Hackers: Then vs. Now — What Really Changed?

When considering hackers then vs now, there was a time when the word “hacker” didn’t automatically send a chill down your spine.
Believe it or not, it used to mean something closer to “curious tech kid who can’t stop taking things apart just to see how they work.” Hackers then vs now present a vastly different landscape in terms of intent and impact.

Back then, hackers were explorers.
They poked around systems because the digital world was new and they wanted to understand it.
They weren’t trying to steal your identity or drain your accounts.
They were just… learning.
Experimenting.
Pushing boundaries in ways that actually helped make the internet safer. Indeed, comparing hackers then versus now shows how the landscape has evolved.

That was the era of the original white hats—people who challenged vulnerabilities so the rest of us didn’t have to worry about them.
Their mission was clarity, not chaos, which is starkly opposite to hackers now.

Fast forward to now?
Yeah… it’s a completely different world.

“Hacker” today usually means something far more aggressive:
someone who isn’t just curious, but calculated.
Not exploring—targeting.
Not tinkering—exploiting. In the debate of hackers then and now, there is a clear trend towards exploitation today.

Today’s black hats are organized, funded, and hidden behind layers of anonymity. Speaking of hackers then vs now, they’re not looking for knowledge—they’re looking for leverage.
And they don’t care who gets hurt in the process. This stark contrast between hackers then versus now highlights the shift in motives.

One wrong click, one weak password, one small oversight… and suddenly your entire digital life can be flipped upside down.
I know that firsthand.

Most people don’t realize it, but the digital playground has turned into a battlefield. When comparing hackers from then to now, it becomes clear how the landscape has shifted from innocence to aggression.
And whether you want to or not, you’re standing in the middle of it.

The line between offense and defense is razor-sharp now.
And if you’re online — which we all are — you’re already playing the hackers’ game then versus now.

If you want to know how I survived it, rebuilt from it, and what really happened behind the scenes…
you can read my full story in Undermined at Undermined.com.

Stay aware.
Stay one step ahead.
And most importantly… stay un-undermined.

Invisible Bruises: Recovering From a Mental Crime

How do you recover from a crime you can’t fully explain? It’s as if you’re dealing with invisible bruises from a mental crime—no fingerprints, no shadow, no clear source—just impact. This scenario could be called Invisible Bruises Mental Crime. What do you do when you’re targeted by someone you’ve never met, for reasons you may never understand, in a digital ambush that quietly slips into your life and leaves it permanently altered?

When your assets disappear—assets that today would be worth over $100 million—you’re left with more than financial loss. Invisible Bruises Mental Crime also leaves you with a timeline that no longer fits together, fragments of memories that don’t resolve cleanly, and a lingering feeling that something was watching long before you ever noticed it.

Most people hear the word cybercrime and think of numbers, passwords, logins, or bad luck. They imagine a technical glitch or a wrong click. But no one talks about the mental crime that follows. No one talks about the psychological aftermath of having your digital world invaded. It becomes an experience of invisible bruises from this mental crime, showing us that when the dust settles, the real loss isn’t just money—it’s certainty. You lose trust, safety, and the version of yourself that once believed the world was predictable.

And then comes the cruel reality: you still have to live in the same digital environment that failed you. You still have to use the devices that betrayed you. You still have to log into accounts that didn’t protect you. You still have to navigate the same online spaces that someone else previously slipped into without warning or permission. Rebuilding in that environment feels like trying to heal inside the very place that broke you.

It often resembles PTSD. These are invisible bruises—emotional wounds no one sees, moments that replay in your mind like corrupted footage you can’t quite repair. Trauma doesn’t leave clean edges. It tears, distorts, and hides in the corners of your memory, waiting to resurface unexpectedly.

Some crimes don’t break bones. Some break your internal compass. Some thefts leave no physical evidence, yet scar you in ways you carry every day. These manifestations are what is known as the crime of invisible bruises, mentally subtle yet deeply impactful.

