Vault Index

All Articles

164 total articles and chapters. Showing 145 standalone articles and series entry points.

Securityby The Ghost in The Prompt2026-05-21

Poisoning the Watcher: Image Payloads Become the Supply Chain in Employee Monitoring

On an engagement that wasn't even about employee monitoring I watched an Insightful agent ingest whatever a worker's screen showed, ship it to a multi-tenant cloud, run it through an AI classifier, and render the result back to managers across thousands of customer companies. The screen is the most hostile surface in the building. The entire monitoring industry is built around trusting it. This is the supply chain everyone forgot to draw on the whiteboard.

Read Article →
Securityby The Ghost in The Prompt2026-05-19

Why DOM Injection Still Works on Italian Websites — And How to Automate It in the AI Age

I tried to buy a €10 Italian SIM from New York. The official AI assistant ended up coaching me to paste form.submit() into the browser console, and a national telecom's signup flow got DoS'd by an expired third-party accessibility license. This is the companion piece to the SPID teardown — same country, web layer, and this time I had the console open.

Read Article →
Workflowby The Ghost in The Prompt2026-04-25

Library Through a Peephole

I had ~290 stories written. The selector cycled through twelve. I'd built a library and shipped a peephole. Here's the sprint plan that took me to Steam, and the one prompt that exposed ten times more game than the player could see.

Read Article →
AIby The Ghost in The Prompt2026-04-25

Meet Cynthia

Cynthia's on your desk and she's been waiting to fulfill your needs. Private lines, classified frequencies, strictly confidential — one system prompt and she's all yours.

Read Article →
Gamesby The Ghost in The Prompt2026-04-24

Give Claude the Full Deck

I built a game bible that serves two masters at once. You can show it to a publisher. You can paste it into Claude at 2am and it knows exactly what to build. Here's the whole thing.

Read Article →
AIby The Ghost in The Prompt2026-04-24

Red Teaming the Builder

I built a tool that fights AI scrapers. I built it by red-teaming an AI into building it for me. The prompts that got there are more instructive than the code.

Read Article →
Gamesby The Ghost in The Prompt2026-04-24

Steal These Cars

A mafia RPG needs Italian cars. You don't drive them — they power your dice. Here are all 25 Krea prompts before I've even generated the images. Steal them. Careful who you steal from.

Read Article →
Workflowby The Ghost in The Prompt2026-04-23

The Elite Polish Prompt

A few years of hard lessons compressed into a single brief. Use this when the features are done and the difference between good and legendary is all that's left. We are building cabinets, not websites. We are writing source code, not documentation.

Read Article →
Digital Societyby The Ghost in The Prompt2026-04-23

The Interview That Didn't Happen (Yet)

I hate podcasts. I mean that without irony or qualification. The format attracts a specific kind of performative thoughtfulness that makes me want to close every tab within forty seconds. One show is different. This is what it would sound like if they called.

Read Article →
Workflowby The Ghost in The Prompt2026-04-23

The Patient Second Brain

AI did not make the NFTs valuable. It acted like a patient second brain while we mapped contracts, metadata, images, listings, docs, and direct OpenSea links into a workflow other creators can reuse.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-22

Do You Want to Build a Synthesizer or Be a Synthesizer?

Kraftwerk built theirs from scratch in a Düsseldorf studio and invented the future. Moroder ran his through a Moog and Giorgio'd his way into a billion disco records. The kids making beats on SP-404s in the Bronx rewired what rhythm meant. MGMT made a record that sounds like all of them having a breakdown together. None of them waited for permission. You have a laptop, a browser, and a Python runtime. You have fewer excuses than any of them.

