2025-06-16
Hidden traces in AI incognito mode - is our digital confessor really private?
Many people chatting with AI in incognito mode think their conversations will truly be forgotten, leaving no trace. The problem is, traces do remain...
read more2025-06-11
Anomaly in Google Gemini: AI Displays Wrong Images from Attachments
Discovery of a disturbing anomaly in Google Gemini during routine performance audit work - AI was displaying different images than those attached by the user.
read more2025-06-05
Case Study: Leak of sensitive airport data due to email configuration error (2007)
Analysis of the case of leakage of sensitive documents related to security tests of Terminal 2 at Chopin Airport in 2007. A study of human error in email system configuration.
read more2025-05-30
AI-Driven Marketing: The E-commerce Revolution and the Dawn of the Agentic Internet (!)
Analysis of the zhà strategy - the Chinese philosophy of data explosion in AI-driven marketing. How ByteDance spent $1 billion in 2018 for TikTok to earn $18 billion in 2023. TEMU and SHEIN are revolutionizing e-commerce through discovery-based shopping. Are we ready for an agentic internet, where algorithms will make our purchasing decisions?
read more2025-04-22
Phatic Function in Practice: How ChatGPT's Conversation Maintenance Generates Millions in Losses
How misunderstanding language functions embedded in LLMs leads to incorrect conclusions about AI costs. It's not user politeness, but the overzealous implementation of the phatic function in ChatGPT that is the real source of millions in token and resource losses. Call to action as a phatic function causes another round of INPUT/OUTPUT in conversation with LLM.
read more2025-03-19
GPTBot Is Scanning The Internet: How OpenAI Will Change Content Consumption and the Future of Search
OpenAI bots are massively scanning websites. What does this mean for the future of search, SEO, and how we consume online content? Analysis of the phenomenon and forecasts for the next 5 years.
read more2025-01-30
Bypassing Security Filters in ChatGPT's SVG Generation
Analysis of a ChatGPT vulnerability related to generating and packaging potentially dangerous SVG files. Security flaw discovery during routine AI work.
read more2025-01-03
The Illusory Security of BIP: A Brief Technical Analysis of Security Measures
A technical analysis of the Public Information Bulletin's security aspects reveals serious gaps in the security system. Despite theoretically solid legal requirements, the current BIP system architecture allows for easy manipulation of data and change history. The article presents technical details of the problem and proposes specific solutions to enhance security.
read more2024-12-28
Digital Hygiene: The Two-Hour rule in action
My personal experiences with a radical approach to digital hygiene in a permanently online world. How a two-hour daily phone limit, router blocks, and conscious social media restriction help regain control over time and quality of life without giving up work in technology.
read more2024-12-06
ActivityPub Diagrams v1.0
A visual exploration of ActivityPub's architecture, workflows, and federation mechanisms through detailed diagrams, helping developers and architects understand decentralized social networking
read more