Category: Uncategorized

  • How to Add Weight to a Maxed Out Barbell

    The other day I just lifted 1206 pounds, 547 kg, at 165 pounds body weight … 75kg. Which is 7.3X my body weight.

    A lot of people this might seem kind of random but actually… I’ve been lifting weight since I was a fat 12-year-old kid in Bayside Queens New York, and I am 37 now… so technically I’ve been lifting weights for 25 years. Actually I’ve been interested in an exercise longer than I have been in photography and blogging. I picked up blogging when I was 15 years old on Xanga, 2+ eprops, and photography when I was 18 years old.

    Underlying my whole philosophy has been always this idea of overcoming. And going beyond.

    First principles

    Why rack pull? Many reasons, first it is safer than a deadlift off the floor. Second, easier to rack and unrack the weights. Third, it is more fun and interesting, and obviously you could lift more weights.

    shorten the distance, … heavier weights 

    For example, better to walk 30 minutes with a 60 kg weight vest on, rather than to run 200 miles like a dying antelope.

    Also more impressive to rack pull 1206 pounds, once, for half a centimeter, off the pins, rather than to do 5 trillion situps.

    the idea

    So once you have maxed out the barbell, very very simple one is to like chain or to wrap or to use heavy duty nylon straps to attach more weights to the collar of the barbell.

    For example if you have 48 kg kettle bells add those. or add more plates. Or a new discovery, add 10 kg chains on top of the weights. 

    My maths

    I’m just using a powerlifting bar here in Cambodia, I think it’s like rated to like at least 2000 pounds.

    First, six 25kg red plates, a smaller 20 kg plate, then a 2.5kg barbell heavy duty steel screwing clip on each side, a 48kg kettlebell strapped on, 72 pound kettlebell strapped on, a 10kg chain on top, … –> each side, and the barbell is 20kg. Et voila –> 547kg in total, 1,206 pounds in total. No based on how dirty the power rack I am using, I feel like it’s probably good for at least 2000 pounds. 

  • How to add weight to a maxed out barbell

    The other day I just lifted 1206 pounds, 547 kg, at 165 pounds body weight … 75kg. Which is 7.3X my body weight.

    A lot of people this might seem kind of random but actually… I’ve been lifting weight since I was a fat 12-year-old kid in Bayside Queens New York, and I am 37 now… so technically I’ve been lifting weights for 25 years. Actually I’ve been interested in an exercise longer than I have been in photography and blogging. I picked up blogging when I was 15 years old on Xanga, 2+ eprops, and photography when I was 18 years old.

    Underlying my whole philosophy has been always this idea of overcoming. And going beyond.

    First principles

    Why rack pull? Many reasons, first it is safer than a deadlift off the floor. Second, easier to rack and unrack the weights. Third, it is more fun and interesting, and obviously you could lift more weights.

    shorten the distance, … heavier weights 

    For example, better to walk 30 minutes with a 60 kg weight vest on, rather than to run 200 miles like a dying antelope.

    Also more impressive to rack pull 1206 pounds, once, for half a centimeter, off the pins, rather than to do 5 trillion situps.

    the idea

    So once you have maxed out the barbell, very very simple one is to like chain or to wrap or to use heavy duty nylon straps to attach more weights to the collar of the barbell.

    For example if you have 48 kg kettle bells add those. or add more plates. Or a new discovery, add 10 kg chains on top of the weights. 

    My maths

    I’m just using a powerlifting bar here in Cambodia, I think it’s like rated to like at least 2000 pounds.

    First, six 25kg red plates, a smaller 20 kg plate, then a 2.5kg barbell heavy duty steel screwing clip on each side, a 48kg kettlebell strapped on,

  • In true “ALL OPEN SOURCE EVERYTHING” spirit, here’s my playbook for surfing each of the 10 cyber frontiers we just mapped—turning bleeding‑edge tech into fresh street‑photo mojo, community fuel, and radical generosity.

    Snapshot Summary

    I plan to wire my creative life straight into tomorrow’s network stack: encrypt zines with post‑quantum ciphers, let AI agents patch my blog code while I’m shooting, beam coaching sessions through lunar relays, watermark every frame with open provenance, and host everything on sovereign, federated clouds. Each frontier becomes a new street to roam—and every upgrade stays open‑source so the whole tribe levels up with me.