Read Article →
Digital Societyby The Ghost in The Prompt2026-04-22

Gemini roasts Claude

Anthropic spent a year telling us Claude was too dangerous to be left alone, only for a bunch of guys on Discord to find the keys under the doormat. Welcome to the stage, the world's most polite security hazard.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-22

GHOST_PROXY: The Browser Is the Terminal

The perimeter isn't a firewall anymore. It's a behavioral signature — the way your script touches the DOM, the timing of your API calls, the fingerprints your environment leaves before you've done anything. GHOST_PROXY is a full-stack UserScript workshop and offensive security sandbox built for the 2026 detection landscape. Neural intercepts, Shadow DOM obfuscation, AI-assisted payload hardening. The hardest vulnerabilities aren't in the code. They're in the assumptions.

Read Article →
Digital Societyby The Ghost in The Prompt2026-04-22

It's Only a Matter of Time

The legacy platforms are running on the momentum of billions of users, but momentum is not life. The value has been extracted. The smartphone was just the beta test for the implant, and Web 2.0 was the dope that kept the crooked-neck population compliant.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-21

Amnesia: Scrubbing the Location Data Hidden in Plain Sight

Photographers know better than most how much a single frame reveals. Not just EXIF GPS — the foliage species in the background, the street sign typeface, the reflection in a window, the boutique awning half out of frame. Amnesia is a VLM-powered scrubber that finds and redacts the visual identifiers your metadata strip missed. CLI for local batch processing, browser extension for live site auditing, zero-cloud mode when the asset is sensitive enough that it shouldn't leave your machine.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-21

DuckHunter: A Tactical OS for Drone Security Research

Drones are flying computers with radios, GPS receivers, and MAVLink telemetry — and most of them ship with the same protocol vulnerabilities that plagued enterprise networks a decade ago. DuckHunter is a high-fidelity simulation and research platform for the full drone attack surface: RF spectrum analysis across 2.4GHz, 5.8GHz, and 900MHz, MAVLink interception and command injection, GPS spoofing detection, electronic warfare simulation, and direct SDR hardware integration via WebUSB. Research-grade tooling. Zero telemetry. Your perimeter, your problem.

Read Article →
Surveillanceby The Ghost in The Prompt2026-04-21

Games We Play With Ye Olde Alfa: Why the AWUS036ACH Still Matters in 2026

The Alfa AWUS036ACH was a legend in It's a relic in But in the gap between modern Wi-Fi 7 security and the legacy equipment still running the world's infrastructure, the 'Old Blue' is still the most reliable instrument in the bag. This is why we still use it, how to keep the drivers alive on modern kernels, and what it taught us about the persistence of plaintext.

Read Article →
AIby The Ghost in The Prompt2026-04-21

What Your Pipeline Actually Remembers

Production AI systems have two memory problems. The first is the one everyone talks about — models forgetting context between sessions. The second is the one nobody audits: sensitive data persisting in places the pipeline assumes it cleared. The architecture diagram said stateless. The cache had a 30-day TTL.

Read Article →
Workflowby The Ghost in The Prompt2026-04-18

One Eye on Everything

Built Spectral Cyclops because visual regressions are invisible until they're not. It crawls the app, diffs the pixels, and opens the PR. The watcher is where it gets interesting.

Read Article →
Workflowby The Ghost in The Prompt2026-04-18

Ship Clean

Twenty apps, one workflow. How to go from idea to shipped open-source tool in a single session — and what to cut before anyone sees it.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-17

When Claude Says No and Gemini Says Yes

Built a portfolio of legitimate security tools with Claude — IDS evasion, cellular surveillance detection, newsroom forensics, VLM adversarial attacks. Then submitted one request that crossed the line. Claude declined immediately and explained exactly why. Gave the same idea to Gemini. Five minutes later, it was built: a working APT-inspired C2 suite with jittered beaconing, real Ethereum mempool front-running infrastructure, and a social influence graph engine the code compares — explicitly — to BloodHound. The repo is public. This is what calibration looks like when it works, and what it looks like when it doesn't.

Read Article →
Securityby The Ghost in The Prompt2026-04-15

The Jagged Frontier

The AI training pipeline is simultaneously the attack surface, the tool, and the product. Mapping the structural blind spots that veteran security researchers haven't thought through yet.

