<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Topics on Ryan P. Meyer</title><link>https://ryanpmeyer.eu/topics/</link><description>Evergreen concepts referenced throughout the site.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@ryanpmeyer.eu (Ryan P. Meyer)</managingEditor><webMaster>hello@ryanpmeyer.eu (Ryan P. Meyer)</webMaster><copyright>© 2026 Ryan P. Meyer</copyright><lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://ryanpmeyer.eu/topics/index.xml" rel="self" type="application/rss+xml"/><item><title>Security</title><link>https://ryanpmeyer.eu/topics/security/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/security/</guid><category>topics</category><category>security</category><description>Practices for protecting systems, data, and identities from threats. This covers everything from personal account hygiene (strong passwords, MFA, email aliases) to organizational concerns like [[Supply Chain Attacks]], [[Data Breaches]], and access control.&amp;#xA;Good security is mostly about reducing your attack surface and making the cost of compromising you higher than the value of what an attacker would get. For individuals, that means: use a password manager, enable multi-factor authentication everywhere, keep software updated, and be skeptical of unexpected messages (especially ones that create urgency).&amp;#xA;The landscape changes constantly, particularly with [[AI]]-powered threats that can generate convincing phishing at scale and clone voices from a few seconds of audio. Staying informed matters as much as staying locked down.&amp;#xA;</description><content:encoded><![CDATA[<p>Practices for protecting systems, data, and identities from threats. This covers everything from personal account hygiene (strong passwords, MFA, email aliases) to organizational concerns like [[Supply Chain Attacks]], [[Data Breaches]], and access control.</p>
<p>Good security is mostly about reducing your attack surface and making the cost of compromising you higher than the value of what an attacker would get. For individuals, that means: use a password manager, enable multi-factor authentication everywhere, keep software updated, and be skeptical of unexpected messages (especially ones that create urgency).</p>
<p>The landscape changes constantly, particularly with [[AI]]-powered threats that can generate convincing phishing at scale and clone voices from a few seconds of audio. Staying informed matters as much as staying locked down.</p>
]]></content:encoded></item><item><title>RSS</title><link>https://ryanpmeyer.eu/topics/rss/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/rss/</guid><category>topics</category><category>rss</category><category>pkm</category><description>Really Simple Syndication is a protocol for subscribing to web content without relying on algorithms, platforms, or email newsletters. You own your feed reader, you choose what goes in it, and nothing gets filtered or ranked by someone else’s engagement model.&amp;#xA;RSS never died, it just stopped being the default. Most blogs, podcasts, and news sites still publish feeds. The infrastructure is there; the missing piece is usually awareness that it exists and a reader app to consume it. Tools like Current, Reeder, Readwise, NetNewsWire, and Feedbin make the experience feel modern again.&amp;#xA;The real value of RSS is ownership of attention. You decide what enters your information stream, and you can leave at any time without losing your subscriptions (export your OPML and go). No account needed, no tracking, no ads injected into your timeline.&amp;#xA;</description><content:encoded><![CDATA[<p>Really Simple Syndication is a protocol for subscribing to web content without relying on algorithms, platforms, or email newsletters. You own your feed reader, you choose what goes in it, and nothing gets filtered or ranked by someone else&rsquo;s engagement model.</p>
<p>RSS never died, it just stopped being the default. Most blogs, podcasts, and news sites still publish feeds. The infrastructure is there; the missing piece is usually awareness that it exists and a reader app to consume it. Tools like Current, Reeder, Readwise, NetNewsWire, and Feedbin make the experience feel modern again.</p>
<p>The real value of RSS is <em>ownership of attention</em>. You decide what enters your information stream, and you can leave at any time without losing your subscriptions (export your OPML and go). No account needed, no tracking, no ads injected into your timeline.</p>
]]></content:encoded></item><item><title>Privacy</title><link>https://ryanpmeyer.eu/topics/privacy/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/privacy/</guid><category>topics</category><category>privacy</category><category>security</category><description>The right to control who has access to your personal information and how it gets used. In practice, this means choosing tools and behaviors that minimize unnecessary data exposure; from email aliases to encrypted messaging to understanding what the apps your use actually collect.&amp;#xA;Privacy isn’t about having something to hide. It’s about maintaining agency over your own information in a world where the default is to collect everything, store it forever, and monetize it later. Every data point you hand over is a bet that the company holding it will never be breached, acquired, or compelled to share.&amp;#xA;The practical toolkit: [[Email Masking|email masking services]], [[Encryption]], strong [[Password Management]], and a healthy skepticism about “free” services that fund themselves through surveillance.&amp;#xA;</description><content:encoded><![CDATA[<p>The right to control who has access to your personal information and how it gets used. In practice, this means choosing tools and behaviors that minimize unnecessary data exposure; from email aliases to encrypted messaging to understanding what the apps your use actually collect.</p>
<p>Privacy isn&rsquo;t about having something to hide. It&rsquo;s about maintaining agency over your own information in a world where the default is to collect everything, store it forever, and monetize it later. Every data point you hand over is a bet that the company holding it will never be breached, acquired, or compelled to share.</p>
