Cybersect

Home
Archive
About

Sitemap - 2023 - Cybersect

The meaning of sync/async

What's the most durable USB C power cable

Notes on Musk's CTIL conspiracy-theory

What fonts to use for coding

Stop with the cancel-culture in infosec

How to make C memory safe

ARM Trademark for hackers

Summary: Lindell's WiFi Monitor

Explainer: Mike Lindell's WiFi drone that's gonna save us from the Chinese

meta³: Fact-checking fact-checkering of fact-checkers

A computer history deprogrammer

Why Biden's 'Cyber Trust Mark' is nonsense

Hunter Biden vs. the drive forensics

Mobile cybersecurity advice

A software-engineer's view on OceanGate

Explainer: Dominion vulns reported by Halderman

"Technical Debt" is a bad metaphor

Why 8(to)7 encryption is just another perpetual-crypto algorithm

The .zip domains are a good idea

What the heck is "Media Access Control" or "MAC"????

Some notes about cybersecurity ethics

What we know about the provenance and authenticity of "Hunter Biden Laptop"

Notes on yesterday $5 million judgement against Mike Lindell

© 2025 Robert Graham
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share