Tag: Tech
-
Suppose Google was Compromised
> Read More: Suppose Google was CompromisedThreat modeling is the information security practice of anticipating and mitigating negative outcomes in physical and digital systems, most often unauthorized access, theft, and vandalism. I thought it would be fun to practice this skill on a novel scenario. Even better if its something apparently nobody has ever solved or published resources for, but that…
๐ Category: Essays
-
Help, I Am Being Haunted by Store-Brand Oreos
> Read More: Help, I Am Being Haunted by Store-Brand OreosA story about my family history of gambling addiction, childhood experience with food insecurity, and how emerging technologies which facilitate financial speculation continue to influence my career in tech.
๐ Category: Essays
-
Consent and Abuse in Boyfriend Dungeon
> Read More: Consent and Abuse in Boyfriend DungeonIn this article, weโll discuss how Boyfriend Dungeon contrasts via gameplay both healthy and unhealthy consent models. Weโll also break down the anatomy of abuse by isolating specific emotional manipulation techniques that are employed by its antagonist, and explore the unique potential of dating sims as learning tools, which empower survivors of abuse to safely…
๐ Category: Essays