strong&gt;
Every successful scamification starts with a kernel of truth. Data breaches &lt;em&gt;are&lt;&#x2F;em&gt; real. Identity theft &lt;em&gt;does&lt;&#x2F;em&gt; ruin lives. Financial fraud &lt;em&gt;can&lt;&#x2F;em&gt; wipe out savings. These are not hypotheticals--they&#x27;re documented, frequent, and terrifying. The fear is justified, which makes it ripe for exploitation.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Amplify the Threat&lt;&#x2F;strong&gt;
Marketing campaigns lean into worst-case scenarios, often exaggerating the likelihood or impact of the threat. Dark web monitoring services, for example, conjure images of shadowy hackers trading your social security number in real-time, when in reality, most &quot;dark web&quot; data is old, recycled, and already public. Similarly, credit monitoring services imply that without their watchful eye, you&#x27;re one step away from financial ruin, even though most fraud can be caught by basic vigilance.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Offer a Simple, Shiny Solution&lt;&#x2F;strong&gt;
The solution is always user-friendly, tech-heavy, and reassuringly branded. Dashboards with red alerts, &quot;real-time scans,&quot; and vague promises of &quot;protection&quot; create the illusion of action. VPNs market themselves as bulletproof shields for your entire digital life, despite only encrypting traffic. Antivirus software bombards you with pop-ups about &quot;critical threats&quot; that Windows Defender already neutralized. The goal is to make you &lt;em&gt;feel&lt;&#x2F;em&gt; secure, not to &lt;em&gt;be&lt;&#x2F;em&gt; secure.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lock in Recurring Revenue&lt;&#x2F;strong&gt;
The real genius of scamification is the subscription model. Monthly fees--$10, $20, $30--seem small enough to justify, but they add up to billions across millions of users. These services rely on inertia: once you&#x27;re signed up, you&#x27;re unlikely to cancel, especially if the service keeps sending you &quot;alerts&quot; that reinforce the fear that got you to sign up in the first place.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Deliver Minimal Value&lt;&#x2F;strong&gt;
The final step is ensuring the service does just enough to avoid outright fraud accusations but not enough to solve the actual problem. Dark web monitoring alerts you to old breaches you can&#x27;t act on. Privacy services remove your name from public directories while ignoring the real data brokers like LexisNexis. Credit monitoring flags transactions you&#x27;d already notice if you checked your bank account. The gap between promise and delivery is where the profit lies.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;h3 id=&quot;why-it-s-so-effective&quot;&gt;Why It&#x27;s So Effective&lt;&#x2F;h3&gt;
&lt;p&gt;This pipeline works because it exploits deep-seated psychological and societal vulnerabilities:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fear of the Unknown&lt;&#x2F;strong&gt;: Most people don&#x27;t understand the dark web, data brokers, or how fraud actually happens. This ignorance is a feature, not a bug, for these companies. The less you know, the more you&#x27;ll pay for someone to &quot;handle&quot; it.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Desire for Control&lt;&#x2F;strong&gt;: In a world where data breaches feel inevitable, these services offer the illusion of agency. Signing up feels like &quot;doing something,&quot; even if it&#x27;s ineffective.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Technological Overwhelm&lt;&#x2F;strong&gt;: The complexity of modern tech--blockchains, encrypted forums, AI-driven fraud--makes people feel outmatched. A slick app or service promises to bridge that gap, even if it&#x27;s just a glorified search engine.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Systemic Failures&lt;&#x2F;strong&gt;: The pipeline thrives because the systems meant to protect us are broken. Credit bureaus profit from selling your data &lt;em&gt;and&lt;&#x2F;em&gt; from selling you protection when that data is breached. Banks write off fraud as a cost of business, indemnified by insurance, leaving individuals to fend for themselves. Governments lag behind cybercriminals, leaving a vacuum for private companies to fill with half-baked solutions.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;the-societal-cost&quot;&gt;The Societal Cost&lt;&#x2F;h3&gt;
