The IF labyrinth of technological myth

The IF labyrinth of technological myth

Prisoners without an alternative, in an increasingly dense cage from which we feed ourselves and which we cannot do without, with the idea of ​​apparent freedom.

January 31, 2026 · 3 min · 586 words ·  Fr.Sa.Ba
Age

It’s spelled age and pronounced aghe

Do you feel safe inside the castle? Have you ever looked outside? Have you noticed that there’s a lot of digital rot? If you’re aware of it, then this article is for you.

December 23, 2025 · 7 min · 1358 words ·  Fr.Sa.Ba
From occult steganography to C2PA

From occult steganography to C2PA

We understand the scope and development of Big Tech’s will to trace the identity of the author of any digital element. These are already operating standards; It is not clear whether digital control is already implemented beyond such standards, nor what consequences are on privacy and its possible manipulation.

September 28, 2025 · 5 min · 965 words ·  Fr.Sa.Ba
CSS thoughts between privacy, security and confidentiality

CSS thoughts between privacy, security and confidentiality

CSS is the acronym of ‘Client-side scanning’. Reflections on how encryption is intercepted, possible scenarios and hypotheses to improve

September 13, 2025 · 4 min · 763 words ·  Fr.Sa.Ba
It is not just a matter of putting salt in the password but it is much more

It is not just a matter of putting salt in the password but it is much more

You come to a point that if you add a lot of salt you can’t change a soup that is deliberately rendered scialba.

August 30, 2025 · 7 min · 1377 words ·  Fr.Sa.Ba