Recovering from a mental crime isn’t about “moving on.” It’s about learning how to exist again in a world that showed you how fragile everything really is. It’s not about resilience in the inspirational sense—it’s about survival. And every time you step back into that digital world, knowing what happened but refusing to let it determine your future, you’re rebuilding yourself. Quietly. Steadily. Relentlessly.

Recovery doesn’t happen in the spotlight. It happens in the shadows you’ve learned to walk through with your eyes open, refusing to let what undermined you define the rest of your story. It’s a mental resilience that roots out the invisible bruises left by such a crime.

If you’ve felt this kind of mental weight—don’t carry it alone.

Digital trauma is still trauma.
Invisible pain is still real pain.
And reaching out for support—professional or personal—is a sign of strength, not weakness.

Talk to someone.
Ask for help.
Your mind deserves the same protection and care as your devices, your accounts, and your digital life.

You’re not broken.
You’re recovering.
And recovery is always easier when you don’t walk through the dark by yourself.

Gratitude, Mental Health, and Digital Security: A Thanksgiving Reflection

Thanksgiving always brings me back to the essentials: family, friends, fellowship… and yes, a perfectly over-engineered turducken that makes you wonder who first said, “You know what this bird needs? Another bird.” Reflecting on gratitude, mental health, and digital security can also be a part of this time of thanks. Gratitude, mental health, and digital security are all important aspects of our modern lives.

But this season also reminds me of something deeper — the quiet battles we all fight behind the scenes.
Some are emotional. Some are digital. And some, like in my book Undermined, are both.

The Mental Health Cost of Being “Always On”

The holidays can be a beautiful escape, but for many, they’re also a trigger. Stress, loneliness, old wounds, and unresolved chapters tend to resurface this time of year.
And in a world where our phones never stop buzzing and security threats never take a holiday, the mind rarely gets the rest it deserves. These are crucial for gratitude, mental health, and digital security.

I learned this the hard way. When your digital life is targeted, it’s not just assets or accounts that get compromised — your sense of safety does too.
That’s the heartbeat of Undermined: recovering from a digital crime that leaves emotional bruises long after the incident is over.

Thanksgiving is a reminder that mental health isn’t a luxury; it’s survival, just like maintaining digital security.

Digital Security Doesn’t Take Time Off

Hackers don’t pause for the holidays.
Scammers don’t say grace and take a long weekend.
And vulnerabilities don’t magically disappear because we’re passing the gravy.

During a season when we’re traveling, shopping online, connecting to unfamiliar networks, and juggling new devices, our attack surface widens — a lot. At such times, gratitude, mental health, and digital security matter more than ever.

So be thankful… and be careful.
A few quick reminders:

  • Enable 2FA everywhere you can
  • Use a backup email or device
  • Watch for phishing scams disguised as holiday deals
  • Resist the urge to click “free gift card” links
  • Lock down your home network before guests arrive
  • And if you’ve got a turducken… don’t leave that unprotected either

The world is decentralized. Our trust shouldn’t be.

A Moment of Appreciation

This year, I’m grateful for the people who kept me grounded, the community that lifted me up, and the strength to keep telling a story many would hide.

If you’re struggling — mentally, emotionally, or digitally — hear this:

You’re not alone.
You’re not broken.
And you’re not done.

Thanksgiving is about connection. Even in a decentralized world, community is what keeps us human.

Happy Thanksgiving — and Pass the Turducken

May your day be safe, may your mind be calm, and may your digital life stay secure while you enjoy the people who matter most.

And to whoever invented the turducken…
Yum yum. You’re the real MVP.

Convenience Has a Cost: What Are You Sacrificing?

We built our lives on convenience. The ongoing debate of convenience vs security arises as we rely more on technology.
Autofill. Auto-login. Clouds that sync before we even think.
We trade friction for speed and pretend it’s harmless.

But convenience is the quiet killer of digital security, highlighting the importance of the convenience vs security debate.

In Undermined by Brian Oakes, I wrote something I learned the hard way:

“You don’t realize how exposed you are until someone else shows you.
And by then, you’re already too late.”

