<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
    <title>Nico Kokonas</title>
    <subtitle>Backend developer specializing in scalable data extraction, distributed infrastructure, and adversarial systems research.</subtitle>
    <link rel="self" type="application/atom+xml" href="https://nicomee.com/atom.xml"/>
    <link rel="alternate" type="text/html" href="https://nicomee.com"/>
    <generator uri="https://www.getzola.org/">Zola</generator>
    <updated>2026-03-11T00:00:00+00:00</updated>
    <id>https://nicomee.com/atom.xml</id>
    <entry xml:lang="en">
        <title>On the Ethics of Ambiguity</title>
        <published>2026-03-11T00:00:00+00:00</published>
        <updated>2026-03-11T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/on-the-ethics-of-ambiguity/"/>
        <id>https://nicomee.com/blog/on-the-ethics-of-ambiguity/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/on-the-ethics-of-ambiguity/">&lt;p&gt;There is a passage early in Simone de Beauvoir&#x27;s &lt;em&gt;The Ethics of Ambiguity&lt;&#x2F;em&gt; where she describes the child&#x27;s world as one of &quot;serious&quot; values--fixed, given, beyond question. The child inhabits a universe furnished by adults, where meaning is handed down like furniture. It is only later, in adolescence, that the scaffolding shudders and the young person is confronted with what de Beauvoir calls the &quot;agonizing moment&quot; of discovering that the world has no pre-given justification. That the values propping up your existence were, all along, contingent.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;Simone_De_Beauvoir.jpg&quot; alt=&quot;Simone de Beauvoir&quot; &#x2F;&gt;
&lt;em&gt;Simone de Beauvoir, whose existentialist ethics remain as uncomfortable--and necessary--as ever&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;p&gt;I read this book for the first time at twenty-two, and I remember the recognition was physical. Not the comfortable recognition of finding your own opinions reflected back at you, but the queasy kind--the feeling of being caught.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-taxonomy-of-bad-faith&quot;&gt;The Taxonomy of Bad Faith&lt;&#x2F;h2&gt;
&lt;p&gt;De Beauvoir&#x27;s project in &lt;em&gt;The Ethics of Ambiguity&lt;&#x2F;em&gt; is to build an existentialist ethics on the foundation Sartre laid in &lt;em&gt;Being and Nothingness&lt;&#x2F;em&gt;--but where Sartre left us with a kind of dizzying, vertiginous freedom and not much guidance on what to do with it, de Beauvoir attempts something more systematic. She asks: given that we are radically free, given that existence has no pre-given meaning, how ought we to live? And more pointedly: what are the ways we fail to live?&lt;&#x2F;p&gt;
&lt;p&gt;Her answer takes the form of a gallery of defective attitudes--portraits of people who, in various ways, refuse the full weight of their freedom. These are not straw men. They are, if you are honest with yourself, people you have been.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;The Sub-Man&lt;&#x2F;strong&gt; is the figure who flees from his own existence. He does not assert, does not choose, does not risk. He lets the world wash over him. De Beauvoir describes him as living in a kind of stupor, a &quot;state of blindness and ignorance.&quot; He is not evil--he is something worse in the existentialist framework: he is inert. He has abdicated the defining feature of human existence. We all know this person. Many of us have been this person, particularly in the years right after the scaffolding collapses and the vertigo sets in.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;The Serious Man&lt;&#x2F;strong&gt; is more interesting, and more dangerous. He is the one who, confronted with the abyss of freedom, immediately fills it with an external value--a cause, an institution, a career, a god. He treats these values as given, as objective, as absolutes that exist independent of any human choice to affirm them. The serious man is the company man, the ideologue, the true believer. His bad faith consists in denying that he chose his values--in pretending they were always there, immovable as bedrock.&lt;&#x2F;p&gt;
&lt;p&gt;De Beauvoir is devastating on this point. The serious man&#x27;s devotion is a dodge. His commitment is real, but his understanding of it is false. He has confused the intensity of his attachment with the objectivity of its object. And when his chosen absolute crumbles--as absolutes always do--he has nothing. He collapses into the next figure.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-nihilist&quot;&gt;The Nihilist&lt;&#x2F;h2&gt;
&lt;p&gt;The nihilist is the serious man&#x27;s hangover. He is what happens when someone invests everything in an external absolute and then watches it fail. Having believed in the objectivity of values and been betrayed, the nihilist concludes that nothing has value at all. De Beauvoir calls this &quot;the attitude of negation&quot;--the refusal to will anything, to affirm anything, because all affirmation has been revealed as illusion.&lt;&#x2F;p&gt;
&lt;p&gt;I recognize this figure with uncomfortable precision. There is a period in most thinking young people&#x27;s lives--somewhere between eighteen and twenty-five, though some get stuck there permanently--where nihilism feels not like a failure but like an achievement. You have seen through the game. You have understood, as Ecclesiastes puts it, that all is vanity. The serious people around you, with their careers and convictions and five-year plans, are dupes, and you have had the courage to face the void.&lt;&#x2F;p&gt;
&lt;p&gt;Except, as de Beauvoir points out, this is its own kind of cowardice. The nihilist has merely replaced the serious man&#x27;s false positive with a false negative. He still treats meaning as something that must be given from outside--he has simply concluded that nothing is giving it. He has not yet grasped the genuinely radical point: that meaning is something you &lt;em&gt;make&lt;&#x2F;em&gt;. That the absence of objective values is not a catastrophe but a condition--the condition of freedom itself.&lt;&#x2F;p&gt;
&lt;p&gt;I spent longer in this posture than I care to admit. Not the brief flirtation of late adolescence that de Beauvoir describes, but years. The better part of a decade. The intellectual satisfaction of seeing through things is considerable, and it costs nothing. You can be a nihilist from a very comfortable chair. I was. I watched elections and wars and financial collapses with the detached amusement of someone who had already concluded that none of it mattered, that the machinery of public life was a farce performed for the benefit of people too credulous to see through it. I told myself this was lucidity. It was, in fact, the most comfortable form of cowardice available to someone with an internet connection and no dependents.&lt;&#x2F;p&gt;
&lt;p&gt;What changed was not an argument. It was the accumulation of evidence that the void I had been contemplating so serenely was filling up with something ugly. The political disintegration of the past several years--the casual dismantling of institutions, the resurgence of movements I had naively assumed were historical curiosities, the visible fraying of the social fabric in my own communities--forced a recognition that nihilism is not a spectator sport. The refusal to affirm anything is itself a political act. It clears the field for people who have no such hesitation. I had spent years congratulating myself on seeing through the game, and in the meantime the game had changed around me in ways that demanded participation, not commentary. De Beauvoir would not have been surprised. She saw it happen once already.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-adventurer&quot;&gt;The Adventurer&lt;&#x2F;h2&gt;
&lt;p&gt;The adventurer is the figure who fascinated me most when I first read the book, and the one I understand differently now.&lt;&#x2F;p&gt;
&lt;p&gt;The adventurer, unlike the nihilist, does not deny freedom. He embraces it. He throws himself into projects, takes risks, acts boldly. He is the existentialist hero in miniature--except for one critical failure. The adventurer treats other people&#x27;s freedom as irrelevant. He is willing to use others as instruments, as scenery in his personal drama. His projects are real, but they are solipsistic. He wills his own freedom without willing the freedom of others.&lt;&#x2F;p&gt;
&lt;p&gt;De Beauvoir is clear that the adventurer&#x27;s attitude is seductive precisely because it looks like authentic existence. He has the vitality, the commitment, the willingness to act that the sub-man and the nihilist lack. He appears to have overcome bad faith. But his freedom is parasitic--it depends on the unfreedom of others, or at minimum on his indifference to it.&lt;&#x2F;p&gt;
&lt;p&gt;At twenty-two, I thought the adventurer was the most sympathetic figure in the book. He was doing something. He was alive. The sub-man was pathetic, the serious man deluded, the nihilist a bore--but the adventurer had style.&lt;&#x2F;p&gt;
&lt;p&gt;It took years to understand that de Beauvoir was describing the most sophisticated form of bad faith in her catalog. The adventurer&#x27;s error is not that he acts, but that he acts as though he exists alone. His freedom, unmoored from solidarity, degenerates into a kind of aestheticized will-to-power. He is, to put it bluntly, the libertarian of existentialism.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;what-she-is-actually-asking&quot;&gt;What She Is Actually Asking&lt;&#x2F;h2&gt;
&lt;p&gt;The force of de Beauvoir&#x27;s argument is cumulative. Each defective attitude fails for the same fundamental reason: it refuses the full implications of human ambiguity. We are free, but we are also situated. We are subjects, but we exist among other subjects. We must choose, but our choices reverberate through a shared world.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;Hannah-Arednt.jpg&quot; alt=&quot;Hannah Arendt&quot; &#x2F;&gt;
&lt;em&gt;Hannah Arendt--whose own work on freedom and action shares deep affinities with de Beauvoir&#x27;s project&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;p&gt;The genuine ethical attitude, for de Beauvoir, is one that wills its own freedom &lt;em&gt;and&lt;&#x2F;em&gt; the freedom of others--not as an abstract principle, but as a concrete commitment. Freedom is not a solitary achievement. It is, as she puts it, &quot;achieved through the freedom of others.&quot; This is not sentimental. It is structural. My freedom is diminished in a world of unfreedom, because freedom requires a world of free others to be meaningful.&lt;&#x2F;p&gt;
&lt;p&gt;This is where de Beauvoir parts company with the caricature of existentialism as pure individualism. The ethics she constructs is fundamentally social. It demands engagement, solidarity, political commitment--not as external impositions on a free individual, but as expressions of freedom itself.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-ghosts-of-youth&quot;&gt;The Ghosts of Youth&lt;&#x2F;h2&gt;
&lt;p&gt;Reading &lt;em&gt;The Ethics of Ambiguity&lt;&#x2F;em&gt; again at a distance of years, what strikes me is not the philosophical architecture--which is impressive but not unique--but the accuracy of the portraits. De Beauvoir understood, in a way that most philosophers do not, that ethical failure is not primarily intellectual. It is dispositional. We do not usually reason our way into bad faith. We drift into it, or we are seduced by it, or we adopt it because the alternative--the full, unprotected confrontation with our own freedom and responsibility--is too much to bear.&lt;&#x2F;p&gt;