    1. Quantum Internet & Post‑Quantum Security

    • Why it matters: DOE’s blueprint is racing to build an entanglement‑based backbone across the U.S.  while NIST has finalized the first quantum‑safe encryption suite.  
    • My move: Re‑encrypt the Contact Sheets newsletter archives with those NIST algorithms so future quantum hackers can’t peek. Then host a live stream from a DOE testbed lab, showing how to harden your own servers—source code included on GitHub.

    2. AI‑Native Cyber Ops & Autonomous Agents

    • Why it matters: DARPA’s AI Cyber Challenge finals at DEF CON 2025 put fully autonomous red‑ and blue‑teams on stage with a $4 M prize.  
    • My move: Fork an AIxCC toolkit to build AUTO‑PATCH‑EK, a bot that audits my WordPress plug‑ins every night and issues pull requests before breakfast. Workshop students can clone it, tweak it, and learn AI security by fixing my bugs in public.  

    3. Space‑Based Networking: LunaNet

    • Why it matters: NASA’s LunaNet will give Artemis crews delay‑tolerant Wi‑Fi on the Moon.  
    • My move: Announce the “Moon Street” photo contest—entrants shoot earthly night scenes, we uplink the gallery via LunaNet demo nodes, and the winning image becomes the first open‑licensed street photograph cached in lunar orbit.

    4. Bio‑Digital Convergence: Brain‑Computer Interfaces

    • Why it matters: Neuralink’s first patient moved a cursor just by thinking.  
    • My move: Collaborate with a BCI lab to prototype MIND‑SHUTTER—blink twice in thought to trigger your camera. Publish all firmware and UX notes so disabled creators can adapt the rig. Follow‑up essay on ethics, consent, and neural data privacy.

    5. Industrial Metaverse & Digital‑Twin Supremacy

    • Why it matters: Siemens and NVIDIA just expanded their Omniverse tie‑up to inject generative AI into factory‑grade twins.  
    • My move: Scan Shibuya Crossing, drop it into Omniverse, and run a “time‑of‑day” simulator that teaches lighting composition without boarding a plane. Release the .USD scene files so any kid with a laptop can practice decisive‑moment hunting.

    6. Decentralized Identity & Web3 Infrastructure

    • Why it matters: W3C’s Decentralized Identifiers v1.0 hit official standard status.  
    • My move: Issue every workshop grad a DID card linking to their portfolio; payments settle over a zero‑knowledge roll‑up so nobody—banks included—can censor indie art commerce.

    7. 6G Terahertz & Reconfigurable Intelligent Surfaces

    • Why it matters: RIS research shows metasurfaces steering terahertz 6G beams for mind‑bending bandwidth.  
    • My move: Host “One‑Lens Live” where a single fixed camera streams uncompressed 8K B&W from downtown Seoul; RIS panels on nearby buildings bounce the signal so students analyze motion blur in real time.

    8. Digital Sovereignty & the New Splinternet

    • Why it matters: The 2024 Gaia‑X Summit set fresh milestones for Europe’s federated cloud vision.  
    • My move: Mirror the entire Eric Kim Blog on a Gaia‑X‑compliant node. Readers pick which jurisdiction serves each page, learning first‑hand how data residency laws shape creative freedom.

    9. Synthetic Reality & Provable Authenticity

    • Why it matters: The C2PA spec (v2.2) defines open watermarks that browsers are already trial‑displaying.  
    • My move: Embed C2PA manifests in every downloadable RAW file. Viewers see a “Content Credentials” badge proving the file is straight‑from‑camera—no AI fakery—yet can still remix it because the license remains CC0.

    10. Cyber‑Physical Resilience for Net‑Zero Grids

    • Why it matters: CISA’s 2023‑24 AI Roadmap pushes “secure by design” principles into every critical‑infrastructure sector.  
    • My move: Convert my home studio to a solar + battery microgrid and publish the entire build log—including threat models and firewall configs—so other creators can keep posting even when the main grid or internet goes dark.

