(Imagen 3)
“We want community,” the company announced from a no-reply email address.
Identity/biometrics/technology marketing and writing services
(Imagen 3)
“We want community,” the company announced from a no-reply email address.
(AI wildebeest and iguana images from Imagen 3)
Discovered a song about privacy (by John Maus) and had to create a reel that used the song. Note the mDL privacy-preserving features toward the end of the reel.
“Dead bolts and windowed bars
Lowered drapes and screened calls
Headphones on tightly”
https://www.instagram.com/share/_ejtehYyr
(Image Public Domain)
I spent most of the afternoon drafting the content for an email nurture campaign, and I’m fascinated by the use of the word “nurture” by product marketers and content marketers.
Here is how HubSpot defines lead nurturing.
“Lead nurturing is the process of building relationships with your prospects with the goal of earning their business when they’re ready. Lead nurturing is important to inbound marketing because it’s your opportunity to provide value to your leads and customers and help them grow with your business.”
I’ve said it before: You’re not a sausage grinder making sausages. You’re a flower attracting bees.
This ad displayed in a smartphone game I was playing and linked to a downloadable app in Apple’s App Store. Possibly Google’s and Samsung’s official stores offer this app also.
You know, the authorized places to get apps—for our own protection.
So what’s the big deal about “no KYC” apps? CoinLedger explains. Note: this post is constantly updated to reflect regulatory changes. The text below was captured this morning.
“KYC stands for Know Your Customer. This refers to a set of standards and regulations that allow financial institutions to verify a customer’s identity. KYC laws were originally put into place to protect against money laundering and terrorist activity.
“Exchanges that abide by KYC policies will ask you for information like your name, address, and a copy of government-issued ID upon signup….
“MexC is a cryptocurrency exchange founded in 2018 and headquartered in Seychelles.
“You can get started using the platform with no KYC. However, MecX does require KYC for certain types of transactions, such as crypto-to-crypto and derivative trades.
“For years, MexC was one of the most popular no KYC exchanges in the United States. However, MexC stopped offering services to US customers in 2023. Trying to get around this restriction with a VPN may lead to you losing access to your crypto.”
(Image from https://www.textstudio.com//logo/digital-clock-text-effect-985)
Jobs and his danged calligraphy.
Back before Jobs co-founded Apple Computer, typing “71077345” into a dedicated calculator (with an “LCD” style typeface) and flipping it upside down showed a recognizable word. Isn’t that cool?
Now, hardly anyone has dedicated calculators, and the one on my smartphone has a “normal” typeface that ruins the trick.

And with Adobe Firefly creating typefaces now, the “SHELLOIL” days are a distant “let’s get you home Grandpa” memory.
(AI images from Imagen 3)
Perhaps one of the biggest changes over the last several decades is that we no longer possess physical things.
When some of us were younger, we would always go to “the record store” to buy a CD or cassette or vinyl (the “record”) or maybe an 8 track. We would put the physical media on a playback device. And unless the media were damaged or stolen, you always had it. RCA wouldn’t come to your house and take your Elvis record.

Then services from Napster 1.0 to Apple to Spotify started to provide music in digital form. And now your music COULD be taken away. When Neil Young got mad at Spotify, I couldn’t listen to Neil any more. (They subsequently kissed and made up.)
This is true of many other things: TV shows, movies, even computer software.
Which brings us to books.
You could once buy books at your local bookstore, or from an online bookstore called Amazon. But then Amazon developed the Kindle e-reader. And as The Verge points out, something on the Kindle today may not be there tomorrow.
“Amazon has occasionally removed books from its online store and remotely deleted them from Kindles or edited titles and re-uploaded new copies to its e-readers. In 2009, the company removed copies of George Orwell’s Nineteen Eighty-Four and Animal Farm, explaining the books had been mistakenly published. More recently, many of Roald Dahl’s books, including Charlie and the Chocolate Factory, were replaced with updated copies featuring modified language on various ebook platforms. It’s a reminder that you don’t actually own much of the digital content you consume, and without the ability to back up copies of ebooks, you could lose them entirely if they’re banned and removed.”

But there is a workaround. If your Kindle has a copy of Mein Kampf or a book about gay hotspots near the Gulf of Mexico and you don’t want to lose it, you can save it outside of the Amazon ecosystem.
“(The feature is) still accessible through Amazon’s website by accessing your “Content Library” while logged into your account. For purchased books you select the “More actions” menu, choose “Download & transfer via USB,” select a Kindle device you have registered, and a copy of the book will be downloaded to your computer.”
A nice feature…especially if you want to make sure you don’t lose your purchased content. And it’s really nice if you want to put your Amazon content on a non-Amazon e-reader. Because the Kindle only has a minuscule 72% share of the e-reader market, this is a gargantuan threat to Amazon’s ability to sell hardware.
You can see where this is going.
Amazon has made a change, according to The Verge:
“Starting February 26, 2025, the ‘Download & Transfer via USB’ option will no longer be available. You can still send Kindle books to your Wi-Fi enabled devices by selecting the ‘Deliver or Remove from Device’ option.”