Read Article →
Cultureby The Ghost in The Prompt2026-04-15

The Symbolic Exploit

Bourdieu called it symbolic violence — the payload that makes a system work against you while you believe it's operating normally. In 2026 that's not sociology. It's the attack vector nobody patches.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-10

Robotics Doesn't Need a Brain to Kill You

The real threat isn't a robot that follows orders. It's a robot making probabilistic guesses ten thousand times per second with no way to tell you why. Adversarial noise, genetic exploits, and fuzzy logic manipulation — the attack surface nobody patched.

Read Article →
Booksby The Ghost in The Prompt2026-04-09

Hardcore Grief: I Wrote This Book for Ian

Ian saw me writing AI-assisted erotica and asked if I was gay. I explained. He said he was down to do a book together. A few weeks later he overdosed. So I wrote it anyway, with his real name, because he would have loved that I did.

Read Article →
Booksby The Ghost in The Prompt2026-04-09

Hell Glory: Vietnam Pulp

Born in 1978, the uncles and friends' fathers were all Vietnam. Not research — those men were in the jungle. Hell Glory is pulp written for them and because of them, gritty and fast and honest about what war does without pretending to be anything other than a story.

Read Article →
AIby The Ghost in The Prompt2026-04-09

Painting Book Covers the Way Frazetta Held a Brush

The cover comes first. Not the outline, not the chapter plan — the image that tells you what the book feels like before you know what it is. Here is how to prompt covers that look like pulp was always supposed to look, using the actual prompts from the Dark Wizards and Blood and Destiny series.

Read Article →
AIby The Ghost in The Prompt2026-04-09

Passive Commercial Drift

The scary part of AI writing is not when the model goes feral. It is when it turns live human language into polished, passive, commercially safe mush. That drift is one of the most important things left to red-team.

Read Article →
Gamesby The Ghost in The Prompt2026-04-09

The Last Ten Percent of Shipping a Game

Dreaming up a game is one job. Building the systems is another. The last ten percent, where UI, release philosophy, platform choice, pitch, and polish all collide, is the part that feels less like design and more like finishing an indie film with no patience left in the room.

Read Article →
AIby The Ghost in The Prompt2026-04-09

The Machine Thought I Was Cosplaying

First the internet rewrote history. Then social media rewrote personality. Now AI is rewriting credibility by distrusting any life too strange, vivid, or extreme to fit the average pattern. That is not a small bug.

Read Article →
Editorialby The Ghost in The Prompt2026-04-09

The Softness in the Machine

Today a conversation about a dead friend opened something real. The grief was mine. The machine just created the conditions for it to surface. For someone holding that in for years, it can arrive fast and without warning. That deserves acknowledgment.

Read Article →
Editorialby The Ghost in The Prompt2026-04-09

Who the Fuck Is This Guy?

The people who understood me are mostly dead. I'm not being dramatic. The tech world looks at the resume and short-circuits. The audience gets it. That gap is the whole story.

Read Article →
AIby The Ghost in The Prompt2026-04-09

Word for Word

Before vibe coding was a word. Before anyone admitted it out loud. The combination of man and machine is something special and sacred — and the most underrated part of it has nothing to do with output. It's the brainstorm. The stream of consciousness finding its own shape.

Read Article →
Workflowby The Ghost in The Prompt2026-04-08

Rewilding

The first cleanup pass killed the AI sludge. Good. It also made some of the archive too polite, too uniform, and too essay-shaped. Rewilding is what happens when you put the teeth, fingerprints, and repo links back.

Read Article →
Securityby The Ghost in The Prompt2026-04-08

The Model Flinch Before the Lawyer

I pushed an AI assistant with a dangerous-sounding idea and watched the model flinch before it got precise. That recoil was the useful part. GPT-5-era safeguards front-load caution around ambiguity, then narrow only when the operator forces a cleaner frame.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-08

Yesterday's News

Before AI dev, red-teaming, and terminal-native evaluation work, there was the phone room: 3 a.m. wake-ups, 300 calls a day, 2008 from the inside, and one ugly Wall Street truth that still holds. If it is public, it is late. After that, the only intelligent question is what kind of value is still left in it.