&lt;p&gt;I can map my own trajectory through her taxonomy with embarrassing ease. The seriousness of adolescence, where the values handed down by school and family felt as solid as the ground. The nihilism of the early twenties, where seeing through those values felt like wisdom. The adventurer phase, where acting on pure appetite and calling it freedom felt like living authentically. And then, slowly, painfully, the recognition that none of these postures was adequate--that freedom without solidarity is just selfishness with a philosophical alibi.&lt;&#x2F;p&gt;
&lt;p&gt;De Beauvoir does not moralize about this. She describes. And the descriptions are so precise that they function as mirrors. You see yourself in these figures not because she is judging you, but because she has understood something about the shapes that human freedom takes when it is afraid of itself.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-radicalization-pipeline-she-already-described&quot;&gt;The Radicalization Pipeline She Already Described&lt;&#x2F;h2&gt;
&lt;p&gt;De Beauvoir was writing in 1947, two years after the liberation of Paris. Fascism was not an abstraction for her. She had lived under occupation, watched her city collaborate and resist in roughly equal measure, and understood that the movement which nearly swallowed Europe was not powered by a single psychological type but by several, working in sequence.&lt;&#x2F;p&gt;
&lt;p&gt;Read her taxonomy again with this in mind and the contemporary resonance is unsettling.&lt;&#x2F;p&gt;
&lt;p&gt;The &lt;strong&gt;sub-man&lt;&#x2F;strong&gt; is the raw material. He is disengaged, passive, resentful in a diffuse and undirected way. He has no project of his own. He is the young man in his childhood bedroom, doomscrolling at 2 a.m., aware that something is wrong with the world but unwilling or unable to articulate what. He does not yet have a politics. What he has is a void--and voids get filled.&lt;&#x2F;p&gt;
&lt;p&gt;The &lt;strong&gt;nihilist&lt;&#x2F;strong&gt; is the next stage. He is the sub-man who has discovered that nothing is sacred and mistaken this discovery for sophistication. In the 1930s he was the cynic in the beer hall who sneered at the Weimar Republic. Today he is the anonymous poster who traffics in irony so thick it becomes indistinguishable from sincerity--the &quot;just joking&quot; that is never entirely a joke. The alt-right understood this figure instinctively. The boards, the memes, the performative contempt for all values--these are nihilism weaponized. The genius of the movement, such as it was, lay in recognizing that ironic detachment is not a terminus but a waystation. You do not stay a nihilist forever. Eventually the void demands to be filled with something, and the pipeline is ready with an offer.&lt;&#x2F;p&gt;
&lt;p&gt;The &lt;strong&gt;serious man&lt;&#x2F;strong&gt; receives the convert. He provides the absolute the nihilist has been missing: the race, the nation, the civilization, the &quot;tradition&quot; that must be defended at all costs. The serious man&#x27;s bad faith is the most politically dangerous in de Beauvoir&#x27;s catalog because it scales. One nihilist is harmless. A thousand serious men marching under the same banner are not. The serious man does not experience his commitment as a choice--he experiences it as a discovery, a revelation of how things really are. This is why arguing with him on the merits is so fruitless. He is not defending a position. He is defending the ground he stands on. To question his values is, in his experience, to question reality itself. Every fascist movement in history has depended on this psychology. The content of the absolute changes--racial purity, national greatness, religious destiny, &quot;Western civilization&quot;--but the structure is identical. An unchosen, objective value that demands total submission and justifies any action taken in its name.&lt;&#x2F;p&gt;
&lt;p&gt;And then there is the &lt;strong&gt;adventurer&lt;&#x2F;strong&gt;, who in the context of fascism becomes the most chilling figure of all. He is the one who does not believe. He is the leader, the opportunist, the man who manipulates the serious men because he understands their psychology without sharing it. De Beauvoir describes him as treating other people&#x27;s freedom as scenery, and there is no better description of the demagogue. He wills his own freedom--his power, his project, his drama--without the slightest concern for what it costs others. He is not deceived by the cause. He is the cause&#x27;s author, and the serious men are his instruments.&lt;&#x2F;p&gt;
&lt;p&gt;This is not a forced reading. De Beauvoir herself spends considerable time in the book discussing fascism, and her analysis of the &quot;passionate man&quot; and the &quot;tyrant&quot; tracks exactly this dynamic. What makes it newly relevant is that the radicalization pipeline she described in philosophical terms--from passivity to nihilism to fanaticism, with an adventurer at the top pulling strings--maps with disturbing precision onto the mechanics of online radicalization that researchers have documented over the past decade. The alienated young man who finds community in ironic nihilism, who graduates to earnest ideology, who is mobilized by a charismatic figure who does not believe a word of it--this is not a new story. De Beauvoir told it in 1947. We simply did not expect to need the warning again so soon.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;why-it-still-matters&quot;&gt;Why It Still Matters&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;em&gt;The Ethics of Ambiguity&lt;&#x2F;em&gt; is not a long book, and it is not an easy one. De Beauvoir&#x27;s prose is dense, and her philosophical vocabulary can be forbidding. But it rewards the effort. In an era saturated with competing certainties--political, technological, ideological--her insistence on ambiguity feels not like weakness but like intellectual honesty of the rarest kind.&lt;&#x2F;p&gt;
&lt;p&gt;We live in a culture that is, in de Beauvoir&#x27;s terms, dominated by serious men: people who have identified their freedom with an external cause and lost the ability to see their own contingency. The tech utopians, the culture warriors, the ideologues of every stripe--all share the serious man&#x27;s fundamental error. They have mistaken the intensity of their conviction for the objectivity of their values.&lt;&#x2F;p&gt;
&lt;p&gt;De Beauvoir would not tell us to stop caring. She would tell us to care differently--to hold our commitments with the awareness that we chose them, that they could be otherwise, and that they are justified only insofar as they expand, rather than contract, the field of human freedom.&lt;&#x2F;p&gt;
&lt;p&gt;That is an uncomfortable position to occupy. It offers none of the satisfactions of certainty, none of the comforts of fanaticism. But it is, I think, the only honest one.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-banality-and-the-abyss&quot;&gt;The Banality and the Abyss&lt;&#x2F;h2&gt;
&lt;p&gt;Hannah Arendt, sitting in a Jerusalem courtroom in 1961, watching Adolf Eichmann fumble through his testimony, arrived at an insight that has been misunderstood ever since. The banality of evil is not the claim that evil is ordinary in the sense of being unimportant. It is the observation that the most catastrophic moral failures do not require demonic intent. They require only the abdication of thought. Eichmann was not a monster. He was a functionary who had ceased to think--who had surrendered his judgment to a system and performed his role within it with the untroubled conscience of a man filling out paperwork. The machinery of annihilation did not run on hatred alone. It ran on compliance, on routine, on the simple unwillingness to ask whether what one was doing was right.&lt;&#x2F;p&gt;
&lt;p&gt;I think about Arendt constantly now. I think about her when I watch officials carry out policies they cannot defend in plain language. I think about her when I watch institutions hollow themselves out in real time, not through dramatic confrontation but through the quiet, cumulative retreat of people who know better but do not act on it. The banality is the point. Evil does not need to announce itself. It needs only a sufficient number of people who have stopped thinking.&lt;&#x2F;p&gt;
&lt;p&gt;And I am quite certain--not as a rhetorical posture but as a considered judgment--that there is a realized nihilism at the heart of the current administration. Not nihilism in the colloquial sense of &quot;not caring,&quot; but nihilism in de Beauvoir&#x27;s precise sense: the attitude of negation elevated to a governing philosophy. The systematic destruction of regulatory capacity, of diplomatic relationships, of scientific infrastructure, of the civil service itself--these are not the actions of people who believe in a positive project for the country. They are the actions of people who have concluded, consciously or not, that the existing order deserves to be razed, and who have no coherent vision of what should replace it. The cruelty is not incidental to the project. The cruelty &lt;em&gt;is&lt;&#x2F;em&gt; the project.&lt;&#x2F;p&gt;
&lt;p&gt;Consider Michael Anton&#x27;s &quot;Flight 93 Election&quot; essay from 2016, the closest thing the movement produced to an intellectual justification. The metaphor is worth dwelling on. In Anton&#x27;s framing, America is a hijacked plane. The passengers--the voters--face certain death if they do nothing. The only option is to rush the cockpit. &quot;Charge the cockpit or you die,&quot; he wrote. The desperation of the metaphor was its appeal. It offered the electorate the moral clarity of a binary: act or perish.&lt;&#x2F;p&gt;
&lt;p&gt;But follow the metaphor to its conclusion, as Anton did not. On Flight 93, the passengers who charged the cockpit understood that they would probably die. Their heroism consisted in choosing to act despite this certainty, in willing the survival of others at the cost of their own lives. That is not what Anton was describing. He was not calling for sacrifice. He was calling for a gamble premised on the conviction that everything was already lost--that the country, the culture, the civilization was in terminal decline, and that any action, however reckless, was preferable to the status quo.&lt;&#x2F;p&gt;
&lt;p&gt;Extend the metaphor honestly into the present and what you get is not the passengers charging the cockpit. It is the hijackers themselves. President Trump is the captain now, just waiting for you to get inside. Armed with the full apparatus of the state, the invitation is not to save the plane but to ride it into the ground--and to take as many people as possible along the way. The animating impulse is not heroism, not glory, not any of the noble causes we have shown ourselves throughout history to be willing to die for. It is a desire to annihilate oneself and the world along with it. It is not conservatism. It is not populism. It is national socialism--not as a historical analogy trotted out for rhetorical effect, but as a precise description of a political movement built on resentment, scapegoating, the cult of a leader, and the romance of destruction.&lt;&#x2F;p&gt;
&lt;p&gt;Arendt warned us that the worst atrocities do not require villains. They require only the surrender of judgment. De Beauvoir warned us that freedom, when it refuses to acknowledge the freedom of others, degenerates into tyranny. Both women wrote from the wreckage of a continent that had learned these lessons at the cost of millions of lives. We are not entitled to the luxury of learning them again.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Nixon Agonistes: A Book Review</title>