That truth hasn’t changed—people just got more comfortable in the ongoing convenience versus security considerations.


A Digital Heist Doesn’t Knock. It Breaks In.

Most people assume it’ll never happen to them. This is where they err in the ongoing convenience versus security dilemma, often downplaying the severity of the convenience versus security issue.
That’s what I thought too—right up until the minute everything went sideways.

Accounts cracked open.
Devices behaving like they had a mind of their own.
Files shifting, access disappearing, identities peeling away like wet paper.

There’s nothing more unsettling than watching your digital life get rearranged in real-time while everyone around you shrugs and says:

“Well, did you have 2FA on?”

As if two little digits of “extra security” undo a full-scale compromise. It becomes clear then how we balance convenience with security in our lives.
As if you can tape over a breached foundation in the convenience vs security struggle.


So ask yourself—really ask yourself:

If a digital heist hit tomorrow…

  • Do you have a backup device already configured?
  • Do you have real 2FA—hardware keys, not texts? It’s part of the larger conversation of convenience and security.
  • Can you revoke tokens, isolate devices, and lock down accounts without having to Google every step?
  • Can you go dark and rebuild fast?

Most people can’t.
Most people freeze.
Most people assume the companies they trusted will swoop in and save them.

Spoiler: They won’t. The convenience vs security dilemma is often ignored until it’s too late.


Convenience Isn’t Protection. Hope Isn’t Security.

In Undermined, I wrote:

“Security isn’t about paranoia—it’s about preparation.
Paranoia is when you fear a threat.
Preparation is when you accept one exists.”

And that’s the line most people never cross in their attempts to weigh convenience against security.

We built a culture around shortcuts.
Around “just sign in with Google.”
Around saving passwords in browsers and syncing credentials across five devices we never locked down.

The world changed.
Threats evolved.
But people… didn’t adapt in the convenience and security debate.


The question now is simple:

Are you protected?
Or just comfortable?

Because comfort is a vulnerability.
Convenience is an attack surface.
And hoping for the best is the fastest path to getting Undermined in the battle of convenience vs security.

Why Can’t I Just Be Left Alone?

There’s a point where the constant notifications stop being “security alerts” and start becoming something else entirely — a reminder that your digital life is never really yours. This digital harassment can have a serious impact on mental health. Another login attempt. Another “unusual activity detected.” Another threat from someone trying to wedge themselves into your accounts.

And every time it happens, the same question hits me in the chest:

Why should I have to change everything?
Why should I be the one moving my data, rebuilding my accounts, rotating emails, resetting passwords, tearing apart systems that I built… just because somebody else wants to break into them?

Why do I have to reorganize my entire digital world just to be left alone?

I’ve said this before, and I’ll say it again:
If you don’t think you’re a target, then you already are one.

I learned that the hard way. Once someone decides you’re worth their time — whether it’s a thief, a troll, a scammer, a botnet, or even just some bored person clicking around — your peace becomes collateral damage and negatively impacts your mental health.

And that’s the part that gets to me.
It steals something from you that you’ll never fully get back.


Death by a Thousand Notifications

People imagine “being hacked” as one moment — the big breach, the big theft, the “event.” But that’s not what being undermined actually feels like.

It feels like constant pressure on your mental health due to digital harassment.

You’re not just changing a password — you’re changing your routine, your inbox, your habits, your entire mental map of where things live. You’re rebuilding your life because someone else decided to poke a hole in it.

Every alert steals a little bit of your time.
Every threat steals a little bit of your trust.
Every breach steals a piece of your stability.

And after a while, you start asking yourself questions you never thought you’d ask:

Should I abandon this email altogether?
Should I migrate everything again?
Should I split my identity across more accounts?
Should I wipe the slate clean for the hundredth time?

Why?
Because somebody else refuses to leave you alone.


The Unfair Burden

We don’t talk enough about this part:
When someone tries to undermine you — even if they fail — you still pay the price.