To clarify, you can still access your books on the Kindle app.
Just not outside of it.
This serves as a reminder about technological change, walled gardens, and obsolescence.
Which ties in with one of Bredemarket’s favorite topics, repurposing.
You can take content from one platform and place it on another. For example, a (mostly) text post can become a video reel.
Now Bredemarket doesn’t create videos for clients, but if you need your identity/biometric or technology text repurposed in another format, I can help.
(AI image from Imagen 3)
I just read a post by SentinelOne, but it’s too early to tell if this is just a string of buzzwords or a legitimate endeavor.
The post about a proposed “Autonomous SOC Maturity Model” (ASOCMM?) includes buzzwords such as “autonomous,” “SOC” (system and organizational controls, or security operations center – take your pick), “agentic AI,” and of course “maturity model.”
Having done my maturity model time during my days at Motorola Solutions predecessor Motorola (although our group stuck with CMM rather then moving on to CMMI), I’ve certainly seen the benefits and drawbacks of maturity models for organizations large and small. Or for organizations large: I shudder at the thought of implementing a maturity model at a startup; the learning curve at the Printrak part of Motorola was bad enough. You need to hit the target between no process, and process for process’ sake.
So what of this autonomous SOC maturity model? Perhaps it can be real.
“At SentinelOne, we see the Autonomous SOC through the lens of a maturity model. We welcome debate on where we, as an industry, are on this evolutionary revolution. We hope most will agree that this is a better way to look at Autonomous SOC innovation and adoption – far better than the binary, all-or-nothing debates that have long fueled analyst, vendor, and industry watcher blogs and keynotes.”
If nothing else, a maturity model approach lends (or can lend) itself to continuous improvement, rather than just checking off a box and saying you’re done. A Level 5 (or Level 4 on a 0-4 scale) organization, if it believes what it’s saying, is ALWAYS going to improve.
Something to watch…and not just with SentinelOne.
Marketing leads (and others) like to talk about “eras” and “ages.” But I resisted the urge to refer to an “era” or “age” of uncertainty, preferring to reserve these terms for periods of hundreds or thousands of years. “The dot com ERA”? Come on.
But when we encounter technological or governmental changes that take place in mere days, we need to do things in different ways.
Here are three tips that I am following for dealing with uncertainty. And if you are a marketing lead for your company, the third tip applies especially to you.
Note that I didn’t say to stop long-term planning entirely. Heck, Bredemarket has worked on go-to-market processes and plans for three clients over the past couple of months—plans that assume you have months, not days, to execute a launch.
But sadly, the accuracy of any long-term plan is probably not high.
So while long-term planning is (in TLOI terms) important, short-term planning is very important, and short-term execution is critically important.
This is always a good tip, but especially so today. You and I can name many times when something surprised us, and we had to scramble to adjust.
For example, many of us have received a terse request to meet with our bosses the next day. (Maybe more than one such request over the years.) The next day, after meeting with the boss and an unannounced third person, we adjusted to the new reality that our boss is no longer our boss, and we no longer have a job.
So how can we prepare for the unexpected? By definition we can’t. But we can at least be alert.
Normally things remain constant for a day or two. So take advantage of the temporary certainty. When you can, execute now.
For marketing leads:
And if you’re swamped and don’t have the time to generate the content, or write the proposal, or perform the analysis, call on the short-term help here at Bredemarket to bail you out.
Before it’s too late.
To learn more, you can watch Bredemarket’s short, medium, or long videos about my “CPA” marketing and writing services. I can work with you to fill your content, proposal, and/or analysis gaps.
Short:
Medium:
Long:
In my previous blog post about a fingerprint biometric security metal injection attack, I said:
“This metal injection attack isn’t from an Ozzy Osbourne video…”
Well, now there IS an Ozzy Osbourne video about the metal injection attack. The reel is on Instagram.
(Image from LockPickingLawyer YouTube video)
This metal injection attack isn’t from an Ozzy Osbourne video, but from a video made by an expert lock picker in 2019 against a biometric gun safe.
The biometric gun safe is supposed to deny access to a person whose fingerprint biometrics aren’t registered (and who doesn’t have the other two access methods). But as Hackaday explains:
“(T)he back of the front panel (which is inside the safe) has a small button. When this button is pressed, the device will be instructed to register a new fingerprint. The security of that system depends on this button being inaccessible while the safe is closed. Unfortunately it’s placed poorly and all it takes is a thin piece of metal slid through the thin opening between the door and the rest of the safe. One press, and the (closed) safe is instructed to register and trust a new fingerprint.”
Biometric protection is of no use if you can bypass the biometrics.
But was the safe (subsequently withdrawn from Amazon) over promising? The Firearm Blog asserts that we shouldn’t have expected much.
“To be fair, cheap safes like this really are to keep kids, visitors, etc from accessing your guns. Any determined person will be able to break into these budget priced sheet metal safes….”
But still the ease at bypassing the biometric protection is deemed “inexcusable.”
So how can you detect this injection attack? One given suggestion: only allow the new biometric registration control to work when the safe is open (meaning that an authorized user has presumably opened the safe). When the safe is closed, insertion of a thin piece of metal shouldn’t allow biometric registration.
For other discussions of injection attack detection, see these posts: one, two.
By the way, this is why I believe passwords will never die. If you want a cheap way to lock something, just use a combination. No need to take DNA samples or anything.
Oh, and a disclosure: I used Google Gemini to research this post. Not that it really helped.