        <published>2026-02-25T00:00:00+00:00</published>
        <updated>2026-02-25T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/nixon-agonistes/"/>
        <id>https://nicomee.com/blog/nixon-agonistes/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/nixon-agonistes/">&lt;p&gt;We recall Nixon as the man who resigned from office, but he was so much more. We have judged him harshly, but he was a complex figure, and a tragic one.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-tragic-hero-of-american-politics&quot;&gt;The Tragic Hero of American Politics&lt;&#x2F;h2&gt;
&lt;p&gt;Garry Wills&#x27; &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; (1970) remains one of the most penetrating political biographies ever written, capturing Richard Nixon not merely as a politician but as a tragic figure embodying the contradictions of post-war American conservatism. Written before Watergate, the book&#x27;s prescience about Nixon&#x27;s character makes it all the more remarkable.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;beyond-simple-villainy&quot;&gt;Beyond Simple Villainy&lt;&#x2F;h2&gt;
&lt;p&gt;Wills refuses to reduce Nixon to caricature. Instead, he presents a complex portrait of a man driven by resentment and ambition, yet possessing genuine political talents. The Nixon that emerges is neither monster nor martyr, but something more unsettling: a mirror of American anxieties about class, power, and authenticity. He is, as Wills describes him, the best and worst of America in one man. The book&#x27;s strength lies in Wills&#x27; ability to connect Nixon&#x27;s personal psychology to broader political currents. Nixon&#x27;s famous &quot;Checkers speech&quot; isn&#x27;t just political theater--it&#x27;s a crystallization of middle-class resentments and the politics of victimhood that would define conservative rhetoric for decades.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-liberal-consensus-and-its-discontents&quot;&gt;The Liberal Consensus and Its Discontents&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;nixon-agonistes-quote.png&quot; alt=&quot;wallace&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;p&gt;One of my favorite passages in the book is Will&#x27;s observations as he attends a rally for candidate &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;George_Wallace&quot;&gt;George Wallace&lt;&#x2F;a&gt;, attended by the &quot;comfortable discontented,&quot; as he calls them. The insight into their thinking and the forces that he describes as shaping their thinking are stunning.&lt;&#x2F;p&gt;
&lt;p&gt;Perhaps the book&#x27;s most enduring insight is its analysis of the &quot;liberal consensus&quot; that dominated American politics in the 1950s and 60s. Wills shows how Nixon both challenged and embodied this consensus, positioning himself as an outsider while desperately seeking insider status. This tension between populist rhetoric and elite aspiration would become a defining feature of American conservatism.&lt;&#x2F;p&gt;
&lt;p&gt;Wills traces how Nixon&#x27;s career paralleled the breakdown of this consensus, from his anti-communist crusades through his &quot;Southern Strategy.&quot; The book presciently identifies the racial and cultural anxieties that Nixon would exploit, transforming American politics in ways that still resonate today.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;style-and-substance&quot;&gt;Style and Substance&lt;&#x2F;h2&gt;
&lt;p&gt;Wills writes with literary flair rare in political biography. His prose crackles with allusions to classical literature (hence &quot;Agonistes,&quot; echoing Milton&#x27;s &lt;em&gt;Samson Agonistes&lt;&#x2F;em&gt;), yet never becomes pretentious. He has a journalist&#x27;s eye for the telling detail and a philosopher&#x27;s grasp of larger meanings, for those who are willing to read between the lines.&lt;&#x2F;p&gt;
&lt;p&gt;The book&#x27;s structure mirrors its subject&#x27;s complexity, weaving between biographical narrative, political analysis, and philosophical reflection. This approach can be demanding, but it rewards careful reading with insights that conventional biography might miss.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;prescient-and-timeless&quot;&gt;Prescient and Timeless&lt;&#x2F;h2&gt;
&lt;p&gt;Written before Watergate, &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; eerily anticipates Nixon&#x27;s downfall. Wills identifies the paranoia, resentment, and will-to-power that would ultimately destroy Nixon&#x27;s presidency. Yet the book transcends its immediate subject, offering insights into American political culture that remain startlingly relevant. Wills goes into great detail to explain how exactly we got this Nixon, what forces shaped him. Ultimately, he identifies with liberalism and its three primary markets, as he calls them, which is an apt metaphor, for considering that is essentially the basis of locking in liberalism, their competition on an equal playing field, except we know such a thing does not exist and cannot exist. Fools has a poetic talent that can only be described as one of a kind. Each page seems to yield something you want to turn back to and read again and again, just for its beautiful prose. In our current era of populist resentment and political polarization, Wills&#x27; analysis feels prophetic. Nixon&#x27;s ability to weaponize grievance, his attacks on media elites, his racial dog-whistles--all prefigure contemporary political strategies.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;minor-criticisms&quot;&gt;Minor Criticisms&lt;&#x2F;h2&gt;
&lt;p&gt;The book&#x27;s density can be challenging. Wills assumes considerable knowledge of mid-20th century American politics, and his philosophical digressions, while enriching, occasionally slow the narrative momentum. Some readers might also find his sympathy for Nixon disconcerting, though this complexity is ultimately a strength. Personally, I found both of these qualities to be attractive. The last thing we need is another biography that reduces a figure to a caricature in history. Many such biographies have been written on Lincoln. All of them fail to reckon with the complexity of the man himself. Well, almost all of them. See &lt;a href=&quot;https:&#x2F;&#x2F;www.amazon.com&#x2F;Lincoln-Gettysburg-Abraham-Lincoln-1863&#x2F;dp&#x2F;0393354595&quot;&gt;Lincoln at Gettysburg&lt;&#x2F;a&gt; for a great example of a biography that gets it right (by this same author).&lt;&#x2F;p&gt;
&lt;h2 id=&quot;conclusion&quot;&gt;Conclusion&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; stands as essential reading for understanding not just Richard Nixon, but American politics itself, and liberalism. Wills captures how personal psychology, political strategy, and historical forces converge in one fascinating, troubling figure. The book remains that rare achievement: a work of immediate journalism that has aged into a classic of political literature.&lt;&#x2F;p&gt;
&lt;p&gt;For anyone seeking to understand how American conservatism evolved from Eisenhower&#x27;s moderation to today&#x27;s populist insurgency, or how personal resentments can shape political movements, this book provides indispensable insights. Nearly five decades after publication, &lt;em&gt;Nixon Agonistes&lt;&#x2F;em&gt; remains urgently relevant--a testament to Wills&#x27; perception and Nixon&#x27;s enduring, troubling legacy.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Rating: 5&#x2F;5 stars&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
&lt;p&gt;&lt;em&gt;Essential reading for anyone interested in American politics, biography, or the intersection of personality and power.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Get the Fuck Off of GitHub.</title>
        <published>2025-12-01T00:00:00+00:00</published>
        <updated>2025-12-01T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/get-the-fuck-off-github/"/>
        <id>https://nicomee.com/blog/get-the-fuck-off-github/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/get-the-fuck-off-github/">&lt;p&gt;For almost two decades, I poured my life into open-source contributions on GitHub. Commits, issues, pull requests, discussions--a living, breathing portfolio that represented 15-20 years of my professional credibility and passion. Then, without a single explanation, without a notification, without any recourse, it was all erased. Gone. Just like that.&lt;&#x2F;p&gt;
&lt;p&gt;Every person who voiced concerns about EvilCorp&#x27;s acquisition of GitHub was absolutely correct. This isn&#x27;t just an inconvenience; it&#x27;s a brutal, catastrophic loss for any open-source contributor who relies on that history for their professional standing, for interviews, for their very livelihood. It is absolutely disgusting.&lt;&#x2F;p&gt;
&lt;p&gt;There was no way to contact support. In fact, a new account I tried to create to reach out to them was immediately banned, citing rules that prohibit contacting support from a new account. The irony is as infuriating as the situation itself. This is not how a platform that claims to foster a community of developers should operate. This is how a monolithic entity, insulated from consequences, exercises unchecked power over its users.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-warning-signs-were-there&quot;&gt;The Warning Signs Were There&lt;&#x2F;h2&gt;
&lt;p&gt;Many of us watched with apprehension as Microsoft acquired GitHub. The promises of independence and continued support for the open-source ethos felt increasingly hollow as subtle changes began to creep in. The platform that once felt like a true home for developers has transformed into another corporate silo, where user value is secondary to opaque internal policies and uncommunicated decisions.&lt;&#x2F;p&gt;
&lt;p&gt;This isn&#x27;t just about my personal loss. It&#x27;s a stark warning to every developer, every team, and every organization building on GitHub: your history, your contributions, and your entire digital presence are subject to the arbitrary whims of a corporation that offers no transparency and no accountability.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;my-new-home-sr-ht&quot;&gt;My New Home: sr.ht&lt;&#x2F;h2&gt;
&lt;p&gt;I&#x27;ve already begun the migration. My new home for open-source development is &lt;a href=&quot;https:&#x2F;&#x2F;sr.ht&#x2F;&quot;&gt;sr.ht&lt;&#x2F;a&gt;. It&#x27;s a different paradigm, focusing on simple, powerful tools that respect developers and their work. It&#x27;s a breath of fresh air after the suffocating corporate control I&#x27;ve just experienced. It&#x27;s a community-driven platform that puts control back into the hands of developers, offering mailing lists, Git repositories, bug trackers, and build automation. It embodies the true spirit of open source.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;archival-efforts-limited-utility&quot;&gt;Archival Efforts (Limited Utility)&lt;&#x2F;h2&gt;
&lt;p&gt;While my active history on GitHub is effectively erased, some archives of my repositories can still be found. Though their utility is limited--they are static snapshots, not living, breathing projects--they stand as a testament to what once was.&lt;&#x2F;p&gt;
&lt;p&gt;You can find an archive of my former GitHub profile here:
&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20250903093910&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20250903093910&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;p&gt;Repositories:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;*&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee*&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;&lt;em&gt;&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;em&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Stars:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;*&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee*&quot;&gt;https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;&lt;em&gt;&#x2F;https:&#x2F;&#x2F;github.com&#x2F;nicoandmee&lt;&#x2F;em&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-future-a-ui-for-the-past&quot;&gt;The Future: A UI for the Past&lt;&#x2F;h2&gt;
&lt;p&gt;On my to-do list is building some sort of UI that will allow me to easily query these GitHub archives, pulling up my past repositories and contributions. It&#x27;s a necessary step to reclaim a semblance of the visibility and credibility that was so unceremoniously taken from me. This project will serve as a reminder that while platforms can disappear your work, the spirit of open source, and the determination of its contributors, cannot be extinguished.&lt;&#x2F;p&gt;
&lt;p&gt;It&#x27;s time for all of us to critically re-evaluate where we host our work. The risks are too high, and the consequences too severe, to remain complacent. Get the fuck off of GitHub before it&#x27;s too late.&lt;&#x2F;p&gt;
&lt;p&gt;This tracks with pretty much things I see every day:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;ziglang.org&#x2F;news&#x2F;migrating-from-github-to-codeberg&#x2F;&quot;&gt;Ziglang migrating from GitHub to Codeberg&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>I Miss Christopher Lasch</title>
        <published>2025-01-29T00:00:00+00:00</published>
        <updated>2025-01-29T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/i-miss-christopher-lasch/"/>
        <id>https://nicomee.com/blog/i-miss-christopher-lasch/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/i-miss-christopher-lasch/">&lt;p&gt;In an era defined by profound disquiet--marked by surging populism, widening economic chasms, and a palpable sense of cultural fragmentation--the insights of American historian and social critic Christopher Lasch resonate with an almost prophetic clarity. From his incisive critique of unchecked progress in &lt;em&gt;The True and Only Heaven&lt;&#x2F;em&gt; to his stark diagnosis of elite detachment in &lt;em&gt;The Revolt of the Elites and the Betrayal of Democracy&lt;&#x2F;em&gt;, Lasch offers not just a historical account, but a powerful explanatory framework for understanding the profound malaise afflicting Western democracies today. He delineates a through-line, demonstrating how the very forces championed as drivers of modernity have inadvertently hollowed out the foundations of genuine self-governance.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blog&#x2F;lasch-books.jpg&quot; alt=&quot;Christopher Lasch Books&quot; &#x2F;&gt;
&lt;em&gt;Key works by Christopher Lasch that remain essential reading for understanding today&#x27;s democratic crisis&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-illusion-of-progress-and-the-erosion-of-limits&quot;&gt;The Illusion of Progress and the Erosion of Limits&lt;&#x2F;h2&gt;
&lt;p&gt;Lasch&#x27;s intellectual journey began with a profound skepticism toward the prevailing ideology of &lt;strong&gt;&quot;progress.&quot;&lt;&#x2F;strong&gt; In &lt;em&gt;The True and Only Heaven: Progress and Its Critics&lt;&#x2F;em&gt;, he argued that the relentless pursuit of material accumulation and the belief in humanity&#x27;s boundless capacity to master nature had come at a steep cost.&lt;&#x2F;p&gt;
&lt;p&gt;This uncritical faith in progress, he contended, undermined traditional virtues like:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Civic responsibility&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Self-restraint&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Recognition of human limitations&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Both the political left and right, in their own ways, became complicit in this narrative, failing to champion a robust sense of public spiritedness over the insatiable demands of consumerism and economic expansion.&lt;&#x2F;p&gt;
&lt;p&gt;Lasch saw the decline of vibrant local communities and the rise of a centralized, bureaucratic state as directly linked to this ethos of progress. As institutions increasingly assumed functions once held by families and neighborhoods, individuals were progressively &lt;strong&gt;infantilized&lt;&#x2F;strong&gt;, their capacity for self-reliance and collective action diminished.&lt;&#x2F;p&gt;
&lt;p&gt;This paved the way for a &lt;strong&gt;&quot;culture of narcissism,&quot;&lt;&#x2F;strong&gt; where:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Self-absorption replaced civic engagement&lt;&#x2F;li&gt;
&lt;li&gt;Personal gratification overshadowed commitment to the common good&lt;&#x2F;li&gt;
&lt;li&gt;The &quot;American dream&quot; transformed from shared participation into shallow materialism&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-revolt-and-betrayal-of-the-elites&quot;&gt;The Revolt, and Betrayal, of the Elites&lt;&#x2F;h2&gt;
&lt;p&gt;While &lt;em&gt;The True and Only Heaven&lt;&#x2F;em&gt; laid the philosophical groundwork, &lt;em&gt;The Revolt of the Elites and the Betrayal of Democracy&lt;&#x2F;em&gt; offered a searing indictment of the class he believed was actively undermining democratic principles: the educated, affluent upper-echelon of society. Lasch inverted Ortega y Gasset&#x27;s famous thesis, arguing that the true threat to democracy came not from the &lt;strong&gt;&quot;revolt of the masses&quot;&lt;&#x2F;strong&gt; but from the &lt;strong&gt;&quot;revolt of the elites.&quot;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
&lt;p&gt;These new elites, largely drawn from the top 20% of income earners, were characterized by:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Rootlessness&lt;&#x2F;strong&gt; and detachment from place&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Globalized, cosmopolitan identity&lt;&#x2F;strong&gt; over national belonging&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Marked disinterest&lt;&#x2F;strong&gt; in the fate of their own nations&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Lasch famously described them as &lt;strong&gt;&quot;tourists in their own countries,&quot;&lt;&#x2F;strong&gt; their allegiances often more global than local. They segregated themselves in &lt;strong&gt;&quot;voluntary ghettos&quot;&lt;&#x2F;strong&gt; of wealth and privilege--exclusive neighborhoods, private schools, private healthcare--effectively withdrawing from the shared institutions and common life that bind a democratic society.&lt;&#x2F;p&gt;
&lt;p&gt;This detachment had profound consequences:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Degradation of Public Discourse&lt;&#x2F;strong&gt;: Lasch observed that elites increasingly controlled the terms of public debate, narrowing it to issues relevant to their own class while dismissing the legitimate concerns of ordinary citizens. Informed deliberation gave way to ideological posturing and facile name-calling.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Erosion of Shared Standards&lt;&#x2F;strong&gt;: The ascendancy of a &quot;meritocracy,&quot; which Lasch saw as a &quot;parody of democracy,&quot; replaced a belief in general competence and shared civic responsibility with an emphasis on specialized expertise and individual professional advancement. This fostered a contempt for manual labor and a widening gap between the &quot;thinking classes&quot; and the working class.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Spiritual and Moral Decay&lt;&#x2F;strong&gt;: Having jettisoned traditional moral and ethical guidelines, often under the guise of scientific progress or &quot;liberation,&quot; these elites cultivated a culture of cynicism, detached from any sense of collective purpose or shared destiny.&lt;&#x2F;p&gt;
&lt;p&gt;The &lt;strong&gt;&quot;betrayal of democracy,&quot;&lt;&#x2F;strong&gt; in Lasch&#x27;s view, was multifaceted:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Abandonment of public institutions&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Intellectual disdain&lt;&#x2F;strong&gt; for the common person&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Prioritization of private advantage&lt;&#x2F;strong&gt; over public good&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Systematic hollowing out&lt;&#x2F;strong&gt; of civic infrastructure necessary for functioning democracy&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;connecting-to-our-current-crisis&quot;&gt;Connecting to Our Current Crisis&lt;&#x2F;h2&gt;
&lt;p&gt;Lasch&#x27;s analysis, written decades ago, feels acutely relevant to our present moment of crisis.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Political Polarization and Populism&lt;&#x2F;strong&gt;: The rise of populist movements across the Western world, from the election of Donald Trump to Brexit and the ascent of far-right parties in Europe, can be seen as a direct consequence of the elite detachment Lasch described. Large segments of the population feel &quot;left behind&quot; and unrepresented by traditional political establishments, leading them to embrace figures who articulate grievances against &quot;the elites.&quot; The often-vituperative nature of contemporary political discourse, where nuance is lost to ideological purity tests and mutual condemnation, directly echoes Lasch&#x27;s concern about the degradation of public debate.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Economic Inequality and Social Fragmentation&lt;&#x2F;strong&gt;: The widening gap between the rich and the rest, a defining feature of the 21st century, exacerbates the sense of elite detachment. Billionaires who fund private space ventures while public infrastructure crumbles, or tech magnates who advocate for &quot;disruption&quot; while workers face precarity, embody the &quot;secession of the successful.&quot; This economic stratification reinforces cultural fragmentation, as different socio-economic groups increasingly inhabit distinct realities, with limited shared experiences or common institutions.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Erosion of Trust in Institutions&lt;&#x2F;strong&gt;: From mainstream media to government bodies and academic institutions, trust is at an all-time low. Lasch would argue that this is not merely a failure of communication, but a symptom of the elite&#x27;s withdrawal and their perceived indifference to the concerns of the broader public. When elites are seen as self-serving and detached, the institutions they lead are inevitably viewed with suspicion. The &quot;meritocracy&quot; he critiqued has led to a perceived lack of accountability and an alienation from traditional pathways to social mobility for many.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Cultural Wars and Identity Politics&lt;&#x2F;strong&gt;: While Lasch was critical of identity politics when it devolved into moralistic self-indulgence (as he explored in The Culture of Narcissism), his broader critique of a fragmented public sphere provides context for the intensity of today&#x27;s cultural wars. Without shared civic values or a common cultural ground, society risks dissolving into warring factions, each retreating into its own &quot;lifestyle enclave&quot; or ideological bubble, precisely as Lasch feared.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;lasch-s-explanatory-framework&quot;&gt;Lasch&#x27;s Explanatory Framework&lt;&#x2F;h2&gt;