You lose time.
You lose energy.
You lose sleep.
You lose confidence.
You lose the feeling of safety. During digital harassment, mental health can deteriorate over time.

You end up living in a world you didn’t choose.

Most people never realize how many layers of your life tie back to your email address — your logins, your finances, your identity, your digital history. Changing it means tearing up roots and replanting them one by one.

It’s not just a security step.
It’s forced relocation.

And the part that stings?
You didn’t ask for any of this.


Living Undermined Isn’t Just a Story — It’s Exhausting

This is the part of “Undermined” people don’t always see.
Not the theft. Not the breach. Not the recovery.

It’s the after.
The quiet erosion that follows you for years.

The sense that you have to stay one step ahead.
The paranoia that maybe you’re not.
The frustration that you shouldn’t have to think like this at all.

The exhaustion of defending yourself from people who don’t care what they destroy in the process.

You don’t want to rebuild everything.
You don’t want to keep rotating your digital life like a carousel.
You don’t want to carry the weight of other people’s intentions.

You just want to be left alone to manage your mental health amidst digital harassment.


But Here’s the Truth

You can be targeted without ever doing anything wrong.
You can be undermined without ever provoking anyone.
You can be harassed, stalked, breached, or threatened by people who will never know your name — because attacking is easy, and defending is all-consuming.

And that’s why your story matters.
That’s why Undermined matters.

Because you’re not just telling a story about being attacked.

You’re telling the story of what it costs to keep going anyway despite the toll on mental health from digital harassment.

Even the Louvre Got It Wrong: Why “louvre” Was Their Password — And Why You’re Already a Target

When you think about the Louvre, you imagine an impenetrable fortress of history — a place where Mona Lisa’s mysterious smile is guarded behind layers of glass and steel. However, in a surprising turn of events, the idea of a Louvre heist challenges this perception of security. A global icon, visited by millions, hailed as one of humanity’s most precious cultural repositories. You’d expect its digital defenses to be equally formidable.

But it wasn’t, which led to an unexpected Louvre heist.

This year, a story broke that the internal security password used by staff at the Louvre — the literal gateway to sensitive systems and priceless assets — was simply… “louvre.” No symbols. No numbers. No complexity. Just the name of the museum itself, making it easy for a Louvre heist to occur.

It sounds like a joke, but it wasn’t. And the most alarming part? It happens every day.

What the Louvre Can Teach Us About Vulnerability

The Louvre’s password misstep is a perfect mirror of a serious truth: security is only as strong as its weakest link. And often, that weakest link is human behavior.

In my book Undermined, I share how my life was gutted by something similar — not a massive infrastructure flaw or watching a decade of my work be undone by hackers in hoodies — but a series of small, familiar, comfortable decisions. Decisions made without the expectation of a threat, which is reminiscent of a Louvre heist.

I write:

“The real enemy isn’t the hacker typing code in the dark — it’s our belief that we’re safe, that nobody would bother coming after us. Security doesn’t fail when systems break; it fails when confidence does.”

It’s the same assumption that left the Louvre vulnerable — and it’s one I’ve watched thousands of everyday people make themselves.

We’re All Holding Priceless Assets

You might be thinking: “Sure, the Louvre guards billions of dollars of art. Nobody cares about my photos or bank account.” But what was stolen from me wasn’t money — it was time, identity, focus. It was the peace of mind that someone wasn’t rifling through my life like a thief in the night.

Everyone is holding something priceless. Sometimes it’s Bitcoin. Sometimes it’s your future. Sometimes it’s just your peace.

In Chapter 7 of Undermined, I say:

“The digital world isn’t a battlefield of elites and experts — it’s a constant proximity. If you’re online, you’re already standing in the arena. Whether you realize it or not, the game is on.”

The Louvre was targeted not because of what it did wrong — but because it existed. Because it had something to steal. So do you.

Stop Thinking You’re Safe

Here’s the uncomfortable truth I learned the hard way: You don’t need to be important to be targeted. You only need to be accessible.

It’s not paranoia — it’s preparation.

