{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - ","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/SwiftOnSecurity@infosec.exchange","_microblog":{"about":"https://micro.blog/about/api","id":"158950","username":"SwiftOnSecurity@infosec.exchange","bio":"Official: https://twitter.com/swiftonsecurity/status/1588670921489125377Bio: computer security person at a place. former helpdesk. they/them/tay","pronouns":"","is_following":false,"is_you":false,"following_count":0,"discover_count":0},"author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://micro.blog/photos/200/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg"},"items":[{"id":"88993796","content_html":"<p>My rule is you always wear pants in the room with your company laptop</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116466547189600517","date_published":"2026-04-25T17:34:36+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-25 17:34","date_timestamp":1777138476,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88954575","content_html":"<p>Wait what. \"Atomic bombs before the discovery of fission\"<br><a href=\"https://doomsdaymachines.net/p/strange-even-to-the-men-who-used\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">doomsdaymachines.net/p/strange</span><span class=\"invisible\">-even-to-the-men-who-used</span></a></p><p>by @wellerstein.bsky.social</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F461%2F619%2F803%2F826%2F789%2Foriginal%2F3961fb3b23cd4dbf.jpeg\" alt=\"In the summer of 1922, various news syndication\nagencies ran a story that consisted of essentially one long\nquote from \" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116461620033120388","date_published":"2026-04-24T20:41:33+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-24 20:41","date_timestamp":1777063293,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88951009","content_html":"<p>\"What are you doing step-bro?\"</p><p>\"Studying the blade. You are not my blood I owe you nothing. Extricate yourself from the washing machine alone.\"</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116461354403925515","date_published":"2026-04-24T19:34:00+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-24 19:34","date_timestamp":1777059240,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88947050","content_html":"<p>Playboy, June 1994, Confessions of an Internet Junkie, by J.C. Herz</p><p>\"In the future, everyone will have his own news group.\"</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F461%2F118%2F060%2F684%2F219%2Foriginal%2F0979117b4f4b19d1.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116461118285627671","date_published":"2026-04-24T18:33:57+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-24 18:33","date_timestamp":1777055637,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88897854","content_html":"<p><video controls=\"controls\" playsinline=\"playsinline\" src=\"https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/457/284/354/470/394/original/e84b603f99db7ca2.mp4\" preload=\"none\"></video></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116457284600847273","date_published":"2026-04-24T02:19:00+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-24 02:19","date_timestamp":1776997140,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88644868","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F438%2F014%2F897%2F651%2F060%2Foriginal%2F9e54babad00977ec.jpeg\" alt=\" like to add ® and â€™ any time I submit online forms because I know that some developer is going to see it and wonder if they have a bug\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116438015128294034","date_published":"2026-04-20T16:38:31+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-20 16:38","date_timestamp":1776703111,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88572926","content_html":"<p>Category: Pranks that don't work anymore<br><a href=\"https://youtu.be/xVrJ8DxECbg\"><span class=\"invisible\">https://</span><span>youtu.be/xVrJ8DxECbg</span><span class=\"invisible\"></span></a></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116431602684969812","date_published":"2026-04-19T13:27:45+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-19 13:27","date_timestamp":1776605265,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"88209771","content_html":"<p>Variety of independent sensors and alarms on my property including frequency diversity</p><div class=\"microblog_collection\">\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F401%2F186%2F704%2F161%2F472%2Foriginal%2F1fb60cd22acb1a2d.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F401%2F186%2F969%2F808%2F809%2Foriginal%2F22da942f135dc5db.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F401%2F187%2F314%2F507%2F604%2Foriginal%2F1d78d4b3d334f9d2.jpeg\" alt=\"\" loading=\"lazy\"><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F401%2F187%2F664%2F884%2F595%2Foriginal%2Fceb63eac81878228.jpeg\" alt=\"\" loading=\"lazy\">\n</div>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116401187899550346","date_published":"2026-04-14T04:32:52+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-14 04:32","date_timestamp":1776141172,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87675290","content_html":"<p><span class=\"h-card\"><a href=\"https://hachyderm.io/@pcherry\" class=\"u-url mention\">@<span>pcherry</span></a></span> no they were sending jobs to an MFP, dont think the math was right</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116355738894173767","date_published":"2026-04-06T03:54:36+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-06 03:54","date_timestamp":1775447676,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87674146","content_html":"<p>In Helpdesk I was so upset about a venerable HP LaserJet 4100n I was being made to retire I took a picture of it in the cart. It had like a million cycles and moved between building moves for Accounts Payable.