Posts
Posts. Blogs. Ramblings. ðŸ’
2025
The Tea App and Verifying Identities
·6 mins
With the recent Tea App data exposure, I wanted to take a moment to think about the choices on how to verify user identities.
Supply Chain Attacks for the Average Person
·4 mins
Supply Chain attacks are more than something just a Company needs to consider.