&lt;p&gt;Christopher Lasch provides a powerful through-line to our current democratic malaise by shifting the focus from the failures of the &lt;strong&gt;&quot;masses&quot;&lt;&#x2F;strong&gt; to the failures of the &lt;strong&gt;&quot;elites.&quot;&lt;&#x2F;strong&gt; He argues that the uncritical embrace of &quot;progress&quot; and the subsequent detachment of the educated and wealthy have systematically weakened the democratic fabric.&lt;&#x2F;p&gt;
&lt;p&gt;His work suggests that the current crisis is not a sudden aberration but the culmination of long-term trends:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;The erosion of civic virtue&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The decline of shared public life&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The intellectual and moral capitulation&lt;&#x2F;strong&gt; of those entrusted with democratic stewardship&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;He compels us to confront uncomfortable truths: that a healthy democracy requires not just formal institutions, but:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;A robust civic culture&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;A commitment to common standards&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;A recognition of limits&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Mutual obligation between all citizens&lt;&#x2F;strong&gt;, regardless of class&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;For Lasch, the democratic project demands &lt;strong&gt;humility&lt;&#x2F;strong&gt;, &lt;strong&gt;self-restraint&lt;&#x2F;strong&gt;, and a &lt;strong&gt;rootedness in shared experience&lt;&#x2F;strong&gt;--qualities that he argued have been systematically undermined by the very forces that define modern elite culture.&lt;&#x2F;p&gt;
&lt;p&gt;His legacy forces us to ask whether our elites, by their actions and their worldview, have indeed &lt;strong&gt;betrayed democracy&lt;&#x2F;strong&gt;, and whether a renewal of democratic life can only emerge from a &lt;strong&gt;radical re-engagement with the common good&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>The Dark Web Monitoring Scam</title>
        <published>2025-01-25T00:00:00+00:00</published>
        <updated>2025-01-25T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/scamification-security/"/>
        <id>https://nicomee.com/blog/scamification-security/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/scamification-security/">&lt;p&gt;Every major data breach brings a fresh wave of companies pushing &quot;dark web monitoring&quot; services with the predictability of vultures circling carrion.&lt;&#x2F;p&gt;
&lt;p&gt;Within hours of headlines announcing that millions of records have been compromised, your inbox fills with urgent offers from companies promising to scour the internet&#x27;s seedy underbelly, alerting you the moment your personal information surfaces on some shadowy hacker forum. The marketing is slick, the dashboards are impressive, and the value proposition sounds compelling: real-time protection against the digital underworld&#x27;s most dangerous criminals.&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;It&#x27;s also largely, by any rational measure, &lt;em&gt;useless&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt;--a multibillion-dollar industry built on security theater and monetized anxiety.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;what-dark-web-monitoring-actually-does-spoiler-not-much&quot;&gt;What Dark Web Monitoring Actually Does (Spoiler: Not Much)&lt;&#x2F;h2&gt;
&lt;h3 id=&quot;the-marketing-promise&quot;&gt;The Marketing Promise&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s what these services &lt;strong&gt;claim&lt;&#x2F;strong&gt; in their carefully crafted marketing materials:&lt;&#x2F;p&gt;
&lt;p&gt;They&#x27;ll deploy sophisticated algorithms and expert analysts to continuously monitor dark web marketplaces, underground forums, and criminal databases for your personal information--email addresses, passwords, social security numbers, credit card details, driver&#x27;s license numbers, and even medical records. They paint a picture of digital vigilantes, working tirelessly in the shadows to protect your identity from the forces of cyber evil.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-reality&quot;&gt;The Reality&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s what they &lt;strong&gt;&lt;em&gt;actually&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; do:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;They run automated scripts that check a handful of publicly accessible databases and paste sites (many of which aren&#x27;t even on the actual dark web but rather the regular internet with a .onion mirror)&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;They look for exact string matches of the information you&#x27;ve provided them--ironically requiring you to hand over the very data you&#x27;re worried about protecting&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;Then, with great fanfare and urgent-sounding notifications, they tell you what you probably already know: that your email address from the 2019 Capital One breach is still floating around in the same database dump that&#x27;s been recycled through seventeen different &quot;MEGA BREACH COMPILATION&quot; torrents&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h2 id=&quot;the-fundamental-problems&quot;&gt;The Fundamental Problems&lt;&#x2F;h2&gt;
&lt;h3 id=&quot;1-it-s-reactive-not-preventive&quot;&gt;1. It&#x27;s Reactive, Not Preventive&lt;&#x2F;h3&gt;
&lt;blockquote&gt;
&lt;p&gt;By the time your information appears on any forum these services can actually monitor, the horse hasn&#x27;t just left the barn--it&#x27;s already been sold at auction, shipped overseas, and is winning races under a different name.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;p&gt;The damage is done. Your data has been exfiltrated, packaged, sold on private channels, potentially used for multiple fraudulent purposes, and only then--as an afterthought--dumped on some public forum where monitoring services might eventually spot it.&lt;&#x2F;p&gt;
&lt;p&gt;Consider the typical lifecycle of stolen data:&lt;&#x2F;p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Breach&lt;&#x2F;strong&gt;: Hackers quietly exfiltrate information&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Processing&lt;&#x2F;strong&gt;: They sort, validate, and package the data&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Private Sales&lt;&#x2F;strong&gt;: High-value targets are sold privately to trusted buyers&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Public Dumps&lt;&#x2F;strong&gt;: What eventually appears on public forums is typically the dregs&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;p&gt;By the time a monitoring service alerts you that your information has been &quot;discovered,&quot; you&#x27;re essentially being notified that your house has been burglarized, your valuables have been sold, and the empty boxes are now visible in the neighborhood dumpster.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;2-coverage-is-laughably-incomplete&quot;&gt;2. Coverage Is Laughably Incomplete&lt;&#x2F;h3&gt;
&lt;p&gt;The &quot;dark web&quot; isn&#x27;t some monolithic entity with a helpful central directory and search function. It&#x27;s a chaotic ecosystem of:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Thousands of constantly shifting forums&lt;&#x2F;li&gt;
&lt;li&gt;Private Telegram channels with rotating invite links&lt;&#x2F;li&gt;
&lt;li&gt;Discord servers that exist for days before vanishing&lt;&#x2F;li&gt;
&lt;li&gt;Encrypted marketplaces requiring proof of criminal activity to join&lt;&#x2F;li&gt;
&lt;li&gt;Private exchanges happening entirely through encrypted messaging apps&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;No monitoring service can cover even a fraction of where stolen data actually gets traded.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;p&gt;The most valuable criminal exchanges happen in invite-only forums that require:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;Vouching from existing members&lt;&#x2F;li&gt;
&lt;li&gt;Proof of criminal capabilities&lt;&#x2F;li&gt;
&lt;li&gt;Substantial cryptocurrency deposits&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;What monitoring services actually watch are the digital equivalent of pawn shop windows--places where everyone can see what&#x27;s for sale, but where nothing of real value appears anymore.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;3-the-information-is-usually-old&quot;&gt;3. The Information Is Usually Old&lt;&#x2F;h3&gt;
&lt;p&gt;Most of the data these services triumphantly &quot;discover&quot; comes from breaches that happened &lt;strong&gt;years ago&lt;&#x2F;strong&gt;:&lt;&#x2F;p&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Alert Type&lt;&#x2F;th&gt;&lt;th&gt;Actual Source&lt;&#x2F;th&gt;&lt;th&gt;Age&lt;&#x2F;th&gt;&lt;&#x2F;tr&gt;&lt;&#x2F;thead&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&quot;Your password was compromised!&quot;&lt;&#x2F;td&gt;&lt;td&gt;LinkedIn breach&lt;&#x2F;td&gt;&lt;td&gt;2012&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;&quot;Email found in new database!&quot;&lt;&#x2F;td&gt;&lt;td&gt;MySpace dump&lt;&#x2F;td&gt;&lt;td&gt;2013&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;&quot;SSN detected on dark web!&quot;&lt;&#x2F;td&gt;&lt;td&gt;Equifax breach&lt;&#x2F;td&gt;&lt;td&gt;2017&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;&#x2F;tbody&gt;&lt;&#x2F;table&gt;
&lt;p&gt;The cybercriminal economy operates on freshness:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;New data&lt;&#x2F;strong&gt;: Premium prices&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Month-old data&lt;&#x2F;strong&gt;: Heavily discounted&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Year-old data&lt;&#x2F;strong&gt;: Given away as loss leaders&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;You&#x27;re essentially paying someone to tell you that your LinkedIn password from 2012 is still in that same database dump everyone already knows about, available on Have I Been Pwned for free.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;h3 id=&quot;4-the-alerts-are-useless-unless-you-can-actually-do-something&quot;&gt;4. The Alerts Are Useless (Unless You Can Actually Do Something)&lt;&#x2F;h3&gt;
&lt;p&gt;Here&#x27;s where &lt;strong&gt;traditional&lt;&#x2F;strong&gt; monitoring services reveal their fundamental absurdity. What exactly are you supposed to do when you get that urgent 3 AM notification saying your social security number was found on the dark web?&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;You can&#x27;t change your SSN&lt;&#x2F;li&gt;
&lt;li&gt;You can&#x27;t make the data disappear from criminal forums&lt;&#x2F;li&gt;
&lt;li&gt;Traditional monitoring services have no answer&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;But there is one option that actually works:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; buying your data back and removing it from circulation.&lt;&#x2F;p&gt;
&lt;p&gt;This approach was formally recognized as legal by the U.S. Department of Justice in their February 2020 guidance &lt;a href=&quot;https:&#x2F;&#x2F;www.justice.gov&#x2F;criminal-ccips&#x2F;page&#x2F;file&#x2F;1252341&#x2F;download&quot;&gt;Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;To my knowledge, my startup &lt;a href=&quot;https:&#x2F;&#x2F;mindwise.io&quot;&gt;MINDWISE&lt;&#x2F;a&gt; was the only service that actually took that approach.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-real-business-model-monetizing-fear&quot;&gt;The Real Business Model: Monetizing Fear&lt;&#x2F;h2&gt;