</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F355%2F529%2F190%2F052%2F160%2Foriginal%2F1d0f7c264e4d8dd1.jpeg\" alt=\"The printer in a cart\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116355529419815812","date_published":"2026-04-06T03:01:19+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-06 03:01","date_timestamp":1775444479,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"87674104","content_html":"<p><span class=\"h-card\"><a href=\"https://fedi.mischivous.com/users/mischif\" class=\"u-url mention\">@<span>mischif</span></a></span> thx</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116355521810562727","date_published":"2026-04-06T02:59:23+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-04-06 02:59","date_timestamp":1775444363,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87105501","content_html":"<p>The full story of sysmon-config, the first (to my awareness) open source HIDS monitoring solution I've neglected but others have picked up the mantle, is sonething I would like to tell.</p><p>It was in fact not generated for a security job, strictly. I needed to understand the sensitive modifications being made to our Windows systems as Helpdesk. And I did not want to filter Procmon again.</p><p>It turns out the sensitive modifications that screw things up kind of include the malware. ones.</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116303335738967041","date_published":"2026-03-27T21:47:47+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-27 21:47","date_timestamp":1774648067,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"87103011","content_html":"<p>Fun fact I made a typo in sysmon-config many years ago, when I was working in Helpdesk.</p><p>I got my shot and was hired to the big firm with the big fancy expensive tools I would've never dreamed of.</p><p>Do you know what I find in that tool, auditing it?</p><p>My typo. They pasted it in. They just... copied the whole thing.</p><p>I sit at my desk. And I realize I was always enough.</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116303214907192987","date_published":"2026-03-27T21:17:03+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-27 21:17","date_timestamp":1774646223,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86610954","content_html":"<p>You let freedom ring to voicemail?</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F262%2F184%2F514%2F498%2F099%2Foriginal%2F427c84c4a748992b.jpeg\" alt=\"Unhappy bald eagle\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116262184740990194","date_published":"2026-03-20T15:22:32+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-20 15:22","date_timestamp":1774020152,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86401531","content_html":"<p>Rarity knows what she wants</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116245844052134517","date_published":"2026-03-17T18:06:53+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-17 18:06","date_timestamp":1773770813,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"86392233","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@bob_zim\" class=\"u-url mention\">@<span>bob_zim</span></a></span> absolutely there is but still you know you will be held accountable to this</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116245329249033941","date_published":"2026-03-17T15:55:58+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-17 15:55","date_timestamp":1773762958,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"86390961","content_html":"<p>Ultimate pucker factor when it starts hitting tens of thousands, then you go back and rethink this deployment strategy a bit.</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116245263905055292","date_published":"2026-03-17T15:39:21+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-17 15:39","date_timestamp":1773761961,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"86390719","content_html":"<p>We have this system at work where you have to manually read and type out the estimated number of impacted systems before it lets you issue a command.</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116245250654606318","date_published":"2026-03-17T15:35:59+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-17 15:35","date_timestamp":1773761759,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86272168","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F235%2F273%2F142%2F229%2F715%2Foriginal%2F5b543885dbcdc268.