Here’s how you can turn complacency into armor:

  • Stop using meaningful words as passwords — even if they’re obscure to others.
  • Rotate your passwords regularly. You can’t trust the digital world to stay static.
  • Use a password manager — if you can’t remember it, that’s often a good sign.
  • Audit your accounts — all of them. You’d be shocked how many places you exist online.
  • Assume failure, plan recovery. Backup. Encrypt. Repeat.

Because whether you’re guarding The Coronation of Napoleon or your own email account, the consequences of failure are always personal.


This is why Undermined exists. To share the moment I lost—and the path I fought to get back. To warn those still thinking they’re safe. To push the ones who assume they’re invisible into recognizing they’re already visible to predators, bots, scripts, governments, and those who’d simply celebrate destruction.

As I say in the book:

“If you don’t think you are a target, then you already are one.”

Don’t wait to be undermined. Prepare now. Be harder to prey on. And remember: the enemy counts on your apathy.

If even the Louvre can be undone by a weak password, imagine what could be undone in your own life — unless you start taking your security seriously today and avoid a potential Louvre heist scenario.

Detroit: The Unexpected Chapter in My Undermined Story

This week, I’m heading to Detroit — not for business, not for vacation, but to be interviewed about my story.
The story of Undermined, where my journey through undermined crypto became a narrative of resilience.
The story of losing everything to a crypto theft… and somehow finding purpose in the ruins.

When I first started telling this story, I never expected it to reach this far. I wasn’t trying to build a brand or become an advocate. I was just trying to make sense of what happened — to turn confusion into clarity, and pain into something productive.

But life has a way of redirecting us when we least expect it. One day you’re staring at a blank screen trying to piece together how everything fell apart — particularly in the world of crypto undermined by unexpected events — and the next, you’re packing your bags for a trip to tell that same story to people who genuinely want to listen.

Detroit isn’t just another city on my itinerary. It’s a symbol of resilience — a place that’s been broken, rebuilt, and reborn more than once. Somehow, that feels fitting, especially given how the undermined crypto industry has challenged many of us.


Lessons Learned the Hard Way

Crypto wasn’t just a hobby for me. It was a mission — a belief in decentralization, transparency, and empowerment. I believed so deeply in those principles that I put everything into it: my time, my resources, my trust.

And when it was stolen, I felt stripped of more than just digital currency.
I lost faith — not only in systems but in people. I lost the version of myself that thought I had control.

But the truth is, control is an illusion. What you really have is choice — the choice to rebuild, to keep believing, and to keep showing up even when the odds turn against you, especially after experiencing undermined crypto ventures.

That’s what Undermined became for me: a way to rebuild my own foundation, brick by brick, word by word in the aftermath of undermined crypto experiences.


Excerpt from Undermined

“When you lose something you thought defined you, you start to see what’s left underneath.

For a long time, I confused value with validation — my balance sheet with my worth.
But when the numbers disappeared, the noise did too.
What remained was me. Bruised, broke, but not broken.

And maybe that’s the hidden beauty of being undermined — it forces you to rebuild with truth instead of illusion.”

That paragraph still hits me every time I read it. I wrote it in a moment of exhaustion — a late night where I didn’t know if writing was helping or hurting. But looking back now, I realize it was the beginning of my recovery. Writing became my therapy, my way back to purpose.


The Power of Each Interaction

This interview in Detroit isn’t about spotlight or exposure — it’s about connection.
It’s about sharing a story that might help someone else recognize that their losses don’t define them either.

You never know what impact a single conversation can have, especially in contexts affected by an undermined crypto environment.
You never know who might be listening — the person in silence, the one who’s been hacked, betrayed, or written off — someone who just needs to hear that they can come back from it too.

Every conversation is a ripple. Every honest word carries energy that continues long after the cameras stop rolling or the microphones turn off.

And sometimes, it’s not even the audience you reach that matters most — it’s the reminder to yourself that you’ve survived, and you’re still standing.