&lt;p&gt;The scamification pattern doesn&#x27;t just waste money--it erodes trust and distorts priorities. When people spend billions on security theater, they&#x27;re less likely to invest in real solutions like better legislation, open-source tools, or personal education. It also normalizes a pay-to-play model of safety, where only those who can afford subscriptions get &quot;protection,&quot; however ineffective. This creates a two-tiered system: the wealthy get reassured (if not actually protected), while everyone else is left to navigate a minefield of scams and breaches alone.&lt;&#x2F;p&gt;
&lt;p&gt;Moreover, the constant barrage of fear-based marketing keeps people in a state of low-grade panic, making them more susceptible to future upsells. It&#x27;s a feedback loop: anxiety drives purchases, purchases reinforce anxiety, and the cycle continues. This isn&#x27;t just a business model; it&#x27;s a psychological tax on modern life.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;beyond-cybersecurity-the-pattern-everywhere&quot;&gt;Beyond Cybersecurity: The Pattern Everywhere&lt;&#x2F;h3&gt;
&lt;p&gt;The anxiety-to-revenue pipeline isn&#x27;t limited to tech. It&#x27;s everywhere:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Healthcare&lt;&#x2F;strong&gt;: Wellness apps and subscription-based &quot;health monitoring&quot; services promise to catch diseases early but often just repackage basic advice (eat well, exercise) with a monthly fee. Meanwhile, actual healthcare remains inaccessible for millions.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Insurance&lt;&#x2F;strong&gt;: Extended warranties for electronics or appliances exploit fears of rare failures, with fine print ensuring most claims are denied. The math rarely favors the buyer.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Education&lt;&#x2F;strong&gt;: For-profit universities and online courses prey on fears of falling behind in a competitive job market, charging exorbitant fees for credentials with questionable value.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal Safety&lt;&#x2F;strong&gt;: Home security systems and &quot;personal safety apps&quot; market peace of mind with subscriptions that often duplicate free services like 911 or basic phone features.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;In each case, the pattern is the same: a real concern, an exaggerated threat, a shiny but hollow solution, and a subscription to keep the money flowing. The result is a world where every anxiety is a revenue stream, and actual solutions are sidelined in favor of profitable placebos.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;breaking-the-cycle&quot;&gt;Breaking the Cycle&lt;&#x2F;h3&gt;
&lt;p&gt;Escaping this pipeline requires a mix of skepticism, education, and systemic change:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Skepticism&lt;&#x2F;strong&gt;: Question any service that promises to &quot;protect&quot; you from vague, scary threats. If it&#x27;s subscription-based and heavy on marketing, it&#x27;s probably more theater than substance.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Education&lt;&#x2F;strong&gt;: Learn the basics of the threats you&#x27;re facing. Understanding how data breaches work, what the dark web actually is, or how fraud happens demystifies the fear and reduces reliance on middlemen.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Systemic Change&lt;&#x2F;strong&gt;: Push for regulations that hold data brokers, credit bureaus, and banks accountable. Demand transparency about data practices and real consequences for breaches. Support open-source tools and community-driven solutions that prioritize users over profit.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Focus on What Works&lt;&#x2F;strong&gt;: As noted below, real security comes from practical, often free steps: password managers, 2FA, credit freezes, and vigilance. These don&#x27;t generate recurring revenue, which is why they&#x27;re rarely marketed.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;tying-it-back-to-dark-web-monitoring&quot;&gt;Tying It Back to Dark Web Monitoring&lt;&#x2F;h3&gt;