    Closing Flash

    Every new protocol, satellite, metasurface, or neural implant is just another sidewalk to roam with my pocket‑sized camera and open notebook. I’ll keep dropping code repos, zines, and how‑to guides under my trademark banner—“OPEN SOURCE OR DIE—SHOOT. SHARE. SYNC.” 

    Ride with me, and we’ll ensure the next internet is not only faster and safer, but also more generous, more creative, and gloriously more human.

  • Cyber frontiers

    Key Frontier Areas and Implications

    • Artificial Intelligence (AI): AI is reshaping cybersecurity.  Machine learning and AI tools can analyze vast data to strengthen defenses, but attackers also exploit AI (for example, automating phishing, malware and voice-cloning scams) .  In practice, experts report that over half of cyber leaders believe AI will give criminals the upper hand . The AI frontier thus offers unprecedented defense and offense capabilities.
    • Quantum Computing: Quantum computers promise to solve complex problems (e.g. drug design, optimization) far beyond today’s supercomputers, but also threaten security.  Most current encryption relies on math that quantum hardware can break.  Indeed, analysts warn quantum machines could “break widely used cryptographic algorithms” , rendering today’s data protections obsolete. Organizations must begin quantum-proofing their systems and planning a cryptographic overhaul .
    • Blockchain & Decentralized Ledgers: Blockchain technology underpins cryptocurrencies and new trust models. Its ledger is immutable (a “cryptographic fortress”) that makes data tamper-resistant. This can harden supply chains and identity systems, but the unregulated “frontier” of crypto also incubates novel attacks (smart-contract bugs, 51% attacks) and scams. In short, blockchain creates a new trust model—and a new Wild West of financial experimentation.
    • Edge Computing and IoT: Bringing computing power to network “edges” (phones, routers, cars, sensors, etc.) reduces latency and expands capabilities.  It’s like building towns on the frontier: each new device is an outpost closer to users . The real-world implication is a massive expansion of the attack surface.  Security teams now face a jungle of billions of IoT nodes, where each sensor or home router could be a hidden backdoor .
    • AI-Powered Cybercrime:  Attacks augmented by AI are an emerging crisis.  Cybercriminals use AI to create more convincing phishing lures, morphing deepfakes and personalized scams at scale.  Surveys find that 87% of organizations have already experienced an AI-enhanced breach, and the industry predicts multi-trillion-dollar costs from AI-driven cybercrime . In short, adversaries are unleashing robotic bandits that learn and adapt.
    • Synthetic Identity Fraud: Fraudsters are stitching together fake personas by blending bits of real and fictitious data.  This threat is growing rapidly – one expert warns it’s “one of the fastest-growing threats,” since it often goes undetected until serious damage occurs .  Synthetic fraud is now fueled by deepfake technology, with criminals using AI-manipulated faces and voices to pass ID checks . As a result, customer identity has become a shifting battleground between ingenuity and verification.
    • Cyberwarfare:  Nation-states and powerful groups wage invisible wars in cyberspace.  The internet is often called a “digital battlefield” where conflicts over infrastructure, elections, and secrets play out beyond traditional frontlines.  Electrical grids, satellites and nuclear plants become targets just like military bases – meaning governments must defend a vast new domain of warfare.

    Artificial Intelligence: The Ocean of Data

    Imagine AI as an uncharted sea of knowledge.  Vast volumes of data swell like ocean currents – rich with nutrients but hiding storms beneath the surface.  Defenders sail these waters to spot cyberthreats, yet attackers ride the waves too.  As one analyst notes, AI has made defenses “more sophisticated, but it’s also a tool in the arsenal of attackers” .  In this vast digital ocean, every insight can be a lighthouse or a whirlpool: one moment ML algorithms illuminate a hidden malware pattern, the next moment threat actors use generative AI to spawn convincing phishing at scale.  The metaphor fits: we navigate a deep, unpredictable ocean of algorithms and data, teeming with both treasure and lurking dangers.

