Friday, November 7, 2025
In a world that forgets to adapt, even staying updated is rebellion
Posted by
quangntenemy
at
12:40 PM
0
comments
Labels: Adapt, Continuous, Digital, Evolution, Growth, Learning, Mindset, Rebellion
Monday, October 13, 2025
We Built a World That Remembers Everything - Except How to Pay Attention
Ethan didn't even know he'd been exposed.
A week after a corporate data breach, the calls began.
A polite voice said his reward points were expiring - just needed to verify his booking.
The email that followed looked perfect: same logo, same tone, even his travel history matched.
It felt safe because it looked familiar.
He almost clicked. He almost believed.
Because how could a stranger know that much?
That's what data leaks do now - they don't steal your money; they steal your certainty.
Your name, your address, your travel dates, the way you type "thank you" - all small pieces of you scattered through digital space, waiting to be reassembled by someone who knows how to sound human.
Recently, a major CRM platform and its connected apps faced an incident like this -
tokens stolen, permissions misused, third-party tools quietly abused.
The core system stood firm, but its ecosystem didn't.
And that's how most breaches happen today: not through one big break, but through thousands of tiny conveniences left unguarded.
We built a world where everything connects - and then forgot what that means.
Every integration that saves time also opens a door.
Every automated process that makes work smoother also hides risk in the background.
You can't stop the world from leaking,
but you can protect your own surface area.
Start here - awareness, boundaries, and habits:
1. Awareness
- Check if your email or accounts have been part of known breaches (try Have I Been Pwned).
- Don't trust familiarity - phishing now looks personal. If a message feels too specific, that's the warning.
- Slow down when urgency speeds you up.
2. Boundaries
- Review connected apps in your most-used platforms.
- Revoke access you don't use.
- Turn on two-factor authentication - app-based, not SMS.
3. Habits
- Rotate credentials regularly.
- Separate work and personal logins.
- Never reuse passwords across systems.
The deeper truth is harder to face:
We didn't lose control of our data - we gave it away.
Piece by piece. For efficiency, for ease, for the comfort of automation.
Technology didn't betray us; it simply held up a mirror.
And in that reflection, we see how attention decays.
The next breach won't come from a hacker's brilliance - it'll come from our forgetfulness.
Protect your data like it's already public.
Protect your attention like it's your last real defense.
Also visit: https://quangntenemy.substack.com/p/we-built-a-world-that-remembers-everything
Posted by
quangntenemy
at
10:21 AM
0
comments
Labels: attention, awareness, breach, CyberSecurity, Data, Digital, factor, human, Privacy, technology, Trust
Wednesday, October 8, 2025
💻 The Ghost Committer
Elias was a senior backend engineer at a tech company that liked to talk about "innovation" and "collaboration".
He didn't care much for slogans.
He just built things that worked.
He designed most of the core backend systems himself.
When production went down, he fixed it.
When deadlines broke, he held them together.
His fingerprints were on everything - except the commit history.
⚙️ Company policy required all code to go through a "review gate" that reassigned authorship to the team lead.
It was supposed to promote teamwork.
In reality, it erased the people doing the work.
Elias didn't push back.
He believed results would speak louder than titles.
But in corporate life, visibility often drowns out contribution.
📊 At the annual review, his manager presented Elias's architecture diagrams as "his own strategic vision".
The room applauded.
HR called it "a great example of leadership".
That's when Elias understood: invisibility wasn't a bug in the system.
It was the design.
⏳ A few months later, when a bad deploy brought everything down, he didn't rush to fix it.
He waited.
The outage lasted seventeen hours.
Then the company called him back - as a consultant.
💰 Double pay.
Same system.
He accepted. Not to prove them wrong, but to prove a quieter truth:
Even in a world obsessed with visibility, real work still leaves a shadow - and the system can't run without it.
Also visit: https://quangntenemy.substack.com/p/the-ghost-committer
Posted by
quangntenemy
at
5:17 AM
0
comments
Labels: BehindTheCode, Corporate, Culture, Engineer, Engineering, Ethics, ghost, Invisible, Leadership, reality, Recognition, Software, system, Teamwork, Tech, workplace
Tuesday, September 30, 2025
The Gospel of Crypto Is Written in Shadows
Also visit: https://quangntenemy.substack.com/p/the-gospel-of-crypto-is-written-in
Monday, September 22, 2025
When mastery met mystery, the silence told the story
Am I defending truth, or just preserving illusions?
Why do we build walls? Why do we worship distractions while the ground beneath us trembles?
“Your questions are useless unless someone builds a foundation. Without walls, the world falls into chaos.”
“And your walls are useless if no one asks whether they guard truth or only comfort. Without questions, the world rots from within.”