&lt;p&gt;Dark web monitoring represents a perfect case study in what happens when the cybersecurity industry realizes that &lt;strong&gt;fear sells better than actual security&lt;&#x2F;strong&gt;. It&#x27;s security theater at its finest--designed to make you feel like you&#x27;re doing something proactive while accomplishing virtually nothing.&lt;&#x2F;p&gt;
&lt;p&gt;These services exploit:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Technological ignorance&lt;&#x2F;strong&gt;: Most people don&#x27;t understand what the &quot;dark web&quot; actually is&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;Justified concern&lt;&#x2F;strong&gt;: Data breaches are real and scary&lt;&#x2F;li&gt;
&lt;li&gt;&lt;strong&gt;The knowledge gap&lt;&#x2F;strong&gt;: People don&#x27;t realize criminal activity happens in places no monitoring service can reach&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;The result? Monthly fees ranging from $10 to $30 per person for automated searches of already-public breach databases combined with scary-sounding weekly reports.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-broader-scamification-pattern&quot;&gt;The Broader Scamification Pattern&lt;&#x2F;h2&gt;
&lt;p&gt;This isn&#x27;t unique to cybersecurity. We&#x27;re watching the systematic financialization of every possible anxiety in modern life.&lt;&#x2F;p&gt;
&lt;p&gt;The &quot;scamification&quot; of modern life is a deliberate, scalable business model that preys on uncertainty and fear. It&#x27;s not unique to dark web monitoring or even cybersecurity--it&#x27;s a blueprint replicated across industries, from finance to health to personal privacy. The formula is simple: identify a legitimate concern, inflate its urgency, offer a shiny but hollow solution, and charge a recurring fee for the illusion of control. This anxiety-to-revenue pipeline thrives because it exploits human psychology and systemic vulnerabilities, creating a self-perpetuating cycle of fear and expenditure.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;how-it-works-the-anatomy-of-the-pipeline&quot;&gt;How It Works: The Anatomy of the Pipeline&lt;&#x2F;h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identify a Real Fear&lt;&#x2F;strong&gt;
Every successful scamification starts with a kernel of truth. Data breaches &lt;em&gt;are&lt;&#x2F;em&gt; real. Identity theft &lt;em&gt;does&lt;&#x2F;em&gt; ruin lives. Financial fraud &lt;em&gt;can&lt;&#x2F;em&gt; wipe out savings. These are not hypotheticals--they&#x27;re documented, frequent, and terrifying. The fear is justified, which makes it ripe for exploitation.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Amplify the Threat&lt;&#x2F;strong&gt;
Marketing campaigns lean into worst-case scenarios, often exaggerating the likelihood or impact of the threat. Dark web monitoring services, for example, conjure images of shadowy hackers trading your social security number in real-time, when in reality, most &quot;dark web&quot; data is old, recycled, and already public. Similarly, credit monitoring services imply that without their watchful eye, you&#x27;re one step away from financial ruin, even though most fraud can be caught by basic vigilance.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Offer a Simple, Shiny Solution&lt;&#x2F;strong&gt;
The solution is always user-friendly, tech-heavy, and reassuringly branded. Dashboards with red alerts, &quot;real-time scans,&quot; and vague promises of &quot;protection&quot; create the illusion of action. VPNs market themselves as bulletproof shields for your entire digital life, despite only encrypting traffic. Antivirus software bombards you with pop-ups about &quot;critical threats&quot; that Windows Defender already neutralized. The goal is to make you &lt;em&gt;feel&lt;&#x2F;em&gt; secure, not to &lt;em&gt;be&lt;&#x2F;em&gt; secure.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lock in Recurring Revenue&lt;&#x2F;strong&gt;
The real genius of scamification is the subscription model. Monthly fees--$10, $20, $30--seem small enough to justify, but they add up to billions across millions of users. These services rely on inertia: once you&#x27;re signed up, you&#x27;re unlikely to cancel, especially if the service keeps sending you &quot;alerts&quot; that reinforce the fear that got you to sign up in the first place.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Deliver Minimal Value&lt;&#x2F;strong&gt;
The final step is ensuring the service does just enough to avoid outright fraud accusations but not enough to solve the actual problem. Dark web monitoring alerts you to old breaches you can&#x27;t act on. Privacy services remove your name from public directories while ignoring the real data brokers like LexisNexis. Credit monitoring flags transactions you&#x27;d already notice if you checked your bank account. The gap between promise and delivery is where the profit lies.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;h3 id=&quot;why-it-s-so-effective&quot;&gt;Why It&#x27;s So Effective&lt;&#x2F;h3&gt;
&lt;p&gt;This pipeline works because it exploits deep-seated psychological and societal vulnerabilities:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fear of the Unknown&lt;&#x2F;strong&gt;: Most people don&#x27;t understand the dark web, data brokers, or how fraud actually happens. This ignorance is a feature, not a bug, for these companies. The less you know, the more you&#x27;ll pay for someone to &quot;handle&quot; it.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Desire for Control&lt;&#x2F;strong&gt;: In a world where data breaches feel inevitable, these services offer the illusion of agency. Signing up feels like &quot;doing something,&quot; even if it&#x27;s ineffective.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Technological Overwhelm&lt;&#x2F;strong&gt;: The complexity of modern tech--blockchains, encrypted forums, AI-driven fraud--makes people feel outmatched. A slick app or service promises to bridge that gap, even if it&#x27;s just a glorified search engine.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Systemic Failures&lt;&#x2F;strong&gt;: The pipeline thrives because the systems meant to protect us are broken. Credit bureaus profit from selling your data &lt;em&gt;and&lt;&#x2F;em&gt; from selling you protection when that data is breached. Banks write off fraud as a cost of business, indemnified by insurance, leaving individuals to fend for themselves. Governments lag behind cybercriminals, leaving a vacuum for private companies to fill with half-baked solutions.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;the-societal-cost&quot;&gt;The Societal Cost&lt;&#x2F;h3&gt;
&lt;p&gt;The scamification pattern doesn&#x27;t just waste money--it erodes trust and distorts priorities. When people spend billions on security theater, they&#x27;re less likely to invest in real solutions like better legislation, open-source tools, or personal education. It also normalizes a pay-to-play model of safety, where only those who can afford subscriptions get &quot;protection,&quot; however ineffective. This creates a two-tiered system: the wealthy get reassured (if not actually protected), while everyone else is left to navigate a minefield of scams and breaches alone.&lt;&#x2F;p&gt;
&lt;p&gt;Moreover, the constant barrage of fear-based marketing keeps people in a state of low-grade panic, making them more susceptible to future upsells. It&#x27;s a feedback loop: anxiety drives purchases, purchases reinforce anxiety, and the cycle continues. This isn&#x27;t just a business model; it&#x27;s a psychological tax on modern life.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;beyond-cybersecurity-the-pattern-everywhere&quot;&gt;Beyond Cybersecurity: The Pattern Everywhere&lt;&#x2F;h3&gt;
&lt;p&gt;The anxiety-to-revenue pipeline isn&#x27;t limited to tech. It&#x27;s everywhere:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Healthcare&lt;&#x2F;strong&gt;: Wellness apps and subscription-based &quot;health monitoring&quot; services promise to catch diseases early but often just repackage basic advice (eat well, exercise) with a monthly fee. Meanwhile, actual healthcare remains inaccessible for millions.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Insurance&lt;&#x2F;strong&gt;: Extended warranties for electronics or appliances exploit fears of rare failures, with fine print ensuring most claims are denied. The math rarely favors the buyer.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Education&lt;&#x2F;strong&gt;: For-profit universities and online courses prey on fears of falling behind in a competitive job market, charging exorbitant fees for credentials with questionable value.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal Safety&lt;&#x2F;strong&gt;: Home security systems and &quot;personal safety apps&quot; market peace of mind with subscriptions that often duplicate free services like 911 or basic phone features.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;In each case, the pattern is the same: a real concern, an exaggerated threat, a shiny but hollow solution, and a subscription to keep the money flowing. The result is a world where every anxiety is a revenue stream, and actual solutions are sidelined in favor of profitable placebos.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;breaking-the-cycle&quot;&gt;Breaking the Cycle&lt;&#x2F;h3&gt;
&lt;p&gt;Escaping this pipeline requires a mix of skepticism, education, and systemic change:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Skepticism&lt;&#x2F;strong&gt;: Question any service that promises to &quot;protect&quot; you from vague, scary threats. If it&#x27;s subscription-based and heavy on marketing, it&#x27;s probably more theater than substance.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Education&lt;&#x2F;strong&gt;: Learn the basics of the threats you&#x27;re facing. Understanding how data breaches work, what the dark web actually is, or how fraud happens demystifies the fear and reduces reliance on middlemen.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Systemic Change&lt;&#x2F;strong&gt;: Push for regulations that hold data brokers, credit bureaus, and banks accountable. Demand transparency about data practices and real consequences for breaches. Support open-source tools and community-driven solutions that prioritize users over profit.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Focus on What Works&lt;&#x2F;strong&gt;: As noted below, real security comes from practical, often free steps: password managers, 2FA, credit freezes, and vigilance. These don&#x27;t generate recurring revenue, which is why they&#x27;re rarely marketed.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;tying-it-back-to-dark-web-monitoring&quot;&gt;Tying It Back to Dark Web Monitoring&lt;&#x2F;h3&gt;