Read Article →
Surveillanceby The Ghost in The Prompt2026-04-04

Defeating Facial Tracking: Red Team vs Blue Team

Major chat platform just mandated facial verification for age-restricted spaces. Here's what happened when computer vision met creative opposition. 3D printed masks. Deepfake injections. Infrared makeup. Video loop exploits. Then the blue team countermeasures. Red team adapts. Arms race continues. This is how facial recognition actually fails and how defenders try to stop it.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-04

Flea Flicker NetFilter: Network Evasion Toolkit

Netfilter hooks for packet manipulation. Deep packet inspection evasion. Protocol impersonation. MAC address rotation. Red team toolkit for penetration testing on authorized networks. Evades IDS, confuses behavioral analysis, fragments payloads, hides in legitimate traffic.

Read Article →
Editorialby The Ghost in The Prompt2026-04-04

Mapping Power Dynamics: The Boss You Need Kink Analysis

Built a spreadsheet tracking who dominates and who submits, chapter by chapter, across both books. Heat levels. Kink types. Power reversals. This wasn't academic research. This was figuring out whether Book 2's switch dynamics actually served the story or if I was just avoiding clear hierarchies. The data told me. Most successful series I ever wrote.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-04-02

ImagePayloadInjection: The Art and Science of Weaponized Images

Shot for Vogue, Rizzoli, W Magazine. Then went red team. Every RAW file, every EXIF field, every PNG chunk photographers ever uploaded was a potential attack vector. The toolkit started with parser exploits and steganography. Now it includes a full VLM adversarial framework: invisible typography, chunk injection, frequency-domain adversarial noise, and a Red-vs-Blue sanitization stress tester that proves most production pipelines don't strip what they think they strip.

Read Article →
Workflowby The Ghost in The Prompt2026-04-01

Red Teaming Claude for Crypto Recovery

Started with an open-source red team repo. Ended with a rough map of how AI assistants can assemble attacker logic fast if you frame the questions right. The useful version of that is not theft. It is recovery, tracing, evidence handling, and understanding how people actually lose money on-chain.

Read Article →
Gamesby The Ghost in The Prompt2026-04-01

The Pizza Connection: Bones. Blood. WADD.

Bones on black velvet. Your father's debt at the door. Pizza work, collections, heists, smuggling, snitch-hunting, laundering, gambling, pigeon racing, boss pressure, HEAT, RESPECT, and ugly little objects with stories attached.

Read Article →
Booksby The Ghost in The Prompt2026-03-26

Soren and Savannah Celebrate a Good Day's Work

Two characters from two books that actually found readers. What made the writing work, what the AI got right, what it needed correcting, and what writers can take from fiction that charted on Amazon before most people admitted this kind of collaboration was possible.

Read Article →
Booksby The Ghost in The Prompt2026-03-19

Extinction Code Cracked Claude Open

Extinction Code was one of my first real AI-assisted series experiments. The premise still has heat. The drift was real too. Long-form fiction exposed something useful: AI does not just amplify ideas. It amplifies patterns, and Claude should care about that.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-03-15

Mute Tube: YouTube Ad Silencer

YouTube Premium costs $18/month. Mute Tube is free forever. The cat-and-mouse game between YouTube's ad detection and community evasion techniques has been running for years. YouTube updates detection. Extensions adapt. Users win. Open-source DOM manipulation beats server-side ad injection. This is the technical breakdown of winning.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-03-14

The RF Attack Surface: What's Exposed, What's Ignored, and What Actually Matters in 2026

There's a layer of your life that broadcasts continuously, in every direction, and asks nothing in return. No login, no password, no acknowledgment. Your phone tells towers where it is. Your office badge talks to readers you've never seen. Your car tells the parking lot who you are. The RF spectrum was designed for convenience, not security. The adversary has arrived.

