Field Note 04
Shared secrets stop being controlled the moment they hit chat
When a team password leaves a vault and enters screenshots, docs, or messages, control and revocation immediately get harder.
Read articleJournal
A running journal for password and identity defense. These notes are opinionated, tactical, and focused on what actually changes compromise probability for real users and teams.
Field Note 04
When a team password leaves a vault and enters screenshots, docs, or messages, control and revocation immediately get harder.
Read articleField Note 05
Attackers do not need novel techniques when reused passwords keep working against enough accounts to make the math worthwhile.
Read articleField Note 06
Breach notices, device loss, suspicious MFA prompts, and helpdesk recovery changes are all stronger indicators than vague anxiety about complexity.
Read articleEditorial Direction
The journal is where longer-form thinking lives: rollout strategy, human behavior, team workflows, and the controls that still fail even after people pick stronger passwords.
Best Companion
Articles tell you what to change. The forge and audit pages let you act on it immediately by replacing weak credentials and inspecting old patterns.