Detroit and the Meaning of Resilience

Detroit has seen collapse. It’s seen decay. But it’s also seen rebirth. It’s a city that refuses to stay down — much like the people who live there, and the spirit that keeps rebuilding it.

That’s what this trip represents for me — a full-circle moment.
To share a story of loss and growth in a city that embodies both is more poetic than I could have planned.

So, here’s to Detroit — and to everyone rebuilding something invisible:
faith, confidence, trust, or peace of mind, even after facing challenges related to undermined crypto.


Closing Thoughts

I don’t know what will come out of this interview. Maybe it’s a five-minute clip. Maybe it’s a turning point. But one thing I’ve learned is this — you never know what each interaction will be, or the impact you’ll leave behind, particularly when dealing with the challenges of undermined crypto.

Maybe someone in that room will remember a line, a moment, or a feeling that changes their direction just slightly. That’s all it takes sometimes — a single spark.

I’m not chasing fame or forgiveness anymore.
I’m chasing connection — the kind that makes struggle mean something.

Detroit is just another stop on that journey…
but it might just be the most meaningful one yet.

The Value of Losing Everything (and Still Believing Anyway)

There’s a silence that follows catastrophe.
It doesn’t hit right away — first there’s adrenaline, disbelief, the frantic refreshing of pages, the desperate hope that somehow it’s all a mistake. But when the last door slams shut, and you realize it’s really gone — the silence comes. This is often a profound moment of belief and loss intertwined.

That silence is where Undermined began.

When I lost everything — the digital assets, the accounts, the trust I had in the systems I believed in — I thought I’d never recover. I had built my life around the idea that honesty and hard work were enough, that transparency would protect me, and that belief was its own form of armor.

But the truth is, belief doesn’t protect you. It tests you and also intertwines with loss.


What Was Taken vs. What Remained

When the dust settled, I realized what I’d lost wasn’t just numbers on a screen. It was trust — in people, in process, in fairness. But what remained was something the thieves could never touch: conviction.

That’s the paradox of loss — it strips away what’s temporary so you can finally see what’s permanent in the cycle of belief and loss.

In Undermined, I wrote:

“It wasn’t about the money. It never was. It was about what it represented — years of building, the proof of every hard lesson I’d learned, the belief that the work I was doing mattered. When it disappeared, it felt like my identity went with it. But in that void, I heard something new — the sound of my own voice again. Not the digital version of me. Not the public one. Just me. The human underneath the ledger.”

That voice became my compass. It didn’t point toward wealth or revenge. It pointed toward rebuilding — on my own terms this time.


Rebuilding in the Aftermath

There’s no guide for starting over after digital theft. There’s no “reset wallet” button for your life. You don’t just lose access to your funds; you lose confidence in your judgment. You question everyone — and everything.

I remember sitting there, replaying every decision I’d made. Every password. Every transaction. Every moment I trusted someone who didn’t deserve it. It’s like replaying a car crash in slow motion — you can see it coming, but you can’t stop it. This was my personal belief and loss experience.

But here’s the strange thing about starting from zero: once you’ve lost everything, you’re free.

You stop being afraid of what could be taken, because it already has been in a whirlwind of belief and loss. And that’s where real growth happens.


Belief as a Choice

For a long time, I thought belief was a feeling — that spark of optimism that things will work out. Now I see it differently. Belief is a discipline. It’s showing up every day when you don’t feel like it. It’s writing when no one’s reading. Building when no one’s investing. Holding on when everyone else cashes out.

I still believe in decentralization. I still believe in people doing the right thing, even when it doesn’t pay immediately. I still believe in DigiByte — not because it was profitable, but because it represents integrity.

DigiByte, to me, was never about the token. It was about the idea — that truth could be coded, and honesty could scale.


Faith After Fire

Loss purifies belief. It burns away the vanity, the noise, the crowd chasing profit over purpose. What’s left is quiet — but solid.

Belief after loss isn’t loud. It’s not a rally cry in a bull market or a string of hashtags. It’s the quiet conviction that you’re going to keep going, even when no one’s watching.

