{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Ben Aveling","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/BenAveling@infosec.exchange","_microblog":{"about":"https://micro.blog/about/api","id":"163347","username":"BenAveling@infosec.exchange","bio":"The best time to improve your OpSec was a long time ago. The second best time is now.","pronouns":"","is_following":false,"is_you":false,"following_count":0,"discover_count":0},"author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://micro.blog/photos/200/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png"},"items":[{"id":"88479112","content_html":"<p>If it's the account I think it may be, the account either no longer exists, or is at least hidden from public view.<br><span class=\"h-card\"><a href=\"https://mastodon.ie/@davey_cakes\" class=\"u-url mention\">@<span>davey_cakes</span></a></span> <span class=\"h-card\"><a href=\"https://dair-community.social/@emilymbender\" class=\"u-url mention\">@<span>emilymbender</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116422171118700432","date_published":"2026-04-17T21:29:11+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-17 21:29","date_timestamp":1776461351,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"88451080","content_html":"<p>I've long expected that this will happen - but not yet and not like this.<br>At the moment, the upper limit on how long a commute by car can be is the human bladder. With driverless cars, that upper limit can be made to go away.</p><p><span class=\"h-card\"><a href=\"https://eigenmagic.net/@arichtman\" class=\"u-url mention\">@<span>arichtman</span></a></span> <span class=\"h-card\"><a href=\"https://mastodon.social/@falcennial\" class=\"u-url mention\">@<span>falcennial</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116420734821512685","date_published":"2026-04-17T15:23:55+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-17 15:23","date_timestamp":1776439435,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"88449999","content_html":"<p><span class=\"h-card\"><a href=\"https://chaos.social/@nblr\" class=\"u-url mention\">@<span>nblr</span></a></span></p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F420%2F643%2F597%2F474%2F281%2Foriginal%2Fac1712de0e934da7.jpg\" alt=\"That guy from Highlander, with the quote: There can be only one.\" loading=\"lazy\"></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116420646562323383","date_published":"2026-04-17T15:01:28+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-17 15:01","date_timestamp":1776438088,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"88398832","content_html":"<p>Maybe Mr Why is just very bad at typing.<br><span class=\"h-card\"><a href=\"https://hachyderm.io/@thomasfuchs\" class=\"u-url mention\">@<span>thomasfuchs</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116416365711239170","date_published":"2026-04-16T20:52:47+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-16 20:52","date_timestamp":1776372767,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"88242905","content_html":"<p>Hiring is always a bit hit and miss. Turns out, sometimes even when you miss, you hit.<br><span class=\"h-card\"><a href=\"https://mastodon.social/@fesshole\" class=\"u-url mention\">@<span>fesshole</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116404043295073848","date_published":"2026-04-14T16:39:02+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-14 16:39","date_timestamp":1776184742,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"88147611","content_html":"<p>Few people have been proven as right as everyone who said \"if you outsource your brain to a computer you won't be able know when it's just spewing bullshit\".  <span class=\"h-card\"><a href=\"https://mastodon.social/@anon_opin\" class=\"u-url mention\">@<span>anon_opin</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116396245633904548","date_published":"2026-04-13T07:35:59+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-13 07:35","date_timestamp":1776065759,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87975318","content_html":"<p>It'd be potentially interesting if the flow were:</p><p>1. Coverity finds a vulnerability, plus a load of false positives.<br>2. Anthropic spends money on human effort to triage the output of step 1.<br>3 Anthropic burns a load of compute to regurgitate the output from step 2.<br>4. Security vulnerability reports!</p><p>Sadly, I don't trust any of those steps. A lot of the time, the answer to 'is this a vulnerability' is 'well, it depends...'.</p><p><span class=\"h-card\"><a href=\"https://infosec.exchange/@david_chisnall\" class=\"u-url mention\">@<span>david_chisnall</span></a></span> <span class=\"h-card\"><a href=\"https://circumstances.run/@davidgerard\" class=\"u-url mention\">@<span>davidgerard</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116380307747002263","date_published":"2026-04-10T12:02:46+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-10 12:02","date_timestamp":1775822566,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87609517","content_html":"<p>Some vulnerabilities can't be exploited in ways that lead to attacker success, e.g. the next/previous line of defense is sound, but they're still vulnerabilities in that they allow one or more lines of defense to be bypassed.<br>I'd also ask:<br>- do bugs usually get patched? <br>- is this definition supposed to cover social-engineering or insider threats?<br>- is this definition supposed to cover volumetric DOS?