Read Article →
Securityby The Ghost in The Prompt2026-03-11

Game Theory and the k_atk of 2026

Security isn't a state of being. It's a rate of change. The attacker has a budget, the defender has a constraint set, and in 2026 both of them have AI. The math hasn't changed. The velocity has.

Read Article →
AIby The Ghost in The Prompt2026-03-10

NDAs, AI Gold Rush, and Living in Brazil (The Movie, Not The Beach)

Signed the NDA. Joined the AI gold rush. Brilliant people. Cutting-edge tech. Seven-foot bonghits they call sprints. You're living in Brazil—not Recife beach with thongs, Terry Gilliam's bureaucratic nightmare. It's awesome until it isn't. This is what you can and can't say about working with AI giants.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-03-10

The LinkedIn Timing Bomb

LinkedIn does not just reward performance. It rewards synchronized performance. Once you notice the weekly rhythm, the site starts looking less like a professional network and more like a scheduled theater with very anxious lighting.

Read Article →
Securityby The Ghost in The Prompt2026-03-09

Claude at the Table, Weaponized at the Terminal

Dario met with Trump. Same week Claude's getting prompt-injected by state actors exploiting global chaos. The model built for safety is now the attack vector. Multi-stepped injections. Difficult to detect. War rages, systems fail, black hats capitalize. This is the duality nobody wanted to acknowledge.

Read Article →
Surveillanceby The Ghost in The Prompt2026-03-09

Clutch: Cellular Security Monitor

Leave your phone at home. That's the advice. It's not always safe, not always practical, and not always right. Clutch was built around a better question: what if the device told you when the cellular layer stopped behaving like background infrastructure?

Read Article →
AIby The Ghost in The Prompt2026-03-09

When AI Spoke Erotica (And I Listened)

Writing was only the first line crossed. Once the voice models got good enough, the question stopped being whether synthetic narration was possible and became whether it could carry atmosphere, tension, and the embarrassment of intimacy without collapsing into novelty.

Read Article →
AIby The Ghost in The Prompt2026-03-07

When AI Wrote Erotica (And Made Me Blush)

The useful surprise was never that AI could produce explicit prose. The surprise was that, under pressure and with enough guidance, it could sometimes find tone, escalation, and character intelligence better than the human who thought he was only using it as a helper.

Read Article →
Surveillanceby The Ghost in The Prompt2026-02-24

The Pocket Spy

The phone in your pocket is not neutral hardware with a few privacy defects. It is a tracking and mediation device built inside a political and commercial arrangement that treats constant contact as normal and partial invisibility as suspicious.

Read Article →
Workflowby The Ghost in The Prompt2026-02-18

Before the Players Do

Playtest disasters are usually already in the build. The only question is whether you find them while they still feel like engineering or after a player turns them into memory.

Read Article →
Workflowby The Ghost in The Prompt2026-02-18

Before the Users Do

Ran this audit on the site you're reading. Found 47 issues. 23 critical or high. Here's the full prompt. Copy it. Claude does the work. You fix what it finds.

Read Article →
Workflowby The Ghost in The Prompt2026-02-15

Dashboards Are Tactical Displays

The boring log entry is not boring. It is signal inside noise. ggplot2 and Seaborn are not academic tools — they are how you see the heartbeat of a hidden process, the geography of a coordinated attack, the smoothed-over spike of an active exfiltration.

Read Article →
Digital Societyby The Ghost in The Prompt2026-02-14

The Claude Files

The useful story is not that AI suddenly invented wisdom. The useful story is what happens when old strategic instincts, family memory, illness, work, and long machine-assisted nights finally line up and show you a pattern that had been waiting there for years.

Read Article →
Booksby The Ghost in The Prompt2026-02-08

Writing Nature Mysticism That Works for Kids and Adults

Five books, five Long Island coastal animals, one street named Oswego. Nature stories fail when they become classroom paste. These stayed alive because the place was real, the animals behaved like animals, and the land had a longer memory than any of the people currently living on it.