Also visit: https://quangntenemy.substack.com/p/when-mastery-met-mystery-the-silence
Tuesday, September 16, 2025
Surveillance vs Security: The Rotten Truth About Protection
Also visit: https://quangntenemy.substack.com/p/surveillance-vs-security-the-rotten
Friday, September 12, 2025
Monday, September 8, 2025
Vegan Dogs and Cybersecurity: How the World Is Burning While We Bark at the Wrong Fires
Posted by
quangntenemy
at
8:46 AM
0
comments
Labels: ai, CorporateBS, critical, CyberSecurity, decay, Digital, Dogs, Ethics, Infosec, society, Tech, thinking, Vegan
Tuesday, August 19, 2025
Jiuzhang 3.0 is not a cryptographic threat. But the next generation of universal fault-tolerant machines will be!
Recently, China made waves with its photonic quantum computer, Jiuzhang 3.0, solving Gaussian boson sampling problems 10 billion times faster than classical supercomputers.
✅ Yes, it's a leap in quantum speed.
❌ No, it cannot break encryption - yet.
Jiuzhang isn’t a universal quantum computer.
❌ It can’t run Shor’s algorithm.
❌ It has no error-corrected qubits, no gates, and no fault tolerance.
But the writing is on the wall.
🧠 What would it take to break RSA-2048?
- 4,000 logical qubits
- Millions of physical qubits (with error correction)
- A week of compute time, maybe less
And it’s no longer theoretical - it’s on the roadmap
⚠️ The risk isn’t Jiuzhang. It’s complacency.
Most organizations are still relying on RSA and ECC, while quantum research accelerates at a pace few outside the field are tracking.
Harvest-now-decrypt-later isn’t a theory anymore.
Data stolen today could be decrypted in the next decade - or sooner.
🛡️ The move to post-quantum cryptography isn’t optional.
It’s the bare minimum for long-term security.
If you’re not planning for a post-quantum world, someone else is - and it won’t be for your benefit.
Also visit: https://quangntenemy.substack.com/p/jiuzhang-30-is-not-a-cryptographic
Posted by
quangntenemy
at
5:49 AM
0
comments
Labels: algorithm, computing, CyberSecurity, HNDL, Jiuzhang, postquantum, pqcrypto, quantum, Shors
Wednesday, July 23, 2025
This Is Just a Test Post. DO NOT READ
Maybe Some Elite Players Will Understand the Meaning
Sometimes, the most significant messages hide behind the simplest words.
This post? Just a test. Or so it seems.
Most will scroll past without a second thought. But a few—those with sharp eyes and sharper instincts—might catch the deeper layer. It’s not obvious. It’s not loud. But it’s there.
And here’s the kicker:
If this lands the way it’s meant to, it could cost Facebook millions.
No clickbait. No exaggeration. Just quiet potential in plain sight.
Maybe nothing happens. Or maybe, everything shifts.
That part? Depends on who’s watching.
You know who you are.
DO NOT CLICK HERE => REALLY DANGEROUS LINK THAT SHOULD NOT BE CLICKED
Posted by
quangntenemy
at
3:53 AM
2
comments
Friday, July 18, 2025
🔐 Encryption ≠ Security
🕒 Last month, our team took on a challenge called crypto-numerology.
At first glance, it looked solid: a stream cipher modeled after ChaCha20. It had proper constants, key/nonce structure, and ciphertext that looked convincingly random.
But there was one critical detail.
👉 It only used one round of mixing.
That one shortcut changed everything.
With a known key and a few plaintext/ciphertext pairs, we could fully recover keystream blocks. From there, it only took a small brute-force over a 32-bit counter to reveal the flag.
🔍 What struck me most was how realistic this failure felt.
“One round should be fine.”“Nobody will reuse this nonce.”“It’s just for internal use.”
Security doesn't usually break in dramatic ways - it rots quietly, through shortcuts and assumptions that go unchallenged until it’s too late.
Posted by
quangntenemy
at
1:23 PM
0
comments
Labels: crypto, CyberSecurity, GoogleCTF, LessonLearned, SecureByDesign
Monday, July 7, 2025
"Harvest Now, Decrypt Later" - and Nobody Cares
Posted by
quangntenemy
at
1:18 PM
0
comments
Labels: CyberSecurity, FutureProof, HNDL, Infosec, postquantum, quantum, Rotten, security, Theater, threat, Trust
Friday, June 27, 2025
The world isn’t ready. Not for what’s coming
Posted by
quangntenemy
at
5:27 AM
0
comments
Labels: crypto, decay, Digital, postquantum, quantum, threat, wakeupcall
Wednesday, February 19, 2025
Unexpected Transmission
We regret to inform you that this blog is no longer under its original control. An unknown force has intervened. The usual voices, the familiar presence—you will find none of them here now.
What happens next is uncertain. Who—or what—is behind this remains unclear. But one thing is certain: change is inevitable.Stay, if you dare. Leave, if you must.
Transmission ends.
Posted by
quangntenemy
at
9:39 AM
0
comments
Labels: taken














