Originally published at ewright3.com In January 2024, the SEC's official X account was hijacked. Attackers posted a fake Bitcoin ETF approval announcement, briefly moving markets. The Securities and Exchange Commission, the agency that writes the rules on public company cybersecurity disclosures, couldn't protect its own phone number. The compromise mechanism was a SIM swap. No sophisticated explo
For years, the answer to "how much RAM do I need?" was always "more than you have." 4GB became a joke. 8GB became "the bare minimum." 16GB became the new baseline. 32GB started feeling reasonable for developers and gamers. The ceiling kept moving, and the industry was happy to sell you more every time it did. Now, Apple has released the MacBook Neo with 8GB as the base configuration. I've been wat
[03] Designing a Personal Commitment Line — Two Loans, One Defense System This is Part 3 of a 6-part series: Building Investment Systems with Python Every major corporation maintains a revolving credit facility — a pre-arranged borrowing line they can draw from instantly during a crisis. They pay a commitment fee for the privilege of having this standby capacity, even when they don't use it. The