Because belief doesn’t need an audience. It just needs endurance.


The Real Value

If there’s one thing I learned from being undermined, it’s that the real value of losing everything is realizing you never needed it to begin with.

The identity I lost wasn’t real — it was a collection of numbers, possessions, perceptions. The identity I rebuilt was grounded in truth, not in market value.

And when you build from that kind of foundation — no one can take it from you again.

That’s what Undermined was always about. Not the theft. Not the loss.
It’s about what comes after belief is tested by loss.

Because sometimes you have to lose everything to find out what was worth keeping.
And sometimes belief isn’t about what you gain — it’s about what you refuse to let die.

When Investors Become the “Fat Pigs”

The Cambodia Crypto Fraud Case and What It Teaches Us About Trust, Tech, and Human Nature

(Inspired by the recent AP story and themes from my book, Undermined) The shocking tactics used in scams, often referred to as “pig butcher,” have been detailed in a recent AP Source →


We all think we’re smarter than the scam.
But every time a new crypto fraud story hits the news, it feels like a mirror — showing just how thin the line really is between confidence and overconfidence.

Last week’s AP News story about a Cambodian conglomerate founder charged in a $14 billion crypto fraud wasn’t just another “bad actor caught” headline. It’s a reflection of something much bigger — how trust and technology have become tools that can either build empires or destroy lives.

And if you’ve read Undermined, you already know where I’m going with this.


A billion-dollar butcher shop

Let’s start with the basics.

U.S. prosecutors say this wasn’t a quick hack or a rug pull — it was an industrial-scale operation. A mix of human trafficking, digital manipulation, and financial laundering — all under the guise of “investment opportunities.”

This is what’s called a “pig-butchering” scam.
It’s not a flattering term, but it’s accurate. Victims are “fattened up” with trust — often through long conversations, fake relationships, or months of messaging — before their savings are drained into fake crypto platforms.

And it’s not just about losing money. Many of the “scammers” themselves are victims — trafficked workers forced to con others.
That’s the part the headlines barely touch.
This isn’t just cybercrime — it’s human exploitation wearing a digital mask.


The real danger isn’t crypto — it’s confidence

Crypto gets the blame, but the real story is about people — how easily we can be manipulated when emotions enter the equation.

These scams don’t start with blockchain; they start with loneliness, curiosity, or ambition.
They use tech, but they prey on psychology.

I wrote about this in Undermined:
how in a world built on digital trust, a single false assumption — a mis-click, a fake friend, a too-good-to-be-true return — can spiral into life-changing loss.

In my own experience, I wasn’t tricked by greed — I was tricked by trust.
And that’s what makes this case hit home.
Because anyone who thinks “it could never be me” is already halfway there.


Why the Cambodia case matters

  1. It shows the scale — $14 billion isn’t a typo. This is organized crime running like a global business.
  2. It’s cross-border — crypto doesn’t care about national boundaries, and neither do criminals.
  3. It exposes the gap — regulators are sprinting to catch up to a system that evolves daily.
  4. It humanizes fraud — behind every transaction ID is someone who believed.

The term “pig-butchering” sounds cartoonish, but what’s happening is anything but.
People are trapped.
Some are trafficked into scam centers; others are trapped emotionally, waiting for their “returns” to hit a wallet that never existed.


Undermined — and the lesson that keeps repeating

When I wrote Undermined, I wasn’t just telling a story about one person losing crypto.
I was telling a story about how the system itself is undermined — how trust, transparency, and technology collide in unpredictable ways.

The Cambodia case is a modern echo of that.
The tools have changed — the platforms, the apps, the wallets — but the underlying problem hasn’t:
we keep confusing technology with trust.

Blockchain is trustless by design, but humans are not.
We still want to believe in people, projects, and promises.
That’s what makes innovation exciting — and dangerous.


What this means for the rest of us

Here’s the uncomfortable truth:
You can’t “spot a scam” by looking at code. You spot it by watching people.