&lt;p&gt;Dark web monitoring is a textbook example of this pipeline. It takes a real fear (data breaches), amplifies it with shadowy imagery (the &quot;dark web&quot;), offers a shiny solution (real-time alerts), and charges monthly for something you could do better with free tools like Have I Been Pwned or basic security hygiene. Its ineffectiveness--reactive alerts, incomplete coverage, old data--mirrors the broader pattern of overpromising and underdelivering. The only difference is the stakes: in cybersecurity, the cost of falling for security theater isn&#x27;t just financial; it&#x27;s the false sense of safety that leaves you vulnerable to real threats.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-anxiety-to-revenue-pipeline&quot;&gt;The Anxiety-to-Revenue Pipeline&lt;&#x2F;h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Credit monitoring&lt;&#x2F;strong&gt;: This should not be even needed in a functioning system and reveals the fundamental weakness of our financial identification system as it currently exists.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy services&lt;&#x2F;strong&gt;: These services are largely useless. All they can do is request removal from places like Whitepages, but the real good shit everyone knows, including the bad guys, is on actual public records and with enormous data brokers like LexisNexis.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;VPNs marketed as comprehensive security&lt;&#x2F;strong&gt;: They are glorified proxy servers, but worse, because there is no guarantee your data isn&#x27;t being saved by the CCP (I did it for the rhyme).&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Antivirus software&lt;&#x2F;strong&gt;: Pretty much every consumer brand except maybe Malwarebytes has basically turned into malware itself or at least obtrusive adware. Windows Defender is doing 99% of the work.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Password &quot;security&quot; services&lt;&#x2F;strong&gt;: Password managers are good, we like password managers here. We don&#x27;t like password managers that charge additional exorbitant fees for doing absolutely nothing. Also, we have seen that some password managers are not equal to others. LastPass gave me bad vibes about two years ago, and I switched. This was prior to them having a serious security breach that exposed many people&#x27;s vaults and consequently robbed many people of their cryptocurrency holdings.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;the-common-thread&quot;&gt;The Common Thread&lt;&#x2F;h3&gt;
&lt;p&gt;Each takes a kernel of &lt;em&gt;legitimate&lt;&#x2F;em&gt; concern and transforms it into a recurring revenue stream by overpromising and underdelivering.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;what-actually-works&quot;&gt;What Actually Works&lt;&#x2F;h2&gt;
&lt;p&gt;Instead of paying for &lt;strong&gt;traditional&lt;&#x2F;strong&gt; dark web monitoring theater, here&#x27;s what actually protects you--most of which costs nothing:&lt;&#x2F;p&gt;
&lt;h3 id=&quot;real-security-measures&quot;&gt;Real Security Measures&lt;&#x2F;h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use a password manager with unique, complex passwords for every account&lt;&#x2F;strong&gt;: This single step makes you virtually immune to credential stuffing attacks. Even if every password you&#x27;ve ever used gets leaked tomorrow, unique passwords mean the damage is contained.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Enable 2FA everywhere possible, and use authenticator apps, not SMS&lt;&#x2F;strong&gt;: Two-factor authentication remains one of the most effective security measures available. Avoid SMS-based 2FA when possible--SIM swapping attacks are increasingly common.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Freeze your credit if you&#x27;re not actively using it&lt;&#x2F;strong&gt;: This free service from credit bureaus stops anyone from opening new accounts in your name. It&#x27;s the closest thing to actual identity theft prevention that exists.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Monitor your actual financial accounts regularly&lt;&#x2F;strong&gt;: Set up alerts for all transactions. Review statements monthly. You&#x27;ll spot fraudulent activity faster than any monitoring service.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Be skeptical of unsolicited communications&lt;&#x2F;strong&gt;: Thanks to data breaches, scammers can know your full name, address, and recent purchases. This doesn&#x27;t make them legitimate.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Keep your software updated&lt;&#x2F;strong&gt;: Those annoying update notifications? They&#x27;re usually patching security vulnerabilities.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Practice good email hygiene&lt;&#x2F;strong&gt;: Be suspicious of attachments and links. Verify sender addresses. When in doubt, contact the supposed sender through a different channel.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;These steps are free or low-cost and actually prevent harm rather than just notifying you after it&#x27;s happened.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;h2 id=&quot;the-bottom-line&quot;&gt;The Bottom Line&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;strong&gt;Traditional&lt;&#x2F;strong&gt; dark web monitoring is a solution desperately searching for a problem it can actually solve. It&#x27;s the cybersecurity equivalent of those extended warranty calls--preying on fear and ignorance to extract money while providing minimal value.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-hard-truth&quot;&gt;The Hard Truth&lt;&#x2F;h3&gt;