</p>","url":"https://infosec.exchange/users/BenAveling/statuses/116348366263099078","date_published":"2026-04-04T20:39:38+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-04 20:39","date_timestamp":1775335178,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87108823","content_html":"<p>DNS outbound tends to be allowed even when other protocols are not. If you run your own DNS server you can use DNS to tunnel any traffic you want. <span class=\"h-card\"><a href=\"https://rants.au/@sabik\" class=\"u-url mention\">@<span>sabik</span></a></span> <span class=\"h-card\"><a href=\"https://eigenmagic.net/@arichtman\" class=\"u-url mention\">@<span>arichtman</span></a></span> <span class=\"h-card\"><a href=\"https://infosec.exchange/@k3ym0\" class=\"u-url mention\">@<span>k3ym0</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116303733049045961","date_published":"2026-03-27T23:28:49+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-27 23:28","date_timestamp":1774654129,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"86735766","content_html":"<p>I see a lot of people replying to this post who are confident that they would not have clicked on that pdf.<br><span class=\"h-card\"><a href=\"https://mastodon.social/@nixCraft\" class=\"u-url mention\">@<span>nixCraft</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116274238508124636","date_published":"2026-03-22T18:27:58+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-22 18:27","date_timestamp":1774204078,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"86735139","content_html":"<p>&gt; Doubling the performance of something like an 8086 was easy</p><p>This feels unfair. At the time, I don't think it was seen as easy. And at every point, there was always a sense that Moore's Law is about to fail, because known techniques were understood to be viable for the next few years, but beyond that, something new was going to be needed. And then, we always found something new. And we probably can again, except, as you've pointed out, it's getting harder and harder to find any useful use for extra power.</p><p><span class=\"h-card\"><a href=\"https://infosec.exchange/@david_chisnall\" class=\"u-url mention\">@<span>david_chisnall</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116274203057332232","date_published":"2026-03-22T18:18:57+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-22 18:18","date_timestamp":1774203537,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85938244","content_html":"<p>Oh LLM output always looks good, as long you don't understand what it's talking, then it looks great. <br>Very beautiful, very plausible. <br>But if you actually understand whatever it is that the LLM is talking about, then it rapidly becomes obvious that it's just spewing all the right words in a random order.<br><span class=\"h-card\"><a href=\"https://mastodon.social/@Tekchip\" class=\"u-url mention\">@<span>Tekchip</span></a></span> <span class=\"h-card\"><a href=\"https://mastodon.social/@Gargron\" class=\"u-url mention\">@<span>Gargron</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116207664265786128","date_published":"2026-03-11T00:17:16+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-11 00:17","date_timestamp":1773188236,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85937557","content_html":"<p>Translations are like husbands. There are beautiful translations and there are faithful translations but the beautiful ones are not faithful and the faithful ones are not beautiful.<br><span class=\"h-card\"><a href=\"https://mastodon.social/@Gargron\" class=\"u-url mention\">@<span>Gargron</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116207638427753954","date_published":"2026-03-11T00:10:42+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-11 00:10","date_timestamp":1773187842,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85837453","content_html":"<p>As programmers, we’re used to getting things ‘sort of working’ being hard, and getting from there to ‘mostly reliable’ is, if not easy, then no harder. You just fix the edge cases, working from important down.  <br>LLMs are the other way around. Getting to sort of working is trivially easy, going to ‘mostly reliable’ is impossible. Every edge case you fix undoes some random part what you thought you had working. <br><span class=\"h-card\"><a href=\"https://circumstances.run/@davidgerard\" class=\"u-url mention\">@<span>davidgerard</span></a></span> <span class=\"h-card\"><a href=\"https://mastodon.social/@katrinatransfem\" class=\"u-url mention\">@<span>katrinatransfem</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116200093306760421","date_published":"2026-03-09T16:11:52+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-09 16:11","date_timestamp":1773072712,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85775856","content_html":"<p>Companies would like software designed, structures engineered and medicine and legal and artistic services provided without the cost and bother of having to employ people.