Concepts I've created, sometimes related to a software project.

Post-COVID Home Security, Part 3 - 2022
Post-COVID Home Security, Part 1 - 2020Post-COVID Home Security, Part 2 - 2021Post-COVID Home Security, Part 1 -2020Home Security, Part 2 I sold my house in 2004 and didn’t care about homesecurity until my new purchase in 2018. And even then I felt no urgency untilthe pandemic appeared, followed
Polymorphic REST API
Disguise REST API signatures in the TCP/IP layer with a polymorphic API. Most crypto currencies assume TCP/IP is trustworthy. Their security is concentrated in encryption and blockchains but as we saw this year, governments can still kill your crypto ( Canada and Coinbase ). REST API signatures…
The Vax Is The Gain of Function - 2022
In January 2020, I was staring at this virus chart, pondering COVID when I realized it’s a resource contention function, X * Y = K. So I wrote a mathematical model of how a Gain Of Function virus could work... And graphed how Gain Of Function might act... GoF virus would appear
The Vax, 4 Avenues To Death - 2021
(addendum: After reading 200 threads, articles, commentaries on COVID vaccine in 2021, it was clear that deaths were taboo and rarely discussed so I organized death-related info into this summary) The COVID mRNA vaccines have four ways to kill you. 1) Allergic reaction - This usually occurs in the…
McAfee Deadman Trigger - 2021
It would take about 30 minutes to write a simple deadman trigger with Google’s Trends tool running a search for “mcafee death”. Trends has a CSV export option. Write a REST call that runs every so often, pull the CSV into something like Apache POI and wait for a state
Post-COVID Home Security, Part 2 - 2021
Post-COVID Home Security, Part 1 - 2020Home Security, Part 2 I sold my house in 2004 and didn’t care about home security until my new purchase in 2018. And even then I felt no urgency until the pandemic appeared, followed by riots and looting. I researched smart locks for
Post-COVID Home Security, Part 1 - 2020
Post-COVID Home Security, Part 2 - 2021Post-COVID Home Security, Part 1 - 2020Home Security, Part 2 I sold my house in 2004 and didn’t care about home security until my new purchase in 2018. And even then I felt no urgency until the pandemic appeared, followed by riots and
Binary Virus Conjectures - 2020
Chimeric virus - “Combining two pathogenic viruses increases the lethality of the new virus”. This chart shows diseases according to their mortality (deadliness) and mobility (contagiousness). This is a classic X * Y = K graph depicting an environmental constraint. High mortality reduces mobi…
How Donald Trump Hacked The Planet - 2017
Warning! Too dangerous for DEFCON! This submission for the DEFCON 2017 hacker conference was rejected and I wasn’t surprised, it’s controversial. Abstract: How Donald Trump Hacked The Planet describes how Trump used unique circumstances (the Kondratieff wave, diminishing returns on diversity,etc)…
The Tangled Web We Weave (Why NodeJS?) - 2014
In the beginning, there was Tim. And Tim said, "Let there be HTML!" And it was good. Then some dumbass asked, "Hey, can you add a button I can click on?" And Netscape said, "Let there be Javascript!" And it was... acceptable. Then someone
Predictive Communication Model - 2013
This is a semantic model for quantifying relationships. It was a sudden epiphany during an nine-hour drive from Boulder to Kansas City over Thanksgiving weekend I’d hoped to turn it into working software but my employer was more interested in converting me to Jesus and didn’t perceive any value i…
The Vertical Web - 2013
The S-curve describes a growth pattern of new products, organisms in nature, etc. When a new ecological niche appears, the growth rate of filling it increases exponentially until the inflection point, the point at when (roughly) the niche is half filled, at which time the growth rate begins to fall.
Conspiracy Theory - 2008
Conspiracies are a function of information, or more precisely, a lack of information. Let’s define a quantitative test for a conspiracy. 💡two or more conspirators who share some information💡at least one victim who is excluding from that information💡conspirators profit in some way from the vict…
Election Hacking 101 - 2007
My 2007 DEFCON presentation makes reference to “active” vs “passive” devices in data mining and manipulating mental states. That’s what Cambridge Analytica did in the 2016 Presidential election. My theory starts at the 32 minute mark of this video: Just re-watched this. Wow, I really hit this one…
My Most Audacious Hack - 2007
In 2005, I was monitoring the housing industry for recession indicators and in December the home inventory trendline reversed due to a sales slowdown, a strong indicator. In 2007, Naomi Klein released “The Shock Doctrine” in 2007 and I realized her concept of economic shock was similar to my…
36-Hour Work Week - 2007
This should be about the 32-hour workweek but the 36-hour is more politically viable. Memes can be amazingly intractable. Concepts are often impossible to alter once they’re lodged in someone’s mind. The 40-workweek is one of them. The modern workweek was created during the Great Depression for the…
RealMeme And Google Trends - 2004
That’s the logo from my first website, RealMeme.com, which I launched in March of 2004. Yes, it’s a CORONAVIRUS. My site slogan was: 💡meme: A contagious idea that replicates like a virus, moving from mind to mind.The Wayback Machine webcrawled RealMeme in April, 2005 after RealMeme was featured
The Cultural Diffusion - 2004
I published “The Cultural Diffusion” on my website in 2004. The Longtail theory was a prominent idea then, that the transition from monolithic, one-way communication systems to granular, interactive systems would create small but profitable niche markets. From a cultural point of view, a long t…
Hacking The Planet - 1988
This image was originally for my DEFCON 13 opening but I used a funny experience from my flight instead. I discovered hacking while working as an electronic technician at Teradyne in Agoura Hills, CA. They had dozens of Microvax II systems around the planet I could hack. I realized I