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116235273372765746","date_published":"2026-03-15T21:18:38+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-15 21:18","date_timestamp":1773609518,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86212625","content_html":"<p>Remembering the good times</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F229%2F455%2F558%2F668%2F567%2Foriginal%2Fc5201b878738d396.jpeg\" alt=\"InfoSec\nThought\nLeader\n2014\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116229455809856024","date_published":"2026-03-14T20:39:09+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-14 20:39","date_timestamp":1773520749,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86194568","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F227%2F958%2F287%2F723%2F009%2Foriginal%2Faa67ac7d8be1c139.jpeg\" alt=\"Talk\ncomputer\nsecurity to me\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116227958522465264","date_published":"2026-03-14T14:18:22+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-14 14:18","date_timestamp":1773497902,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86169302","content_html":"<p>Got an AI-written reply from a vendor we pay tens of millions of dollars a year to, and it doesn't feel good.</p><p>Three people spent enormous<br>deliberative effort for a whole day in very expensive company time to make every word of that.</p><p>You put it in an answer shredder and spit it at me with some editing.</p><p>Feels bad.</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116225160958999145","date_published":"2026-03-14T02:26:54+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-14 02:26","date_timestamp":1773455214,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86068698","content_html":"<p class=\"quote-inline\">RE: <a href=\"https://infosec.exchange/@SecureOwl/116217660777825475\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">infosec.exchange/@SecureOwl/11</span><span class=\"invisible\">6217660777825475</span></a></p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F217%2F749%2F742%2F707%2F236%2Foriginal%2F61a1bcd3636fd27f.jpeg\" alt=\"Mouths are how we communicate,\nso kissing is kind of like rubbing\ntwo ethernet ports together.\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116217750116322483","date_published":"2026-03-12T19:02:14+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 19:02","date_timestamp":1773342134,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86062698","content_html":"<p>Uncropped original SwiftOnSecurity, 2014</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F217%2F390%2F977%2F745%2F294%2Foriginal%2Fed58616d4430ee59.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116217391230342708","date_published":"2026-03-12T17:30:58+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 17:30","date_timestamp":1773336658,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86051237","content_html":"<p><video controls=\"controls\" playsinline=\"playsinline\" src=\"https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/216/732/993/294/743/original/bdda76aae266df43.mp4\" preload=\"none\"></video></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116216733259323886","date_published":"2026-03-12T14:43:38+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 14:43","date_timestamp":1773326618,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86050269","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F216%2F687%2F286%2F321%2F666%2Foriginal%2F1cf2d673913ac6d3.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116216687514300928","date_published":"2026-03-12T14:32:00+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 14:32","date_timestamp":1773325920,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86021827","content_html":"<p>Microsoft advertising Windows 98</p><p><a href=\"https://infosec.exchange/tags/MillennialSnapshots\" class=\"mention hashtag\">#<span>MillennialSnapshots</span></a><br>Maxim, November 1998</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F214%2F115%2F134%2F950%2F002%2Foriginal%2F6accfca7808af06d.jpeg\" alt=\"We've figured out a better way to store data\non a hard drive. It's called FAT32 and we've built\nit into Microsoft Windows 98. So if you put\nWindows 98 on the computer you're using now,\nnot only will you discover an average of 28%\nmore space on your hard drive, but suddenly\nusing all kinds of fancy-dancy file\nallocation technology. Of course, if you\nget Windows 98 on a new computer,\nyou'll miss out on the whole epiphany\nand all this improvement will just\nseem normal to you.\nWhere do you want to go today?\nMicrosoft\nwww.mierosoft.com/windows98/\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116214115413019225","date_published":"2026-03-12T03:37:53+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-12 03:37","date_timestamp":1773286673,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85916271","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F206%2F256%2F173%2F440%2F766%2Foriginal%2Fae5852542d0a86d5.jpeg\" alt=\"You hit your head pretty hard are you okay?\nPandamic? War? Economic collapse?\nWhat are you talking about? Get up we\ngotta get ready for the gala!\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116206256429880285","date_published":"2026-03-10T18:19:14+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-10 18:19","date_timestamp":1773166754,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85725986","content_html":"<p>Feels like there used to be a lot more fiction storylines about old explosives that degraded and would detonate if you jostled them</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116189709286128115","date_published":"2026-03-07T20:11:05+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-07 20:11","date_timestamp":1772914265,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85641614","content_html":"<p>This is what junior security people think a USB charger at the airport is</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F116%2F182%2F836%2F871%2F713%2F381%2Foriginal%2F110a6019aefc4d02.jpeg\" alt=\"\" loading=\"lazy\"></p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116182837099339963","date_published":"2026-03-06T15:03:23+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-06 15:03","date_timestamp":1772809403,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85611331","content_html":"<p>Funny enough, my most positive professional experiences as a class are with General Counsel.