&lt;p&gt;Dark web monitoring is a textbook example of this pipeline. It takes a real fear (data breaches), amplifies it with shadowy imagery (the &quot;dark web&quot;), offers a shiny solution (real-time alerts), and charges monthly for something you could do better with free tools like Have I Been Pwned or basic security hygiene. Its ineffectiveness--reactive alerts, incomplete coverage, old data--mirrors the broader pattern of overpromising and underdelivering. The only difference is the stakes: in cybersecurity, the cost of falling for security theater isn&#x27;t just financial; it&#x27;s the false sense of safety that leaves you vulnerable to real threats.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-anxiety-to-revenue-pipeline&quot;&gt;The Anxiety-to-Revenue Pipeline&lt;&#x2F;h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Credit monitoring&lt;&#x2F;strong&gt;: This should not be even needed in a functioning system and reveals the fundamental weakness of our financial identification system as it currently exists.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Privacy services&lt;&#x2F;strong&gt;: These services are largely useless. All they can do is request removal from places like Whitepages, but the real good shit everyone knows, including the bad guys, is on actual public records and with enormous data brokers like LexisNexis.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;VPNs marketed as comprehensive security&lt;&#x2F;strong&gt;: They are glorified proxy servers, but worse, because there is no guarantee your data isn&#x27;t being saved by the CCP (I did it for the rhyme).&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Antivirus software&lt;&#x2F;strong&gt;: Pretty much every consumer brand except maybe Malwarebytes has basically turned into malware itself or at least obtrusive adware. Windows Defender is doing 99% of the work.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Password &quot;security&quot; services&lt;&#x2F;strong&gt;: Password managers are good, we like password managers here. We don&#x27;t like password managers that charge additional exorbitant fees for doing absolutely nothing. Also, we have seen that some password managers are not equal to others. LastPass gave me bad vibes about two years ago, and I switched. This was prior to them having a serious security breach that exposed many people&#x27;s vaults and consequently robbed many people of their cryptocurrency holdings.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;h3 id=&quot;the-common-thread&quot;&gt;The Common Thread&lt;&#x2F;h3&gt;
&lt;p&gt;Each takes a kernel of &lt;em&gt;legitimate&lt;&#x2F;em&gt; concern and transforms it into a recurring revenue stream by overpromising and underdelivering.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;what-actually-works&quot;&gt;What Actually Works&lt;&#x2F;h2&gt;
&lt;p&gt;Instead of paying for &lt;strong&gt;traditional&lt;&#x2F;strong&gt; dark web monitoring theater, here&#x27;s what actually protects you--most of which costs nothing:&lt;&#x2F;p&gt;
&lt;h3 id=&quot;real-security-measures&quot;&gt;Real Security Measures&lt;&#x2F;h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Use a password manager with unique, complex passwords for every account&lt;&#x2F;strong&gt;: This single step makes you virtually immune to credential stuffing attacks. Even if every password you&#x27;ve ever used gets leaked tomorrow, unique passwords mean the damage is contained.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Enable 2FA everywhere possible, and use authenticator apps, not SMS&lt;&#x2F;strong&gt;: Two-factor authentication remains one of the most effective security measures available. Avoid SMS-based 2FA when possible--SIM swapping attacks are increasingly common.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Freeze your credit if you&#x27;re not actively using it&lt;&#x2F;strong&gt;: This free service from credit bureaus stops anyone from opening new accounts in your name. It&#x27;s the closest thing to actual identity theft prevention that exists.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Monitor your actual financial accounts regularly&lt;&#x2F;strong&gt;: Set up alerts for all transactions. Review statements monthly. You&#x27;ll spot fraudulent activity faster than any monitoring service.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Be skeptical of unsolicited communications&lt;&#x2F;strong&gt;: Thanks to data breaches, scammers can know your full name, address, and recent purchases. This doesn&#x27;t make them legitimate.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Keep your software updated&lt;&#x2F;strong&gt;: Those annoying update notifications? They&#x27;re usually patching security vulnerabilities.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Practice good email hygiene&lt;&#x2F;strong&gt;: Be suspicious of attachments and links. Verify sender addresses. When in doubt, contact the supposed sender through a different channel.&lt;&#x2F;p&gt;
&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;blockquote&gt;
&lt;p&gt;These steps are free or low-cost and actually prevent harm rather than just notifying you after it&#x27;s happened.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;
&lt;h2 id=&quot;the-bottom-line&quot;&gt;The Bottom Line&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;strong&gt;Traditional&lt;&#x2F;strong&gt; dark web monitoring is a solution desperately searching for a problem it can actually solve. It&#x27;s the cybersecurity equivalent of those extended warranty calls--preying on fear and ignorance to extract money while providing minimal value.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-hard-truth&quot;&gt;The Hard Truth&lt;&#x2F;h3&gt;
&lt;p&gt;Your data is probably already out there from any number of breaches. If you&#x27;ve used the internet for more than a few years, some combination of your personal information exists in some criminal database. This isn&#x27;t pessimism--it&#x27;s statistical probability.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;the-real-solution&quot;&gt;The Real Solution&lt;&#x2F;h3&gt;
&lt;p&gt;But accepting that reality doesn&#x27;t mean accepting powerlessness. While the &lt;strong&gt;traditional&lt;&#x2F;strong&gt; monitoring industry contents itself with sending useless alerts, we&#x27;ve built something different--a service that actually takes action.&lt;&#x2F;p&gt;
&lt;p&gt;Through the legally-sanctioned approach recognized by the Department of Justice, we don&#x27;t just notify you that your data is being traded; &lt;strong&gt;we actively work to remove it from circulation&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;This, combined with real security measures creates actual protection rather than security theater. The difference is:&lt;&#x2F;p&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Traditional Monitoring&lt;&#x2F;th&gt;&lt;th&gt;Our Approach&lt;&#x2F;th&gt;&lt;&#x2F;tr&gt;&lt;&#x2F;thead&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;Observation&lt;&#x2F;td&gt;&lt;td&gt;Action&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;Notification&lt;&#x2F;td&gt;&lt;td&gt;Remediation&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;tr&gt;&lt;td&gt;Status quo&lt;&#x2F;td&gt;&lt;td&gt;Disruption&lt;&#x2F;td&gt;&lt;&#x2F;tr&gt;
&lt;&#x2F;tbody&gt;&lt;&#x2F;table&gt;
&lt;h2 id=&quot;disclaimer&quot;&gt;Disclaimer&lt;&#x2F;h2&gt;
&lt;p&gt;My first startup, &lt;a href=&quot;https:&#x2F;&#x2F;mindwise.io&quot;&gt;MINDWISE.IO&lt;&#x2F;a&gt;, is a dark web monitoring service that actually takes action. We&#x27;re the only service that implements the legal framework established by the Department of Justice. We don&#x27;t just notify you that your data is being traded; we actively work to remove it from circulation.&lt;&#x2F;p&gt;
&lt;p&gt;Unfortunately, on a bank level, we are unable to generate interest--banks don&#x27;t care about fraud in the same way you do. They look at it as a purely financial risk, and one they are indemnified against with insurance. In other words, they expect to lose X amount of money, and as long as they are not losing more than that, they are happy.&lt;&#x2F;p&gt;
&lt;p&gt;Oh, and just a quick reminder, these are the same people that were responsible for nearly destroying the entire global financial system and left U.S. taxpayers holding the bag in the 2007-2008 range. They are great people.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Why Big Tech Companies Don&#x27;t Give a Damn About You</title>
        <published>2024-12-29T00:00:00+00:00</published>
        <updated>2024-12-29T00:00:00+00:00</updated>
        
        <author>
          <name>
            Nico Kokonas
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/blog/big-tech-user-contempt/"/>
        <id>https://nicomee.com/blog/big-tech-user-contempt/</id>
        
        <content type="html" xml:base="https://nicomee.com/blog/big-tech-user-contempt/">&lt;h2 id=&quot;the-baidu-wake-up-call&quot;&gt;The Baidu Wake-Up Call&lt;&#x2F;h2&gt;
&lt;p&gt;I stumbled across this brutal Twitter rant that perfectly captures the rage every tech user feels but rarely articulates:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;em&gt;&quot;Why hasn&#x27;t a big company like Baidu, with a product like Baidu Cloud that has so many users, bothered to adapt it for high-resolution screens? It&#x27;s like they&#x27;re force-feeding users crap; every time I open it, it&#x27;s disgusting.&quot;&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Disgusting.&lt;&#x2F;strong&gt; That&#x27;s the word that cuts to the bone here. Not &quot;suboptimal&quot; or &quot;needs improvement&quot;--&lt;strong&gt;disgusting&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
&lt;p&gt;And you know what? They&#x27;re absolutely right.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-brutal-economics-of-user-contempt&quot;&gt;The Brutal Economics of User Contempt&lt;&#x2F;h2&gt;
&lt;p&gt;Here&#x27;s the uncomfortable truth that every product manager knows but will never admit publicly: domestic tech giants don&#x27;t need to care about user experience.&lt;&#x2F;p&gt;
&lt;p&gt;Their competitive advantage isn&#x27;t built on delighting customers--it&#x27;s built on creating dependency through market dominance and ecosystem lock-in. Once they&#x27;ve got you trapped in their walled garden, they can serve you garbage on a silver platter and you&#x27;ll keep eating it.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-cost-benefit-calculus-of-contempt&quot;&gt;The Cost-Benefit Calculus of Contempt&lt;&#x2F;h2&gt;
&lt;p&gt;Let&#x27;s do the math that keeps executives awake at night:&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;Option A:&lt;&#x2F;strong&gt; Deploy several developers and designers for months to fix high-DPI support
&lt;strong&gt;Option B:&lt;&#x2F;strong&gt; Launch a quick marketing campaign that drives immediate revenue&lt;&#x2F;p&gt;
&lt;p&gt;Guess which one wins every single time?&lt;&#x2F;p&gt;
&lt;p&gt;The harsh reality is that polishing the user interface generates zero measurable revenue compared to aggressive user acquisition tactics. In fact, it often shows up as negative ROI on quarterly reports--the kiss of death in corporate boardrooms.&lt;&#x2F;p&gt;
&lt;p&gt;But here&#x27;s the part that should make us all furious: this reflects our collective failure as consumers. Domestic users have been systematically trained to accept mediocrity. We complain, we rant on social media, but we keep using the damn products anyway.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;exhibit-b-dji-s-calculated-indifference&quot;&gt;Exhibit B: DJI&#x27;s Calculated Indifference&lt;&#x2F;h2&gt;
&lt;p&gt;The DJI Pocket case study reveals just how surgically precise this contempt can be.&lt;&#x2F;p&gt;
&lt;p&gt;I remember that forum post about the absolute nightmare of transferring files from the DJI Pocket. Anyone who&#x27;s tried to move footage off that device knows the pain--it&#x27;s like the engineers actively tried to make it as frustrating as possible.&lt;&#x2F;p&gt;
&lt;p&gt;That post exploded with engagement. Hardcore vloggers and NAS enthusiasts--people who actually understand workflow optimization--flooded the comments with detailed, actionable suggestions. These weren&#x27;t casual users whining about minor inconveniences; these were power users offering free consulting on how to fix a genuinely broken experience.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;two-years-of-silence&quot;&gt;Two Years of Silence&lt;&#x2F;h3&gt;
