STR4T0TT0
banner
str4t0tt0.bsky.social
STR4T0TT0
@str4t0tt0.bsky.social
🖥️ Infrastructure manager
🛡️ Learning cybersecurity
🤖 AI enthusiast
Pinned
I write mostly in English, French and Italian about #cybersecurity, #AI, and #cryptocurrencies. I believe technology should be globally accessible. Expect insights from my learning journey, hands-on experiments, and reflections from the IT infrastructure world.
We built the internet to be open.
We adapted it to be secure.
Now we’re discovering that our defensive layers have become so complex that a single internal misfire can simulate a global attack.
Resilience is the new strategic baseline.
November 25, 2025 at 7:43 PM
When defensive automation collapses under its own weight, intent no longer matters.
A benign rule file can create the same operational chaos as a targeted disruption.
This is the part of cybersecurity we still treat as “ops” when it’s already geopolitical.
November 24, 2025 at 3:27 PM
Artificial intelligence infrastructure is behaving like a national asset class. Debt cycles, power scarcity, and supply-chain fragility are redefining what “scale” really means.

Future advantages may not come from larger models, but rather from a strong and adaptable computing strategy.
November 23, 2025 at 7:43 AM
Compute is now a geopolitical instrument. Semiconductors, export controls, and energy grids shape AI more than any breakthrough in model architecture. Hyperscalers didn’t enter geopolitics. Geopolitics entered hyperscalers.
November 22, 2025 at 7:25 AM
The artificial intelligence boom is hiding GPU scarcity, energy constraints, and geopolitical bottlenecks. I unpack this in my latest analysis.

Read it now:
🔗
The AI leverage trap: understanding the geopolitics of computing
An unfiltered analysis of the systemic vulnerabilities beneath the artificial intelligence boom, from GPU scarcity to global power shifts.
medium.com
November 21, 2025 at 6:33 PM
Strategic question: if a single AI lab becomes a systemic node, does the entire ecosystem inherit its volatility? The Oracle/OpenAI link is a stress test for the whole industry. Curious how operators see this risk.
November 18, 2025 at 7:43 PM
Most people still treat AI like software. But the real constraints are power grids, GPU chokepoints, export controls, and debt curves behaving like state budgets. Understanding compute physics > model hype.
November 17, 2025 at 3:27 PM
Systems generate computation, while intelligence pipelines harness power. We’ve shifted our concern from data loss to machine-scale persuasion. The most secure organizations will detect not just breaches, but also changes in belief.
November 16, 2025 at 7:43 AM
Which failure is riskier?

➠ A compromised system?
➠ A trusted system making untraceable wrong decisions?

The first impacts infrastructure; the second affects personal organization. As we enter a time where cognitive processes need protection, this distinction is crucial.
November 15, 2025 at 7:25 AM
Attacks that target belief systems often go unnoticed but can result in harmful decisions. I discuss this shift in my article: medium.com/@str4t0tt0/t.... If you are concerned with sovereignty and trust, rather than just tools and dashboards, I encourage you to check it out!
The looming shadow war of artificial intelligence
In the era of artificial intelligence, the key to success lies in guiding the development of learning capabilities rather than solely…
medium.com
November 14, 2025 at 6:33 PM
Organizations don't just use AI; they adopt external cognitive assumptions. The key question isn't just about your model's security but also whether you understand the context in which it operates. Trust has multiple layers, many of which often go unexamined.
November 11, 2025 at 7:43 PM
The security discussion is shifting, but many teams still see AI as just a tool. Advanced adversaries, however, recognize its true influence. Security has moved from isolating systems to safeguarding their awareness of the environment. The entity that controls thought has the real power here.
November 10, 2025 at 3:27 PM
Three possible futures for money:
1️⃣ Stablecoins become the global rails
2️⃣ Fragmentation through national tokens
3️⃣ Regulatory pushback

Which path do you think wins the decade?

#Finance #Crypto #Regulation
November 9, 2025 at 7:43 AM
Code is the new monetary policy.
Stablecoins aren’t just another crypto product but they’re infrastructure.
Whoever builds the rails defines the next decade of money.

#Stablecoins #Web3 #DigitalEconomy
November 8, 2025 at 7:25 AM
📢 How stablecoins are redefining remittances?
How programmable dollars could replace SWIFT and reshape global payments.
Real data, real scenarios, zero fluff.
🔗 medium.com/@str4t0tt0/b...

#Crypto #Remittances #STR4T0TT0
Borderless prosperity: how stablecoins dramatically redefine remittances
From SWIFT to Solana, our legacy payment systems are losing ground to programmable-dollar-backed tokens reinventing global money transfers.
medium.com
November 7, 2025 at 6:33 PM
Western Union launching a USD-backed stablecoin on Solana isn’t crypto hype. It’s a major institutional evolution. The rails are shifting under our feet.

🧐 Is this the real bridge between finance 1.0 and web3?

#Blockchain #DigitalAssets #Innovation
November 4, 2025 at 7:43 PM
Money stops moving when infrastructure is slow. Stablecoins fix that. They don’t just replace banks but redefine time in finance. Instant, borderless, programmable.

🧐 What’s left for legacy systems to defend?
#Fintech #Stablecoins #Payments
November 3, 2025 at 3:27 PM
Two paths forward:
A) Stewardship, funding, and resilience.
B) Technical debt, inertia, and exploitation.
Which one are we really on?
#CyberLeadership
November 2, 2025 at 7:43 AM
Every unpatched dependency is a moral hazard.
If you depend on it, you own it.
Stewardship isn’t optional anymore.
#Leadership
November 1, 2025 at 7:25 AM
Just published: Proven warning, why old code becomes a weapon.
TARmageddon and the forgotten libraries that fuel nation-state exploits.
Read here 👉 medium.com/@str4t0tt0/p...
#CyberSecurity
Proven warning: why old code becomes a weapon
The issue of abandoned code is not exclusive to open-source. It is a vulnerability that needs to be addressed strategically.
medium.com
October 31, 2025 at 6:33 PM
Happy Samhain! When the veil thins, and both bugs and spirits slip through. 👻💻
October 31, 2025 at 5:18 PM
Total chaos ! Warlock stops services, kills shadow copies and skips key hosts... 🥲
October 31, 2025 at 5:16 PM
TARmageddon proved the point again:
when open-source forks are left to rot, adversaries move in.
Abandonment isn’t an accident.
This is a supply-chain gap waiting to be weaponized.
#OpenSource
October 28, 2025 at 7:43 PM
Neglect is the quietest threat in cybersecurity.
The biggest exploits don’t start with zero-days.
They start with forgotten code.
Maintenance isn’t a task. It’s governance.
#CyberSecurity
October 27, 2025 at 3:27 PM
The market won’t reward your integrity today.
But your users will tomorrow.

What trade-off are you willing to make: performance or credibility?
October 26, 2025 at 7:43 AM