&lt;p&gt;Your data is probably already out there from any number of breaches. If you&#x27;ve used the internet for more than a few years, some combination of your personal information exists in some criminal database. This isn&#x27;t pessimism--it&#x27;s statistical probability.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-real-solution&quot;&gt;The Real Solution&lt;&#x2F;h3&gt;
&lt;p&gt;But accepting that reality doesn&#x27;t mean accepting powerlessness. While the &lt;strong&gt;traditional&lt;&#x2F;strong&gt; monitoring industry contents itself with sending useless alerts, we&#x27;ve built something different--a service that actually takes action.&lt;&#x2F;p&gt;
&lt;p&gt;Through the legally-sanctioned approach recognized by the Department of Justice, we don&#x27;t just notify you that your data is being traded; &lt;strong&gt;we actively work to remove it from circulation&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;This, combined with real security measures creates actual protection rather than security theater. The difference is:&lt;&#x2F;p&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Traditional Monitoring&lt;&#x2F;th&gt;&lt;th&gt;Our Approach&lt;&#x2F;th&gt;&lt;&#x2F;tr&gt;&lt;&#x2F;thead&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;Observation&lt;&#x2F;td&gt;&lt;td&gt;Action&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;Notification&lt;&#x2F;td&gt;&lt;td&gt;Remediation&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;Status quo&lt;&#x2F;td&gt;&lt;td&gt;Disruption&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;&#x2F;tbody&gt;&lt;&#x2F;table&gt;
&lt;h2 id=&quot;disclaimer&quot;&gt;Disclaimer&lt;&#x2F;h2&gt;
&lt;p&gt;My first startup, &lt;a href=&quot;https:&#x2F;&#x2F;mindwise.io&quot;&gt;MINDWISE.IO&lt;&#x2F;a&gt;, is a dark web monitoring service that actually takes action. We&#x27;re the only service that implements the legal framework established by the Department of Justice. We don&#x27;t just notify you that your data is being traded; we actively work to remove it from circulation.&lt;&#x2F;p&gt;
&lt;p&gt;Unfortunately, on a bank level, we are unable to generate interest--banks don&#x27;t care about fraud in the same way you do. They look at it as a purely financial risk, and one they are indemnified against with insurance. In other words, they expect to lose X amount of money, and as long as they are not losing more than that, they are happy.&lt;&#x2F;p&gt;
&lt;p&gt;Oh, and just a quick reminder, these are the same people that were responsible for nearly destroying the entire global financial system and left U.S. taxpayers holding the bag in the 2007-2008 range. They are great people.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Nixon Agonistes: A Book Review</title>
        <published>2025-01-22T00:00:00+00:00</published>
        <updated>2025-01-22T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/blog/nixon-agonistes/"/>
        <id>https://nicomee.ai/blog/nixon-agonistes/</id>
        
        <content type="html" xml:base="https://nicomee.ai/blog/nixon-agonistes/">&lt;p&gt;We recall Nixon as the man who resigned from office, but he was so much more. We have judged him harshly, but he was a complex figure, and a tragic one.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-tragic-hero-of-american-politics&quot;&gt;The Tragic Hero of American Politics&lt;&#x2F;h2&gt;
&lt;p&gt;Garry Wills&#x27; &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; (1970) remains one of the most penetrating political biographies ever written, capturing Richard Nixon not merely as a politician but as a tragic figure embodying the contradictions of post-war American conservatism. Written before Watergate, the book&#x27;s prescience about Nixon&#x27;s character makes it all the more remarkable.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;beyond-simple-villainy&quot;&gt;Beyond Simple Villainy&lt;&#x2F;h2&gt;