<br> who <span class=\"h-card\"><a href=\"https://hachyderm.io/@thomasfuchs\" class=\"u-url mention\">@<span>thomasfuchs</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116194781285710255","date_published":"2026-03-08T17:40:57+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-08 17:40","date_timestamp":1772991657,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85751743","content_html":"<p>If you can be bothered there’s another solution that works better the more witnesses there are “why don’t you load up that bar and show us how it’s done”<br><span class=\"h-card\"><a href=\"https://mastodon.social/@falcennial\" class=\"u-url mention\">@<span>falcennial</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116192458729963548","date_published":"2026-03-08T07:50:18+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-08 07:50","date_timestamp":1772956218,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85737466","content_html":"<p>I’d say possibly both but definitely at least the first one. <span class=\"h-card\"><a href=\"https://mastodon.social/@campuscodi\" class=\"u-url mention\">@<span>campuscodi</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116190640633382809","date_published":"2026-03-08T00:07:56+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-08 00:07","date_timestamp":1772928476,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85447675","content_html":"<p>Technically not a forest. Possibly not a mushroom either.  <span class=\"h-card\"><a href=\"https://m.ai6yr.org/@ai6yr\" class=\"u-url mention\">@<span>ai6yr</span></a></span></p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F167%2F843%2F609%2F760%2F888%2Foriginal%2F23c15bb4139a471f.jpeg\" alt=\"The cut off stump of a tree, heavily covered with mushrooms, or toadstools, I have no idea. Part of a terrace house is visible in the background. \" loading=\"lazy\"></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116167854654693307","date_published":"2026-03-03T23:33:10+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-03 23:33","date_timestamp":1772580790,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85209121","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@krypt3ia\" class=\"u-url mention\">@<span>krypt3ia</span></a></span> Both?</p>","url":"https://infosec.exchange/users/BenAveling/statuses/116148087672860469","date_published":"2026-02-28T11:46:09+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-28 11:46","date_timestamp":1772279169,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85038506","content_html":"<p>It's like a control panel and a pew-pew map had a baby.<br><span class=\"h-card\"><a href=\"https://mastodon.social/@citrusui\" class=\"u-url mention\">@<span>citrusui</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116134071124288707","date_published":"2026-02-26T00:21:34+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-26 00:21","date_timestamp":1772065294,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"85025198","content_html":"<p>After big num years in corporate, I’ve seen a lot of things that make sense, but only once you have a missing piece of information. I have no idea what is happening here and I don’t know what I’m missing. <span class=\"h-card\"><a href=\"https://infosec.exchange/@hacks4pancakes\" class=\"u-url mention\">@<span>hacks4pancakes</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116133261275953276","date_published":"2026-02-25T20:55:36+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-25 20:55","date_timestamp":1772052936,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84874696","content_html":"<p>And that, my friend, is why dog gave us subtooting. <br><span class=\"h-card\"><a href=\"https://vis.social/@wcbdata\" class=\"u-url mention\">@<span>wcbdata</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116121690122754244","date_published":"2026-02-23T19:52:55+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-23 19:52","date_timestamp":1771876375,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84364367","content_html":"<p>I couldn't even name most of the characters in there. Perhaps that makes it more interesting. <br><span class=\"h-card\"><a href=\"https://infosec.exchange/@nuthatch\" class=\"u-url mention\">@<span>nuthatch</span></a></span> <span class=\"h-card\"><a href=\"https://mas.to/@carnage4life\" class=\"u-url mention\">@<span>carnage4life</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116079777266415283","date_published":"2026-02-16T10:13:55+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-16 10:13","date_timestamp":1771236835,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84356752","content_html":"<p>Boring yet compelling. It’s weird. Ultra processed junk food for the brain. <span class=\"h-card\"><a href=\"https://mas.to/@carnage4life\" class=\"u-url mention\">@<span>carnage4life</span></a></span> <span class=\"h-card\"><a href=\"https://infosec.exchange/@nuthatch\" class=\"u-url mention\">@<span>nuthatch</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116078931544268008","date_published":"2026-02-16T06:38:51+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-16 06:38","date_timestamp":1771223931,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84344787","content_html":"<p>You’re assuming I don’t expect to do the same thing again. <span class=\"h-card\"><a href=\"https://mas.to/@skeletor\" class=\"u-url mention\">@<span>skeletor</span></a></span></p>","url":"https://infosec.exchange/users/BenAveling/statuses/116077482714740525","date_published":"2026-02-16T00:30:23+00:00","author":{"name":"Ben Aveling","url":"https://infosec.exchange/@BenAveling","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fasset.circumstances.run%2Fcache%2Faccounts%2Favatars%2F109%2F318%2F597%2F410%2F712%2F988%2Foriginal%2Ffc89ffd5884ab589.png","_microblog":{"username":"BenAveling@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-16 00:30","date_timestamp":1771201823,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}}]}