&lt;p&gt;DJI&#x27;s response after two years? Complete radio silence.&lt;&#x2F;p&gt;
&lt;p&gt;Not a single employee acknowledgment. Not even a form letter saying &quot;thanks for the feedback.&quot; Just the corporate equivalent of a middle finger.&lt;&#x2F;p&gt;
&lt;p&gt;Why? Because DJI&#x27;s spreadsheet warriors ran the numbers and realized that optimizing file transfer workflows would help maybe 5% of their user base become marginally more productive. The other 95%--the Instagram weekend warriors who shoot 30-second clips--couldn&#x27;t care less about efficient batch transfers.&lt;&#x2F;p&gt;
&lt;p&gt;The Pocket&#x27;s core competitiveness has nothing to do with respecting power users&#x27; time. It&#x27;s about being small, affordable, and producing decent footage for social media. Everything else is noise.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-capital-market-reality-check&quot;&gt;The Capital Market Reality Check&lt;&#x2F;h2&gt;
&lt;p&gt;Here&#x27;s what the motivational business books won&#x27;t tell you:&lt;&#x2F;p&gt;
&lt;ul&gt;
&lt;li&gt;&quot;Big company&quot; does not equal user-friendly products&lt;&#x2F;li&gt;
&lt;li&gt;&quot;Millions of users&quot; does not equal caring about individual experience&lt;&#x2F;li&gt;
&lt;li&gt;&quot;Market dominance&quot; does not equal quality improvement incentives&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;That&#x27;s not how capital markets work, and it&#x27;s not how they&#x27;re designed to work.&lt;&#x2F;p&gt;
&lt;p&gt;Public companies exist to maximize shareholder value, period. User experience improvements only matter insofar as they drive measurable revenue growth or prevent churn. If you&#x27;re already locked into their ecosystem and complaining but not leaving, you&#x27;re essentially subsidizing their indifference.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;the-uncomfortable-truth&quot;&gt;The Uncomfortable Truth&lt;&#x2F;h2&gt;
&lt;p&gt;We&#x27;re not customers--we&#x27;re revenue units in a spreadsheet. And until we start acting like customers who actually have alternatives and use them, nothing will change.&lt;&#x2F;p&gt;
&lt;p&gt;The rant about Baidu Cloud isn&#x27;t really about high-DPI support. It&#x27;s about a fundamental disrespect for users&#x27; time, intelligence, and dignity. And the most infuriating part?&lt;&#x2F;p&gt;
&lt;p&gt;&lt;strong&gt;They&#x27;re getting away with it because we let them.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Ticketing Platform Automation</title>
        <published>2024-06-30T00:00:00+00:00</published>
        <updated>2024-06-30T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/ticketing-automation/"/>
        <id>https://nicomee.com/projects/ticketing-automation/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/ticketing-automation/">&lt;p&gt;As a Scraping Engineer at &lt;a href=&quot;https:&#x2F;&#x2F;automatiq.com&#x2F;&quot;&gt;Automatiq&lt;&#x2F;a&gt; — the #1 automation platform powering ticket resale, with $3.5B+ in priced inventory and 500+ customers — I rebuilt the company&#x27;s core data acquisition infrastructure from the ground up.&lt;&#x2F;p&gt;
&lt;p&gt;I inherited a small, static fleet of EC2 instances running legacy scraping code and transformed it into a fully distributed system on AWS Fargate, processing over 10 million tickets daily across every major ticketing platform. Each provider was segmented into its own queue with independent autoscaling, which dramatically improved resource utilization and reduced time-to-resolution for customers.&lt;&#x2F;p&gt;
&lt;p&gt;The core challenge was a relentless cat-and-mouse game with Ticketmaster, SeatGeek, AXS, and other major platforms. These companies deployed increasingly sophisticated anti-automation measures — obfuscated JavaScript, browser fingerprinting, behavioral analysis, CAPTCHAs, and constantly rotating API signatures. Every few weeks, a platform would ship new countermeasures, and I&#x27;d reverse-engineer the updated JavaScript protections, deobfuscate their detection logic, and rebuild our integrations to stay ahead. This was a continuous cycle of breaking, patching, and adapting that ran for three years straight.&lt;&#x2F;p&gt;
&lt;p&gt;One notable result of this work was a &quot;transferless&quot; delivery mechanism — a method to deliver tickets to buyers without them ever leaving the seller&#x27;s account, bypassing platform transfer restrictions entirely. I also built a serverless API that processed Apple Wallet ticket passes and converted them to distributable PDFs, unlocking a category of inventory that had previously been undeliverable.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>MINDWISE.IO</title>
        <published>2021-06-30T00:00:00+00:00</published>
        <updated>2021-06-30T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/mindwise/"/>
        <id>https://nicomee.com/projects/mindwise/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/mindwise/">&lt;p&gt;As Co-Founder and CTO of &lt;a href=&quot;https:&#x2F;&#x2F;mindwise.io&quot;&gt;Mindwise&lt;&#x2F;a&gt;, I built a real-time fraud prevention and threat intelligence platform serving banks, credit unions, payment processors, and federal law enforcement.&lt;&#x2F;p&gt;
&lt;p&gt;The platform continuously monitored over 1,000 dark web sources — underground marketplaces, forums, and threat actor channels — to identify compromised financial data before it could be used. When stolen card data surfaced, the system matched partial card information against client portfolios using an integration with LexisNexis, enabling institutions to proactively block and reissue affected cards. Alerts were delivered in under an hour, months ahead of what traditional security vendors could offer.&lt;&#x2F;p&gt;
&lt;p&gt;Clients included &lt;a href=&quot;https:&#x2F;&#x2F;www.golden1.com&#x2F;&quot;&gt;Golden One Credit Union&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;www.bancfirst.bank&#x2F;&quot;&gt;BancFirst&lt;&#x2F;a&gt;, and the &lt;a href=&quot;https:&#x2F;&#x2F;www.uspis.gov&#x2F;&quot;&gt;U.S. Postal Inspection Service&lt;&#x2F;a&gt; Cybercrime Division, where intelligence from the platform was used to identify and prosecute vendors trafficking stolen financial data on the darknet.&lt;&#x2F;p&gt;
&lt;p&gt;The platform processed billions of transactions, maintained sub-50ms detection speeds, and helped clients reduce fraud losses significantly. Built on Postgres, TypeScript, Firebase, and Playwright-based automation for intelligence gathering at scale.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Astro Analytics</title>
        <published>2019-12-31T00:00:00+00:00</published>
        <updated>2019-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/astro-analytics/"/>
        <id>https://nicomee.com/projects/astro-analytics/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/astro-analytics/">&lt;p&gt;A platform for enhanced OSINT data collection, analysis, and visualization. Integrated with LexisNexis for comprehensive data sourcing, enabling powerful investigative capabilities.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Price Monitoring System</title>
        <published>2019-12-31T00:00:00+00:00</published>
        <updated>2019-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/price-monitoring/"/>
        <id>https://nicomee.com/projects/price-monitoring/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/price-monitoring/">&lt;p&gt;Built a resilient price tracking system for major retailers including Amazon, Walmart, and BestBuy, handling millions of products. Automated the extraction of user data at scale (with their consent) and the submission and fulfillment of price protection claims on the Citibank website for items whose prices had changed within the past month.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Sanator Provider Registry</title>
        <published>2016-08-31T00:00:00+00:00</published>
        <updated>2016-08-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/sanator-registry/"/>
        <id>https://nicomee.com/projects/sanator-registry/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/sanator-registry/">&lt;p&gt;As a Master Data Engineer at &lt;a href=&quot;https:&#x2F;&#x2F;www.gaine.com&#x2F;&quot;&gt;Gaine Solutions&lt;&#x2F;a&gt;, I worked with the team to build the Sanator Provider Registry — California&#x27;s mandated healthcare provider directory under SB137. The registry standardized and unified provider data across the state&#x27;s healthcare ecosystem, enabling accurate provider lookups for insurers, hospitals, and regulators.&lt;&#x2F;p&gt;
&lt;p&gt;I designed and built the core SQL data import and cleansing pipelines that ingested provider records from disparate sources, normalized them against regulatory schemas, and surfaced data quality issues before they reached production. The work involved heavy use of SQL Server, Redgate tooling, and Power BI for pipeline monitoring and stakeholder reporting — all under strict HIPAA compliance requirements.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>High Altitude Balloon for Scientific Research</title>
        <published>2015-12-31T00:00:00+00:00</published>
        <updated>2015-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/balloon/"/>
        <id>https://nicomee.com/projects/balloon/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/balloon/">&lt;p&gt;I designed and built the complete hardware and software payload for a high-altitude balloon that ascended to 100,000 feet. The project was a solo effort — I handled all planning, electronics design, sensor integration, and flight software myself. A small team helped with the physical recovery after landing.&lt;&#x2F;p&gt;
&lt;p&gt;The payload was built around a Beaglebone Black running custom data acquisition software. Onboard sensors captured temperature, barometric pressure, and radiation spectra across alpha, beta, and gamma bands throughout the flight. The system logged continuous measurements from launch through burst altitude and descent, surviving the temperature extremes and near-vacuum conditions of the upper atmosphere.&lt;&#x2F;p&gt;
&lt;p&gt;The project won 1st Place in the Instructables Explore Science Contest.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>NETGEAR Hammer</title>
        <published>2015-12-31T00:00:00+00:00</published>
        <updated>2015-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/netgear-hammer/"/>
        <id>https://nicomee.com/projects/netgear-hammer/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/netgear-hammer/">&lt;p&gt;An offensive security tool that exposed fundamental weaknesses in NETGEAR&#x27;s serial number assignment scheme. Featured in a presentation at DEFCON 20, demonstrating how predictable serial number generation could be exploited.&lt;&#x2F;p&gt;
</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Leafy Cryptocurrency</title>
        <published>2013-12-31T00:00:00+00:00</published>
        <updated>2013-12-31T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://nicomee.com/projects/leafy/"/>
        <id>https://nicomee.com/projects/leafy/</id>
        
        <content type="html" xml:base="https://nicomee.com/projects/leafy/">&lt;p&gt;A proof-of-work cryptocurrency that integrates climate impact into its core incentives. 20% of all transaction fees are directed to verified tree-planting programs, with the blockchain providing full transparency and auditability of the funds.&lt;&#x2F;p&gt;
</content>
        
    </entry>
</feed>