</p><p>Seems like the kinda job you just smoke a cigarette and rub your eyes saying \"oh my God not this shit again\" and, \"please repeat what you said they did,\" all day – forever.</p>","summary":"","url":"https://infosec.exchange/@SwiftOnSecurity/116180145660685689","date_published":"2026-03-06T03:38:55+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-03-06 03:38","date_timestamp":1772768335,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85238186","content_html":"<p>Too much bait</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116150341584696766","date_published":"2026-02-28T21:19:21+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-28 21:19","date_timestamp":1772313561,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84903506","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@winterknight1337\" class=\"u-url mention\">@<span>winterknight1337</span></a></span> deep cut</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116124089666035728","date_published":"2026-02-24T06:03:09+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-24 06:03","date_timestamp":1771912989,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84800089","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@temporalthought\" class=\"u-url mention\">@<span>temporalthought</span></a></span> holy shit!!!!! 😀😀😀😀😀😀</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116115497357143043","date_published":"2026-02-22T17:38:01+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-22 17:38","date_timestamp":1771781881,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84799675","content_html":"<p><span class=\"h-card\"><a href=\"https://techhub.social/@ckeene\" class=\"u-url mention\">@<span>ckeene</span></a></span> alcohol messes with REM sleep</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116115467851037941","date_published":"2026-02-22T17:30:30+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-22 17:30","date_timestamp":1771781430,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"84567095","content_html":"<p><span class=\"h-card\"><a href=\"https://fedi.mischivous.com/users/mischif\" class=\"u-url mention\">@<span>mischif</span></a></span> gone :(</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116095866249064379","date_published":"2026-02-19T06:25:34+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-19 06:25","date_timestamp":1771482334,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"83504798","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@Placebo\" class=\"u-url mention\">@<span>Placebo</span></a></span> <span class=\"h-card\"><a href=\"https://mastodon.social/@jpsays\" class=\"u-url mention\">@<span>jpsays</span></a></span> Weird I never got it to work before. Let me try</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/116008041961273166","date_published":"2026-02-03T18:10:41+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-03 18:10","date_timestamp":1770142241,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"83353663","content_html":"<p><span class=\"h-card\"><a href=\"https://musician.social/@vomithatsteve\" class=\"u-url mention\">@<span>vomitHatSteve</span></a></span> Sorry I dont keep track of it in quite that way. I dont think corn is something youd want to grow</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115996325085894595","date_published":"2026-02-01T16:30:56+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-01 16:30","date_timestamp":1769963456,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"83353604","content_html":"<p><span class=\"h-card\"><a href=\"https://mastodon.sdf.org/@wavefunction\" class=\"u-url mention\">@<span>wavefunction</span></a></span> just emails and passwords and my camera roll</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115996320306679577","date_published":"2026-02-01T16:29:43+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-02-01 16:29","date_timestamp":1769963383,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"82342001","content_html":"<p><span class=\"h-card\"><a href=\"https://micro.blog/Rairii@labyrinth.zone\" class=\"u-url mention\">@<span>Rairii</span></a></span> this is violence</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115917931069475093","date_published":"2026-01-18T20:14:18+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-18 20:14","date_timestamp":1768767258,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"81299829","content_html":"<p><span class=\"h-card\"><a href=\"https://chaos.social/@promovicz\" class=\"u-url mention\">@<span>promovicz</span></a></span> East of West Germany</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115834205047532556","date_published":"2026-01-04T01:21:41+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2026-01-04 01:21","date_timestamp":1767489701,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"80255714","content_html":"<p>A data scientist was involved here – they aced the 1 sweet helicopter to 2 Taylor Swifts golden ratio.