Home
Archives
Reference
About
  • Doubling down on view source

    Dec 5, 2021 Technology Conventional-Wisdom Inappropriate-use

    View source, next chapter A few weeks ago I wrote about a travesty of technology where officials in Missouri shifted the blame for making a mistake to a reporter for finding it. To sum it up, People in their organization made a series of mistakes that resulted in hundreds of thousands of people in education having …

    Read More
  • View source

    Nov 12, 2021 Technology Conventional-Wisdom Inappropriate-use

    View Source I’ve been using browsers for almost 30 years and I can’t remember a time that there hasn’t been some sort of “View Source” option being present as I right click on a page. Of course there were some ham fisted attempts to hide it with JavaScript. I’ve even seen pages pull …

    Read More
  • Blockchain

    Oct 17, 2020 blockchain inappropriate use

    Over the last 5 years I have talked to a lot of companies that have been working with blockchain technology. While blockchain is an amazing concept, as are most implementations, many of those uses made no sense. In fact a few of the companies later admitted the only reason they were using blockchain was to increase …

    Read More

Shawn Masters

Anticryptography: Extending information through time and space.
Read More

Featured Posts

  • Don't worry, I've got this???
  • Matter
  • Executable
  • Social media isn't yours
  • May you own a little more this year than in the last.
  • Celebrity?
  • Quite Ok image format
  • ML winter
  • Bits for life
  • It wasn't supposed to be like this
  • Ransomware
  • Quora
  • Data literacy
  • Galactic trash
  • Blockchain
  • Code is data
  • Aww, snap
  • How not to blog

Recent Posts

  • Don't worry, I've got this???
  • Matter
  • Executable
  • Social media isn't yours
  • Signatures
  • Books
  • Backups
  • May you own a little more this year than in the last.

Categories

ANTICRYPTOGRAPHY 6 ARCHIVING 5 FILE-FORMAT 4 SCAMS 4 TECHNOLOGY 4 THINKING 3 APPLICATIONS 2 BLOCKCHAIN 2 BLOGGING 2 FUTURE 2 MACHINE-LEARNING 2 SOCIAL-MEDIA 2 BOOKS 1 CYBERSECURITY 1
All Categories
ANTICRYPTOGRAPHY6 APPLICATIONS2 ARCHIVING5 BLOCKCHAIN2 BLOGGING2 BOOKS1 CYBERSECURITY1 DATA-LITERACY1 EDITOR1 ENCODING1 FILE-FORMAT4 FIRST-POST1 FUTURE2 MACHINE-LEARNING2 MATTER1 NOSTALGIA1 OPERATIONAL-SYSTEMS1 SCAMS4 SOCIAL-MEDIA2 STORAGE1 TECHNOLOGY4 THINKING3
[A~Z][0~9]

Tags

ARCHIVING 10 ANTICRYPTOGRAPHY 8 FILE-FORMAT 7 MEDIA 7 STORAGE 7 CONVENTIONAL-WISDOM 5 BLOGGING 4 IMAGES 4 MARKETING 4 OWNERSHIP 4 TECHNOLOGY 4 ALIENS 3 APPLICATIONS 3 ENCODING 3
All Tags
3D-PRINTING1 8-BIT1 ALIENS3 ANTICRYPTOGRAPHY8 APPLE1 APPLICATIONS3 ARCHIVING10 ARTIFICIAL-INTELLIGENCE2 ATTENTION2 BEST-PRACTICES2 BLOCKCHAIN2 BLOGGING4 BOOKS1 CHARACTERS1 CONVENTIONAL-WISDOM5 CYBERSECURITY1 EDITOR1 ENCODING3 FILE-FORMAT7 FLOPPIES2 FUD1 FUTILE1 IMAGES4 INAPPROPRIATE-USE3 INDEX2 LIFECYCLE2 MACHINE-LEARNING2 MARKETING4 MEDIA7 META1 NOSTALGIA1 NUCLEAR-WEAPONS1 OWNERSHIP4 PACKAGES2 PROGRAMMING1 RANSOMWARE1 SCAMS3 SIGNATURES1 SITE1 SOCIAL-MEDIA2 SPAM2 STARTING-OVER1 STATISTICS1 STOPPING-BAD-PRACTICES3 STORAGE7 TECHNOLOGY4 UNICODE1 UNINTENDED-CONSEQUENCES2 VSCODE1
[A~Z][0~9]

Copyright © 2025 ANTICRYPTOGRAPHY. All Rights Reserved