&lt;p&gt;Wills refuses to reduce Nixon to caricature. Instead, he presents a complex portrait of a man driven by resentment and ambition, yet possessing genuine political talents. The Nixon that emerges is neither monster nor martyr, but something more unsettling: a mirror of American anxieties about class, power, and authenticity. He is, as Wills describes him, the best and worst of America in one man. The book&#x27;s strength lies in Wills&#x27; ability to connect Nixon&#x27;s personal psychology to broader political currents. Nixon&#x27;s famous &quot;Checkers speech&quot; isn&#x27;t just political theater--it&#x27;s a crystallization of middle-class resentments and the politics of victimhood that would define conservative rhetoric for decades.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-liberal-consensus-and-its-discontents&quot;&gt;The Liberal Consensus and Its Discontents&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;nixon-agonistes-quote.png&quot; alt=&quot;wallace&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;p&gt;One of my favorite passages in the book is Will&#x27;s observations as he attends a rally for candidate &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;George_Wallace&quot;&gt;George Wallace&lt;&#x2F;a&gt;, attended by the &quot;comfortable discontented,&quot; as he calls them. The insight into their thinking and the forces that he describes as shaping their thinking are stunning.&lt;&#x2F;p&gt;
&lt;p&gt;Perhaps the book&#x27;s most enduring insight is its analysis of the &quot;liberal consensus&quot; that dominated American politics in the 1950s and 60s. Wills shows how Nixon both challenged and embodied this consensus, positioning himself as an outsider while desperately seeking insider status. This tension between populist rhetoric and elite aspiration would become a defining feature of American conservatism.&lt;&#x2F;p&gt;
&lt;p&gt;Wills traces how Nixon&#x27;s career paralleled the breakdown of this consensus, from his anti-communist crusades through his &quot;Southern Strategy.&quot; The book presciently identifies the racial and cultural anxieties that Nixon would exploit, transforming American politics in ways that still resonate today.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;style-and-substance&quot;&gt;Style and Substance&lt;&#x2F;h2&gt;
&lt;p&gt;Wills writes with literary flair rare in political biography. His prose crackles with allusions to classical literature (hence &quot;Agonistes,&quot; echoing Milton&#x27;s &lt;em&gt;Samson Agonistes&lt;&#x2F;em&gt;), yet never becomes pretentious. He has a journalist&#x27;s eye for the telling detail and a philosopher&#x27;s grasp of larger meanings, for those who are willing to read between the lines.&lt;&#x2F;p&gt;
&lt;p&gt;The book&#x27;s structure mirrors its subject&#x27;s complexity, weaving between biographical narrative, political analysis, and philosophical reflection. This approach can be demanding, but it rewards careful reading with insights that conventional biography might miss.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;prescient-and-timeless&quot;&gt;Prescient and Timeless&lt;&#x2F;h2&gt;
&lt;p&gt;Written before Watergate, &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; eerily anticipates Nixon&#x27;s downfall. Wills identifies the paranoia, resentment, and will-to-power that would ultimately destroy Nixon&#x27;s presidency. Yet the book transcends its immediate subject, offering insights into American political culture that remain startlingly relevant. Wills goes into great detail to explain how exactly we got this Nixon, what forces shaped him. Ultimately, he identifies with liberalism and its three primary markets, as he calls them, which is an apt metaphor, for considering that is essentially the basis of locking in liberalism, their competition on an equal playing field, except we know such a thing does not exist and cannot exist. Fools has a poetic talent that can only be described as one of a kind. Each page seems to yield something you want to turn back to and read again and again, just for its beautiful prose. In our current era of populist resentment and political polarization, Wills&#x27; analysis feels prophetic. Nixon&#x27;s ability to weaponize grievance, his attacks on media elites, his racial dog-whistles--all prefigure contemporary political strategies.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;minor-criticisms&quot;&gt;Minor Criticisms&lt;&#x2F;h2&gt;
