Every summer, I vanish. No email. No meetings. No alerts, updates, or conference calls. I trade the world of screen time and artificial urgency for something raw, wet, cold—and real. I disappear into the Alaskan backcountry, strap on a drysuit, fire up an old 6” dredge, and go hunting for…
Month: June 2025
The DigiDollar Reformation: A Call for Financial Sovereignty on DigiByte – #DigiByte $DGB $BTC $LTC
In 1517, Martin Luther nailed 95 theses to a church door, igniting the Protestant Reformation — a movement that shattered centralized religious power and returned agency to the people. On June 6, 2025, a DigiByte community member named Sogobi Napiasi dropped something similar — a digital thesis, if you will:…
Blockchain at Home: Turning Everyday Devices into Decentralized Nodes with Raspberry Pi
The push for decentralization in blockchain isn’t just ideological—it’s practical. To stay resilient, censorship-resistant, and secure, blockchains must be distributed widely across independent nodes. But as network requirements increase, participation becomes concentrated in the hands of a few well-funded players with powerful hardware. A compelling countertrend is emerging: leveraging consumer…
Reflecting on My Appearance on BlockHash Podcast Episode #521
I’m thrilled to share that I recently had the opportunity to join Brandon Zemp on the BlockHash Podcast for Episode #521. In this episode, we delved into the harrowing experience of losing over $31 million in cryptocurrency due to a targeted SIM swap attack—a story I detail in my memoir,…
Crypto Security and Physical Safety: Why You’re a Target Even If You Don’t Flaunt It
When people think about crypto security, they often focus on digital protections—hardware wallets, seed phrases, and private keys. But if you ignore physical security, you’re leaving yourself dangerously exposed. If you don’t consider yourself a target, then you already are one. This isn’t fearmongering—it’s reality. Whether you flaunt your crypto…
Smart Cars, Dumb Passwords: Why the Auto Industry Must Prioritize Cybersecurity
In an era where vehicles are becoming increasingly connected and reliant on digital systems, cybersecurity has emerged as a critical concern. A recent highlighted in HackRead, reveals that the automotive industry is alarmingly dependent on weak and reused passwords, leaving smart cars and critical systems vulnerable to cyberattacks. The Alarming…