    Quantum Computing: The Wild Frontier

    Quantum computing feels like the Wild West of physics.  Its rules are strange (particles existing in two states at once) – as if the scientific world is “a wild stallion” that can’t be tamed .  In this setting, quantum computers are the powerful new horsepower, and today’s encryption is the prairie fence.  Just as armored wagons once protected pioneers, classical computers guarded data – but a quantum engine can “stampede through today’s encryption like wild mustangs” .  In practical terms, experts warn quantum machines will shatter current crypto standards .  This new frontier demands swift action (quantum-proof ciphers and protocols) or our data fences will be overrun.  The frontier outlaws (whomever controls quantum code-breaking) might ride off with the spoils if defenses aren’t strengthened – making this uncharted territory as lawless and urgent as any Old West showdown .

    Blockchain: Cryptographic Fortresses and Boomtowns

    Blockchain’s world is a landscape of fortresses and frontier towns.  Each block is like a secure stone in a castle wall – “cryptographic fortification” that makes unauthorized tampering nearly impossible .  Built properly, a blockchain ledger is a stronghold guarding assets and data.  But outside those walls is often lawlessness.  Early cryptocurrency markets were described as a “Wild West phase” of experimentation and scams.  In this metaphorical frontier, one sees both sturdy cities and anything-goes boomtowns.  Smart contracts and tokens are innovative enterprises, but they can also harbor saloons of fraud (such as Ponzi schemes or hidden wallets).  In other words, blockchain both secures (as a fortress) and unsettles (as a frontier town) the digital realm.

    Edge Computing & IoT: Outposts on the Digital Frontier

    Edge computing transforms every gadget and sensor into a frontier outpost.  Instead of all data living in a central cloud fort, processing happens near the network’s edge – like building homesteads at the edge of the map .  Each device (smartphone, factory sensor, drone) is a tiny frontier cabin.  This brings data and insights closer to where they’re needed (better performance, new services) but also creates many new vulnerabilities.  It’s as if every outpost’s door could be knocked down.  Darktrace reports that in recent years “internet-edge devices… were the most widely exploited,” as hackers found cheap targets on those frontier homesteads .  Thus the edge frontier is a vast wilderness: it offers opportunity and coverage, yet without careful patrol every IoT village risks ambush by marauding cyber bandits.

    AI-Powered Cybercrime: Outlaws with New Tools

    AI-powered attackers are like new breed outlaws in this digital Wild West.  Equipped with intelligent tools, they strike faster and more convincingly.  For instance, generative AI can compose phishing emails or voice messages indistinguishable from humans.  In one study, AI-crafted phishing had click rates well above manual attempts. Security experts warn these AI-enabled bandits are spreading: surveys show 56% of leaders expect AI to give criminals an edge .  In metaphorical terms, think of cybercrime ring leaders riding cybernetic steeds (AI bots) that can adapt and learn.  Each botnet or malicious chatbot becomes a virtual gunslinger picking off victims across the network. This frontier is fiercely competitive – defenders must innovate new lassos (AI defenses and detection) to wrangle these digital desperados before they rob the town.

    Synthetic Identity Fraud: Digital Doppelgängers

    Synthetic identity fraud creates ghost-like impersonators on the network.  Criminals fabricate personas, blending real bits of data with fake details until they’ve conjured a new identity out of thin air .  In mythic terms, these are shapeshifters wearing borrowed faces.  Such phantoms hide in the shadows of databases and credit records, often undetected for months or years.  Modern tech has even given them better disguises: “the rise of synthetic identity fraud is compounded by emerging technologies such as deepfakes,” experts note .  Picture a siren in waters of the internet, or a chameleon blending with the digital foliage – unseen until the moment it strikes and steals.  Defenses against this threat require new mirrors and magic (advanced biometrics, behavioral analysis) to expose impostors that look eerily real.

    Cyberwarfare: Battles on the Digital Battlefield

    Cyberwarfare is the space opera of geopolitics – a battle fought in code rather than trenches.  Security analysts literally call the internet a “digital battlefield” .  Adversaries launch attacks on power grids, elections and satellites, as if fleets of starships in an unseen conflict.  The metaphor of outer space fits well: nations arm armies of hackers and surveillance satellites as if preparing for an interstellar war.  Just as in space fiction, the frontier has no obvious borders – a missile can be fired across cyberspace in the blink of an eye.  States must now train digital fleets: firewalls become shields, encryption becomes cloaking devices, and skilled operators navigate an expanse where the enemy could lurk around any electronic nebula.