<p>The practical toolkit: [[Email Masking|email masking services]], [[Encryption]], strong [[Password Management]], and a healthy skepticism about &ldquo;free&rdquo; services that fund themselves through surveillance.</p>
]]></content:encoded></item><item><title>Personal Knowledge Management</title><link>https://ryanpmeyer.eu/topics/personal-knowledge-management/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/personal-knowledge-management/</guid><category>topics</category><category>pkm</category><description>Systems and habits for capturing, organizing, and retrieving the information you encounter. The goal is to make your past reading, thinking, and learning accessible to your future self.&amp;#xA;</description><content:encoded>&lt;p>Systems and habits for capturing, organizing, and retrieving the information you encounter. The goal is to make your past reading, thinking, and learning accessible to your future self.&lt;/p>
</content:encoded></item><item><title>Password Management</title><link>https://ryanpmeyer.eu/topics/password-management/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/password-management/</guid><category>topics</category><category>security</category><category>privacy</category><description>You should use a dedicated tool to generate, store, and autofill strong unique passwords for every account. It’s possibly one of the single most impactful thing most people can do to improve their [[Security]] posture! It helps eliminates password reuse, the root cause of most credential-based breaches.&amp;#xA;I support either Bitwarden or 1Password as great options for most people. Apple Passwords is okay, but vendor and ecosystem locked, and doesn’t have all the standard features; but it is better than nothing.&amp;#xA;I would avoid using Google Chrome’s password manager (or any browsers).&amp;#xA;I do not recommend LastPass at all.&amp;#xA;</description><content:encoded><![CDATA[<p>You should use a dedicated tool to generate, store, and autofill strong unique passwords for every account. It&rsquo;s possibly one of the single most impactful thing most people can do to improve their [[Security]] posture! It helps eliminates password reuse, the root cause of most credential-based breaches.</p>
<p>I support either Bitwarden or 1Password as great options for most people. Apple Passwords is okay, but vendor and ecosystem locked, and doesn&rsquo;t have all the standard features; but it is better than nothing.</p>
<p>I would avoid using Google Chrome&rsquo;s password manager (or any browsers).</p>
<p>I do not recommend LastPass at all.</p>
]]></content:encoded></item><item><title>Encryption</title><link>https://ryanpmeyer.eu/topics/encryption/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/encryption/</guid><category>topics</category><category>encryption</category><category>security</category><category>privacy</category><description>Cryptographic techniques for making data unreadable to anyone who doesn’t hold the key.&amp;#xA;End-to-end encryption means only the sender and recipient can read the message; not the service provider, not the government, not an attacker who compromises the server.&amp;#xA;</description><content:encoded><![CDATA[<p>Cryptographic techniques for making data unreadable to anyone who doesn&rsquo;t hold the key.</p>
<p>End-to-end encryption means only the sender and recipient can read the message; not the service provider, not the government, not an attacker who compromises the server.</p>
]]></content:encoded></item><item><title>Email Masking</title><link>https://ryanpmeyer.eu/topics/email-masking/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/email-masking/</guid><category>topics</category><category>privacy</category><category>security</category><description>Techniques for protecting your real email address from exposure. Primarily done through alias/masking services that generate unique forwarding addresses per service. When a breach happens, or an email is sold, you know where it happened from since every site should have a unique email.&amp;#xA;</description><content:encoded>&lt;p>Techniques for protecting your real email address from exposure. Primarily done through alias/masking services that generate unique forwarding addresses per service. When a breach happens, or an email is sold, you know where it happened from since every site should have a unique email.&lt;/p>
</content:encoded></item><item><title>Digital Minimalism</title><link>https://ryanpmeyer.eu/topics/digital-minimalism/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/digital-minimalism/</guid><category>topics</category><category>minimalism</category><description>The philosophy of intentionally reducing digital consumption to reclaim time and attention. Not necessarily anti-technology, more a deliberate selection of which technologies earn a place in your life and which are removed because they are quietly extracting more than they give back.&amp;#xA;</description><content:encoded>&lt;p>The philosophy of intentionally reducing digital consumption to reclaim time and attention. Not necessarily anti-technology, more a deliberate selection of which technologies earn a place in your life and which are removed because they are quietly extracting more than they give back.&lt;/p>
</content:encoded></item><item><title>Digital Garden</title><link>https://ryanpmeyer.eu/topics/digital-garden/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/digital-garden/</guid><category>topics</category><category>pkm</category><description>A digital garden is a way to take thoughts and ideas and grow them at their own natural rates. As I write more and cover various topics, I will want to keep them update or develop my thoughts and understandings around them over time. Sometimes they grow, sometimes they don’t. Sometimes I have to split them apart so one topic doesn’t become too overgrown.&amp;#xA;It also provides a more centralized definition of a topic across the site. Rather than redefining constantly or having old definitions linger, it allows me to have steady control over how I articulate different subjects.&amp;#xA;</description><content:encoded><![CDATA[<p>A digital garden is a way to take thoughts and ideas and grow them at their own natural rates. As I write more and cover various topics, I will want to keep them update or develop my thoughts and understandings around them over time. Sometimes they grow, sometimes they don&rsquo;t. Sometimes I have to split them apart so one topic doesn&rsquo;t become too overgrown.</p>