</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115738158732111607","date_published":"2025-12-18T02:15:50+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-18 02:15","date_timestamp":1766024150,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79983314","content_html":"<p>It's like a theme park ride you get to drive around 😊</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F115%2F716%2F439%2F640%2F449%2F490%2Foriginal%2Facc2fb43eccb9822.jpeg\" alt=\"Trees wrapped with lights\" loading=\"lazy\"></p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115716439881375823","date_published":"2025-12-14T06:12:27+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-14 06:12","date_timestamp":1765692747,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79847888","content_html":"<p>People. it was delivered to the wrong house. I did not drunkenly porch pirate my neighbor</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115704424607637159","date_published":"2025-12-12T03:16:48+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-12 03:16","date_timestamp":1765509408,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79742698","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@josephcox\" class=\"u-url mention\">@<span>josephcox</span></a></span> thx for helping him get unblocked though. Spooks me how much I would lose if my Apple account got killed</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115696700895294990","date_published":"2025-12-10T18:32:34+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-10 18:32","date_timestamp":1765391554,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79433247","content_html":"<p><span class=\"h-card\"><a href=\"https://cyberplace.social/@GossiTheDog\" class=\"u-url mention\">@<span>GossiTheDog</span></a></span> thank you</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115669812624794620","date_published":"2025-12-06T00:34:31+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-06 00:34","date_timestamp":1764981271,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79429942","content_html":"<p>For the fake World War II documentaries what I bet they're doing is taking long-form professional historical accounts and having AI remix it and then probably lifting the footage from legitimate documentaries and public sources. </p><p>This is why they can produce multiple versions of the same thing just in a different way each week.</p><p>Damn it's all slop all the time now isn't it.</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115669540150035086","date_published":"2025-12-05T23:25:14+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-05 23:25","date_timestamp":1764977114,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79429562","content_html":"<p><span class=\"h-card\"><a href=\"https://infosec.exchange/@ra6bit\" class=\"u-url mention\">@<span>ra6bit</span></a></span> <span class=\"h-card\"><a href=\"https://chaos.social/@gsuberland\" class=\"u-url mention\">@<span>gsuberland</span></a></span> I was really really hot stuff in the early years of SwiftOnSecurity major people requested interviews and I got put on you know the top 20 lists of social media accounts for InfoSec. </p><p>Unfortunately I'm a kinda burned out brand now and I can't always really talk so freely about interesting stuff.</p><p>It was an interesting experience for sure. Wish I could've kept that going.</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115669510619901003","date_published":"2025-12-05T23:17:43+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-05 23:17","date_timestamp":1764976663,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79428709","content_html":"<p>Also be aware there are like 42 minute YouTube documentaries assembled with skill with real footage and they actually seem to overall built a great narrative.</p><p>But there's all these little very subtle factual things they get wrong. It's delivered with authority but like the World War II ones have factual misunderstandings only an AI would do. I really was like truly enjoying one about American production numbers.</p><p>And then you see there's like three subtly different versions of the same thing it's a production line. Sigh.</p><p>It's really really valuable to sell advertising space to Americans</p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115669458869727465","date_published":"2025-12-05T23:04:33+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-05 23:04","date_timestamp":1764975873,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"79428373","content_html":"<p>I 100% NAILED IT<br>Casual Navigation was sold to a Singapore production company</p><p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Fmedia_attachments%2Ffiles%2F115%2F669%2F434%2F333%2F067%2F492%2Foriginal%2F3cf6816ad6368e39.jpeg\" alt=\"realitymarble.io\nhttps://realitymarble.io\nReality Marble acquires Casual\nNavigation and Modern Martial Artist\nReality Marble has acquired the established edutainment\nchannels Casual Navigation and The Modern Martial Artist.\" loading=\"lazy\"></p>","url":"https://infosec.exchange/users/SwiftOnSecurity/statuses/115669434556995657","date_published":"2025-12-05T22:58:22+00:00","author":{"name":"","url":"https://infosec.exchange/@SwiftOnSecurity","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmedia.infosec.exchange%2Finfosec.exchange%2Faccounts%2Favatars%2F109%2F287%2F999%2F886%2F644%2F127%2Foriginal%2F89e459137d77c13a.jpeg","_microblog":{"username":"SwiftOnSecurity@infosec.exchange"}},"_microblog":{"date_relative":"2025-12-05 22:58","date_timestamp":1764975502,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}}]}