    Sources: Authoritative reports and expert analyses on AI, quantum computing, blockchain, and emerging cyberthreats .

  • Buckle up for a turbo‑charged dive into why the little five‑letter prefix “cyber” packs such mythic power—and why Eric Kim leans on it to brand himself the Cyber GOAT. In short: the word springs from Greek roots about steering, was reborn in Norbert Wiener’s 1948 science of cybernetics, exploded into pop culture after William Gibson’s “cyberspace,” and now signals the always‑online realm of code, capital, and community that Kim inhabits and secures. Below you’ll see how that history tracks from ancient helmsmen to Bitcoin‑wielding “cyber Spartans,” and why embracing a cyber mindset today means taking the wheel of your own digital destiny.

    1  |  What the Word “Cyber” Literally Means

    1.1  Etymology & Early Science

    • Greek kybernētēs — “helmsman” or “pilot.” The root idea is steering a complex system.  
    • Norbert Wiener coins “cybernetics” (1948) to describe feedback‑controlled machines and biological systems.  
    • Cybernetics literature spread the prefix “cyber‑” into English technical vocab during the 1950s‑60s.  

    1.2  Pop‑Culture Amplifier

    • William Gibson’s novel Neuromancer (1984) popularizes “cyberspace,” framing the Net as an immersive, borderless domain.  
    • By the early 1990s “cyber” appears in Time‑Traveler dictionaries and marketing slogans—from cyber‑cafés to cyber‑sex.  

    1.3  Governance & Security Adoption

    • U.S. government agencies began using “cybersecurity” in policy memos in the 1990s, then codified it via NIST glossaries.  
    • Modern dictionaries now define “cybersecurity” as the measures that guard interconnected computers and data.  

    2  |  Why “Cyber” Resonates in 2025

    DriverWhy It MattersKey Reference
    Ubiquitous Connectivity5 billion+ people online; life, work, and wealth flow through networks.
    Risk & ResilienceExploding attack surface makes “cyber” shorthand for digital defense.
    Identity & CultureWe increasingly are our data—Haraway’s “cyborg” insight writ large.
    Economic GravityCrypto, AI, and cloud subscription models place value squarely in code.

    Bottom line: “Cyber” isn’t just a buzzword; it’s a compass needle that always points toward the networked frontier we rely on every day.

    3  |  Why Eric Kim Wears the “Cyber” Crown

    1. Digital‑First Footprint – Kim’s blog, X threads, TikToks, and YouTube streams form a 24/7 presence native to cyberspace.  
    2. Security Evangelism – He urges followers to wield hardware tokens and Bitcoin cold storage, dubbing them “cyber Spartans.”  
    3. Content‑as‑Code Mindset – His “internet carpet‑bomb” strategy treats every post like a software commit: rapid, iterative, open‑source.  
    4. Financial Sovereignty – By merging photography, fitness, and crypto‑security, he models the self‑steering ethos at the heart of kybernētēs.  

    Hence Cyber GOAT → Greatest of All Time at steering himself and his tribe through the digital expanse. 🐐🚀

    4  |  Channel Your Inner Cyber Navigator

    GOAT PrincipleMicro‑Action You Can Take TodayWhy It Works
    Steer, don’t driftSchedule a weekly “systems check” of passwords, keys, and backups.Feedback loops—the soul of cybernetics—keep systems stable. 
    Publish at network speedShip one piece of content daily, however small.Visibility compounds in algorithmic feeds. 
    Guard the perimeterEnable MFA & store seed phrases offline.Core NIST advice for confidentiality‑integrity‑availability. 
    Conquer with communityJoin or build a “cyber Spartan” squad to swap threat intel and hype.Collective vigilance beats solo silos. 

    5  |  Key Takeaways

    “Cyber” began as a word for piloting complex systems; today it captures the entire digital ocean we navigate.

    Eric Kim’s Cyber GOAT moniker works because he pilots creativity, security, and sovereignty in that ocean better than almost anyone—and he hands the wheel to anyone willing to learn.

    So raise your virtual helm, tighten your encryption, and charge forward: the cyber seas favor bold captains! 🌊⚔️