&lt;p&gt;The book&#x27;s density can be challenging. Wills assumes considerable knowledge of mid-20th century American politics, and his philosophical digressions, while enriching, occasionally slow the narrative momentum. Some readers might also find his sympathy for Nixon disconcerting, though this complexity is ultimately a strength. Personally, I found both of these qualities to be attractive. The last thing we need is another biography that reduces a figure to a caricature in history. Many such biographies have been written on Lincoln. All of them fail to reckon with the complexity of the man himself. Well, almost all of them. See &lt;a href=&quot;https:&#x2F;&#x2F;www.amazon.com&#x2F;Lincoln-Gettysburg-Abraham-Lincoln-1863&#x2F;dp&#x2F;0393354595&quot;&gt;Lincoln at Gettysburg&lt;&#x2F;a&gt; for a great example of a biography that gets it right (by this same author).&lt;&#x2F;p&gt;
&lt;h2 id=&quot;conclusion&quot;&gt;Conclusion&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; stands as essential reading for understanding not just Richard Nixon, but American politics itself, and liberalism. Wills captures how personal psychology, political strategy, and historical forces converge in one fascinating, troubling figure. The book remains that rare achievement: a work of immediate journalism that has aged into a classic of political literature.&lt;&#x2F;p&gt;
&lt;p&gt;For anyone seeking to understand how American conservatism evolved from Eisenhower&#x27;s moderation to today&#x27;s populist insurgency, or how personal resentments can shape political movements, this book provides indispensable insights. Nearly five decades after publication, &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; remains urgently relevant--a testament to Wills&#x27; perception and Nixon&#x27;s enduring, troubling legacy.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Rating: 5&#x2F;5 stars&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
&lt;p&gt;&lt;em&gt;Essential reading for anyone interested in American politics, biography, or the intersection of personality and power.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Why Big Tech Companies Don&#x27;t Give a Damn About You</title>
        <published>2024-12-29T00:00:00+00:00</published>
        <updated>2024-12-29T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/blog/big-tech-user-contempt/"/>
        <id>https://nicomee.ai/blog/big-tech-user-contempt/</id>
        
        <content type="html" xml:base="https://nicomee.ai/blog/big-tech-user-contempt/">&lt;h2 id=&quot;the-baidu-wake-up-call&quot;&gt;The Baidu Wake-Up Call&lt;&#x2F;h2&gt;
&lt;p&gt;I stumbled across this brutal Twitter rant that perfectly captures the rage every tech user feels but rarely articulates:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;em&gt;&quot;Why hasn&#x27;t a big company like Baidu, with a product like Baidu Cloud that has so many users, bothered to adapt it for high-resolution screens? It&#x27;s like they&#x27;re force-feeding users crap; every time I open it, it&#x27;s disgusting.&quot;&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Disgusting.&lt;&#x2F;strong&gt; That&#x27;s the word that cuts to the bone here. Not &quot;suboptimal&quot; or &quot;needs improvement&quot;--&lt;strong&gt;disgusting&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;And you know what? They&#x27;re absolutely right.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-brutal-economics-of-user-contempt&quot;&gt;The Brutal Economics of User Contempt&lt;&#x2F;h2&gt;
&lt;p&gt;Here&#x27;s the uncomfortable truth that every product manager knows but will never admit publicly: domestic tech giants don&#x27;t need to care about user experience.&lt;&#x2F;p&gt;
&lt;p&gt;Their competitive advantage isn&#x27;t built on delighting customers--it&#x27;s built on creating dependency through market dominance and ecosystem lock-in. Once they&#x27;ve got you trapped in their walled garden, they can serve you garbage on a silver platter and you&#x27;ll keep eating it.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-cost-benefit-calculus-of-contempt&quot;&gt;The Cost-Benefit Calculus of Contempt&lt;&#x2F;h2&gt;
&lt;p&gt;Let&#x27;s do the math that keeps executives awake at night:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Option A:&lt;&#x2F;strong&gt; Deploy several developers and designers for months to fix high-DPI support
&lt;strong&gt;Option B:&lt;&#x2F;strong&gt; Launch a quick marketing campaign that drives immediate revenue&lt;&#x2F;p&gt;
&lt;p&gt;Guess which one wins every single time?&lt;&#x2F;p&gt;
&lt;p&gt;The harsh reality is that polishing the user interface generates zero measurable revenue compared to aggressive user acquisition tactics. In fact, it often shows up as negative ROI on quarterly reports--the kiss of death in corporate boardrooms.&lt;&#x2F;p&gt;
