Posted inCyborg Bytes Economics Private Equity’s Stranglehold on the American Dream Pt. 2 You won't believe how private equity is legally stealing your future. Welcome back to this week's edition of Cyborg Bytes, where we…
Posted inDigital Well-Being Disability MemiorZines for Aphantasia: Keeping Up With Memories & Life Events Living with aphantasia means that the usual vivid snapshots of memories don’t exist in my mind. Instead, my memories are a collection…
Posted inCyborg Bytes Economics Private Equity & Its Stranglehold on the American Dream Setting: You’re sitting in on a Golden Gate Capital private equity meeting circa 2014. As the private equity firm that purchased Red…
Posted inCybersecurity Mastery Hacking Exploiting WPS Vulnerability: The Fast Track to Cracking WPA/WPA2 Wi-Fi Networks As I ventured deeper into the realm of red team operations, my intrigue with the practical vulnerabilities of my own home network…
Posted inSolarpunk IRL Opting Out: My Plan to Combat the Corrupt System The Problem: Health Crises and Surveillance In an era riddled with health crises linked to processed foods—where common hydration drinks contain forever…
Posted inCyborg Bytes Digital Well-Being An Introductory Guide to Spiral Dynamics: The Secret Patterns of Human Behavior Have you ever encountered someone with a vastly different opinion and thought, "They must live in an alternate reality"? What if I…
Posted inCybersecurity Mastery Hacking WEP Cracking: Techniques for Accessing “Secure” Wi-Fi Networks Mastering the Art of WEP Cracking Welcome to today's session in our hacking tutorial series, where we delve into the technique of…
Posted inCybersecurity Mastery Hacking At-Home Cyberwar: A Guide to Deauthentication Attacks Who knew that network sabotage via deauthentication attacks could be a love language? Last week, I ventured into the world of MAC…
Posted inCyborg Bytes Starve the Celebrity Economy: Take Control of Your Attention and Embrace Purposeful Living How does it feel to see celebrities and influencers flaunt their wealth at the Met Gala while everyday people struggle to make…
Posted inCybersecurity Mastery Hacking Unlocking MAC Spoofing Secrets: A Fun Guide to Network Exploration After spending 14 years as the good guy in cybersecurity (the blue teamer who makes sure everything is secure), I decided it…