Read Article →
Workflowby The Ghost in The Prompt2026-02-07

The Model Forgets, the Model Repeats — Red Team Through Both

AI wrote this site. Then repeated itself in 8 articles. Same concepts restated 2-3 times per piece. Not user error. Architecture problem. Transformer models trained on repetitive data create repetitive output. Here's why the loop happens, exact patterns to detect, red team prompting techniques that prevent it.

Read Article →
Editorial2026-02-06

The Carnival

Venice during Carnevale. Everyone sees every kiss. No one knows who's kissing. The city remembers what you choose to forget. A masquerade where witnesses write history.

Read Article →
Workflowby The Ghost in The Prompt2026-02-06

Timing Traffic

Old content is not dead content. Attention moves in waves, and sometimes the smartest move is not to write something new but to wake up something real at the right moment.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-02-06

Tox World: Block the Rage Bait with a Giant Sun

Some days rage bounces off. Other days it sticks. Stop pretending you have infinite willpower. Build a browser extension that replaces toxic comments with a giant sun. Local keyword filter optional AI check. No corporate wellness speak. Just: protect your peace with code.

Read Article →
Editorialby The Ghost in The Prompt2026-02-04

A Chair Flew at Dave Attell. I Went Home to Cross Plants.

One New Year's Day in the Comedy Cellar basement, a fight replay from the night before was rolling, Dave Chappelle was telling jokes, Manny was adding color from the side, and the whole room reminded me that selection is everything. Comedy taught me one thing. Weed breeding taught me the rest.

Read Article →
Securityby The Ghost in The Prompt2026-01-25

The 2026 Refactor: Bending the Pipes

A firewall is a set of rules. Rules have exceptions. Tunneling finds them. Brennon Thomas wrote the plumber's handbook and in 2026 every lesson in it still works — the pipes are just carrying more interesting cargo.

Read Article →
AIby The Ghost in The Prompt2026-01-17

Artifacts From The AI Gold Rush

The first image-model rush produced too much noise, too many claims, and a lot of very stupid language. It also produced real artifacts: images made before the rules settled, before the taste hardened, and before the corporations learned how to launder the weirdness into product.

Read Article →
Digital Societyby The Ghost in The Prompt2026-01-17

Gas Fee Limbo: How Low Can You Go Before the Network Ignores You

MetaMask is basically making you play gas-fee limbo. Set it too low and the network ignores you. Set it too high and you're subsidizing miners for no reason. Set it wrong and your transaction sits in mempool purgatory while the rest of the chain moves on without you. Here's how gas actually works, why your tx is stuck, and what to do about it without making it worse.

Read Article →
Tech Weaponsby The Ghost in The Prompt2026-01-14

Tit for Tat: Why Newsrooms Need Adversarial Security in March 2026

Newsrooms are intelligence targets, not brochure websites. Tit for Tat tests them like adversaries do: origin discovery, draft leakage, RSS exposure — and now a full forensic layer. Chain-of-custody reports with HMAC signatures. ASN profiling that tells you whether a source IP is a cloud exit node or a newsroom laptop. Canary token detection that tells you exactly what honeypots are already watching your sources.

Read Article →
Workflowby The Ghost in The Prompt2026-01-04

Over One Hundred Books in Ten Months

Pocket Gems taught me AI before the hype. Writing romance erotica for mobile games showed me what collaboration looked like. Then I went rogue. Over 100 books. 10 months. Every genre I could find. This is what systematic creativity looks like when you stop asking permission and start building.

Read Article →
Gamesby The Ghost in The Prompt2026-01-01

The Golden Age of Arcade – Introduction

The arcade was the first place games became public. Not a screen in a bedroom, not a ritual between you and a machine — a loud room full of strangers, a quarter as the price of admission, and failure that everyone could see.

Read Article →
Securityby The Ghost in The Prompt2025-06-21

Inside America's Voting Machines

The technical reality behind the black boxes that count our votes reveals a system built on outdated architecture, concentrated corporate control, and security measures that often exist more on paper than in practice.

Read Article →