&lt;p&gt;But here&#x27;s the part that should make us all furious: this reflects our collective failure as consumers. Domestic users have been systematically trained to accept mediocrity. We complain, we rant on social media, but we keep using the damn products anyway.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;exhibit-b-dji-s-calculated-indifference&quot;&gt;Exhibit B: DJI&#x27;s Calculated Indifference&lt;&#x2F;h2&gt;
&lt;p&gt;The DJI Pocket case study reveals just how surgically precise this contempt can be.&lt;&#x2F;p&gt;
&lt;p&gt;I remember that forum post about the absolute nightmare of transferring files from the DJI Pocket. Anyone who&#x27;s tried to move footage off that device knows the pain--it&#x27;s like the engineers actively tried to make it as frustrating as possible.&lt;&#x2F;p&gt;
&lt;p&gt;That post exploded with engagement. Hardcore vloggers and NAS enthusiasts--people who actually understand workflow optimization--flooded the comments with detailed, actionable suggestions. These weren&#x27;t casual users whining about minor inconveniences; these were power users offering free consulting on how to fix a genuinely broken experience.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;two-years-of-silence&quot;&gt;Two Years of Silence&lt;&#x2F;h3&gt;
&lt;p&gt;DJI&#x27;s response after two years? Complete radio silence.&lt;&#x2F;p&gt;
&lt;p&gt;Not a single employee acknowledgment. Not even a form letter saying &quot;thanks for the feedback.&quot; Just the corporate equivalent of a middle finger.&lt;&#x2F;p&gt;
&lt;p&gt;Why? Because DJI&#x27;s spreadsheet warriors ran the numbers and realized that optimizing file transfer workflows would help maybe 5% of their user base become marginally more productive. The other 95%--the Instagram weekend warriors who shoot 30-second clips--couldn&#x27;t care less about efficient batch transfers.&lt;&#x2F;p&gt;
&lt;p&gt;The Pocket&#x27;s core competitiveness has nothing to do with respecting power users&#x27; time. It&#x27;s about being small, affordable, and producing decent footage for social media. Everything else is noise.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-capital-market-reality-check&quot;&gt;The Capital Market Reality Check&lt;&#x2F;h2&gt;
&lt;p&gt;Here&#x27;s what the motivational business books won&#x27;t tell you:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&quot;Big company&quot; does not equal user-friendly products&lt;&#x2F;li&gt;
&lt;li&gt;&quot;Millions of users&quot; does not equal caring about individual experience&lt;&#x2F;li&gt;
&lt;li&gt;&quot;Market dominance&quot; does not equal quality improvement incentives&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;That&#x27;s not how capital markets work, and it&#x27;s not how they&#x27;re designed to work.&lt;&#x2F;p&gt;
&lt;p&gt;Public companies exist to maximize shareholder value, period. User experience improvements only matter insofar as they drive measurable revenue growth or prevent churn. If you&#x27;re already locked into their ecosystem and complaining but not leaving, you&#x27;re essentially subsidizing their indifference.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-uncomfortable-truth&quot;&gt;The Uncomfortable Truth&lt;&#x2F;h2&gt;
&lt;p&gt;We&#x27;re not customers--we&#x27;re revenue units in a spreadsheet. And until we start acting like customers who actually have alternatives and use them, nothing will change.&lt;&#x2F;p&gt;
&lt;p&gt;The rant about Baidu Cloud isn&#x27;t really about high-DPI support. It&#x27;s about a fundamental disrespect for users&#x27; time, intelligence, and dignity. And the most infuriating part?&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;They&#x27;re getting away with it because we let them.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Ticketing Platform Automation</title>
        <published>2024-06-30T00:00:00+00:00</published>
        <updated>2024-06-30T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/ticketing-automation/"/>
        <id>https://nicomee.ai/projects/ticketing-automation/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/ticketing-automation/">&lt;p&gt;Took a small static set of EC2 instances running legacy code, and transformed them into a distributed scraping system processing 10M+ tickets daily (on Fargate). Crafted creative workarounds to bypass Ticketmaster&#x27;s moves, such as creating a way to deliver tickets to a buyer without them ever leaving the seller&#x27;s account (transferless). Created a serverless API to process Apple Wallet tickets and produce PDFs. Significantly reduced time-to-resolution for customers and segmented each provider into their own queue, allowing for autoscaling and efficient resource utilization.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>MINDWISE.IO</title>