<p>It also provides a more centralized definition of a topic across the site. Rather than redefining constantly or having old definitions linger, it allows me to have steady control over how I articulate different subjects.</p>
]]></content:encoded></item><item><title>Data Breaches</title><link>https://ryanpmeyer.eu/topics/data-breaches/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/data-breaches/</guid><category>topics</category><category>security</category><category>privacy</category><description>Unauthorized access to and exposure of sensitive information. As the saying goes: “The question isn’t whether a service you use will be breached; it’s when”.&amp;#xA;</description><content:encoded><![CDATA[<p>Unauthorized access to and exposure of sensitive information. As the saying goes: &ldquo;The question isn&rsquo;t whether a service you use will be breached; it&rsquo;s when&rdquo;.</p>
]]></content:encoded></item><item><title>AI Written Content</title><link>https://ryanpmeyer.eu/topics/ai-written-content/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/ai-written-content/</guid><category>topics</category><category>ai</category><description>[AI] written content is a very interesting thing in terms of content to consume. I do think it is and can be helpful to use it to fine-tune your own writings, but it can be a slippery slope on how much is just generated and posted.&amp;#xA;For example, using AI to write you TPS Report, probably fine; no one reads those anyway. On the flip-side, using it to write personal or engaging blog posts? Probably can be a bit soulless if you aren’t also heavily controlling the output.&amp;#xA;I’ve often heard “If you can’t be bothered to write it, then I can’t be bothered to read it.”&amp;#xA;</description><content:encoded><![CDATA[<p>[AI] written content is a very interesting thing in terms of content to consume. I do think it is and can be helpful to use it to fine-tune your own writings, but it can be a slippery slope on how much is just generated and posted.</p>
<p>For example, using AI to write you TPS Report, probably fine; no one reads those anyway. On the flip-side, using it to write personal or engaging blog posts? Probably can be a bit soulless if you aren&rsquo;t also heavily controlling the output.</p>
<p>I&rsquo;ve often heard &ldquo;If you can&rsquo;t be bothered to write it, then I can&rsquo;t be bothered to read it.&rdquo;</p>
<p>Or, another example, &ldquo;I used AI to take these 5 bullet points to make a five page report, that the recipient then used AI to turn back into 5 bullet points.&rdquo;</p>
]]></content:encoded></item><item><title>AI</title><link>https://ryanpmeyer.eu/topics/ai/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/ai/</guid><category>topics</category><category>ai</category><description>Artificial intelligence can broadly refer to many technologies, from large language models and generative tools to actual science fiction A.I. like Skynet or that one Will Smith movie.&amp;#xA;The current wave of AI (roughly 2022–present) is dominated by transformer-based large language models that can generate text, code, and images. The capabilities continue to grow at a rapid pace. So are the risks: hallucination, deepfake-enabled scams, labor displacement, and the erosion of the ability to distinguish human from machine.&amp;#xA;Some interesting cases with AI, to me, involve [[Security]], [[Privacy]], and skill augmentation. How these tools change the threat landscape (AI-powered phishing, voice cloning, automated vulnerability discovery) and how we can use AI to defend against AI. The reshaping of what “trust” means when you can no longer assume a message, image, or voice is from a real person.&amp;#xA;</description><content:encoded><![CDATA[<p>Artificial intelligence can broadly refer to many technologies, from large language models and generative tools to actual science fiction A.I. like Skynet or that one Will Smith movie.</p>
<p>The current wave of AI (roughly 2022–present) is dominated by transformer-based large language models that can generate text, code, and images. The capabilities continue to grow at a rapid pace. So are the risks: hallucination, deepfake-enabled scams, labor displacement, and the erosion of the ability to distinguish human from machine.</p>
<p>Some interesting cases with AI, to me, involve [[Security]], [[Privacy]], and skill augmentation. How these tools change the threat landscape (AI-powered phishing, voice cloning, automated vulnerability discovery) and how we can use AI to defend against AI. The reshaping of what &ldquo;trust&rdquo; means when you can no longer assume a message, image, or voice is from a real person.</p>
]]></content:encoded></item><item><title>Supply Chain Attacks</title><link>https://ryanpmeyer.eu/topics/supply-chain-attacks/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-09T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/supply-chain-attacks/</guid><category>topics</category><category>security</category><description>A supply chain attack targets an organization indirectly by compromising one of its trusted vendors, libraries, or update channels. Instead of breaking into the front door, attackers quietly poison a dependency the target already trusts and waits to pull in.&amp;#xA;</description><content:encoded>&lt;p>A supply chain attack targets an organization indirectly by compromising
one of its trusted vendors, libraries, or update channels. Instead of
breaking into the front door, attackers quietly poison a dependency the
target already trusts and waits to pull in.&lt;/p>
</content:encoded></item></channel></rss>