        <published>2021-06-30T00:00:00+00:00</published>
        <updated>2021-06-30T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/mindwise/"/>
        <id>https://nicomee.ai/projects/mindwise/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/mindwise/">&lt;p&gt;Built a real-time threat intelligence platform for financial institutions. Personally engineered with a team of 2, a comprehensive, continuous monitoring system that identified cardholders whose information was being sold, based on partial information and an integration with the venerable LexisNexis. Partnered with U.S. Postal Service Cybercrime Unit, in an effort to triangulate sources of illicit material on the darknet.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Astro Analytics</title>
        <published>2019-12-31T00:00:00+00:00</published>
        <updated>2019-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/astro-analytics/"/>
        <id>https://nicomee.ai/projects/astro-analytics/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/astro-analytics/">&lt;p&gt;A platform for enhanced OSINT data collection, analysis, and visualization. Integrated with LexisNexis for comprehensive data sourcing, enabling powerful investigative capabilities.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Price Monitoring System</title>
        <published>2019-12-31T00:00:00+00:00</published>
        <updated>2019-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/price-monitoring/"/>
        <id>https://nicomee.ai/projects/price-monitoring/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/price-monitoring/">&lt;p&gt;Built a resilient price tracking system for major retailers including Amazon, Walmart, and BestBuy, handling millions of products. Automated the extraction of user data at scale (with their consent) and the submission and fulfillment of price protection claims on the Citibank website for items whose prices had changed within the past month.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Sanator Provider Registry</title>
        <published>2016-08-31T00:00:00+00:00</published>
        <updated>2016-08-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/sanator-registry/"/>
        <id>https://nicomee.ai/projects/sanator-registry/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/sanator-registry/">&lt;p&gt;Helped build the Sanator Provider Registry, California&#x27;s mandated healthcare Provider Registry. Became proficient in SQL and working fast in environments with regulatory requirements (HIPAA). Created core data import and cleansing pipelines that fulfilled SB137 requirements.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>High Altitude Balloon for Scientific Research</title>
        <published>2015-12-31T00:00:00+00:00</published>
        <updated>2015-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/balloon/"/>
        <id>https://nicomee.ai/projects/balloon/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/balloon/">&lt;p&gt;Led the team and designed the entire electronics payload for a high-altitude balloon that reached 100,000 feet. The payload recorded temperature, barometric pressure, and radiation spectra (alpha, beta, gamma), among other measurements. Based on a Beaglebone Black. Won 1st Place in the Instructables Explore Science Contest.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>NETGEAR Hammer</title>
        <published>2015-12-31T00:00:00+00:00</published>
        <updated>2015-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/netgear-hammer/"/>
        <id>https://nicomee.ai/projects/netgear-hammer/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/netgear-hammer/">&lt;p&gt;An offensive security tool that exposed fundamental weaknesses in NETGEAR&#x27;s serial number assignment scheme. Featured in a presentation at DEFCON 20, demonstrating how predictable serial number generation could be exploited.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Leafy Cryptocurrency</title>
        <published>2013-12-31T00:00:00+00:00</published>
        <updated>2013-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.ai/projects/leafy/"/>
        <id>https://nicomee.ai/projects/leafy/</id>
        
        <content type="html" xml:base="https://nicomee.ai/projects/leafy/">&lt;p&gt;A proof-of-work cryptocurrency that integrates climate impact into its core incentives. 20% of all transaction fees are directed to verified tree-planting programs, with the blockchain providing full transparency and auditability of the funds.&lt;&#x2F;p&gt;
</content>
        
    </entry>
</feed>