If someone online:

  • Rushes trust faster than they should,
  • Promises guaranteed returns, or
  • Tries to isolate you from outside advice —

That’s not “networking.” That’s grooming.

Whether you’re sending crypto, buying NFTs, or just chatting with a “mentor,” pause and verify.
Because the next big scam won’t look like a scam. It’ll look like an opportunity — until it’s not.


Final thought

The AP article is a reminder that crypto’s future depends not just on code, but on character.
Technology can’t protect us from our own assumptions.
And if we don’t learn that lesson — the hard way, the expensive way — then the same cycle will keep repeating.

In Undermined, I wrote:

“The blockchain never lied to me — people did.”

And that’s still true today.
Whether in Cambodia or California, the scam doesn’t start in the blockchain.
It starts in the inbox.


References:

A Digital Bill of Rights

When I wrote Undermined, I wasn’t just telling my story — I was documenting what happens when your entire digital world collapses. Overnight, everything I had built online — assets, identity, security — was stripped away. This experience underlines the urgent need for a Digital Bill of Rights. I learned firsthand that the digital landscape offers innovation without protection, freedom without fairness, and technology without accountability.

That experience became more than just a personal loss; it became a mirror reflecting a larger truth: we live in a world without a Digital Bill of Rights.


The Digital Frontier Needs a Constitution

In Undermined, I called it the modern Wild West — because that’s what it is. Every day, people lose their data, identities, and digital wealth with no legal recourse and no safety net.

When America’s founders drafted the Bill of Rights, they defined the boundaries of freedom in a new world. Today, we’re standing at a similar crossroads — but this time, it’s a digital one. Our “new world” is built on code, blockchains, and interconnected systems that shape every part of our lives.

Just as the original Bill of Rights protected our physical freedoms, we now need a Digital Bill of Rights to protect our digital ones:

  • Right to Digital Ownership – What you create, store, or earn online should belong to you — permanently and provably.
  • Right to Privacy – Your data shouldn’t be tracked, traded, or weaponized without your consent.
  • Right to Security – Every platform and protocol should be built on transparency and accountability, not exploitation.
  • Right to Self-Sovereign Identity – You should control your digital identity, not rent it from big tech or governments.
  • Right to Recourse – When something goes wrong, there should be a clear, fair, and enforceable path to justice.

What Happened in Undermined Shouldn’t Be Possible

In Undermined, I describe the aftermath of losing not just cryptocurrency, but confidence — in the system, in people, and in the very idea of digital freedom. The emotional toll was immense, but the structural problem was even worse: there were no rules, no protections, and no real way back.

That’s the gap a Digital Bill of Rights would close.

Imagine a framework that ensures when a digital crime occurs, it’s treated like a real one — because it is real. Imagine being able to verify ownership of your digital property, restore stolen assets, and hold those who exploit others accountable through both law and code.

That’s what we need: not revenge, but resilience built into the system.


DigiByte: The Foundation for Fairness

The foundation for that system already exists. DigiByte represents a blockchain built on the same ideals that a Digital Bill of Rights would embody — decentralization, transparency, and security.

Unlike the centralized systems that failed me in Undermined, DigiByte doesn’t rely on trust; it relies on truth — mathematical, verifiable truth. It’s open, community-driven, and designed to protect, not profit from, the individual.

If the Bill of Rights was written on parchment to protect physical freedoms, then the Digital Bill of Rights could be written on chain — safeguarded by code, not corrupted by power.


From Undermined to Understanding

Undermined was my story of loss and recovery, but it’s also a blueprint for reform. The pain of what happened to me revealed a much larger problem — and an even bigger opportunity.

We have a chance to redefine digital freedom. To demand accountability. To create a foundation where justice isn’t an afterthought, but a built-in feature of our digital lives.

Because no one should ever have to live through what I did — alone, unprotected, and undermined.


The Call to Action

The founding fathers used ink and paper to secure our natural rights.
Now it’s our turn to use code and cryptography to secure our digital ones.

A Digital Bill of Rights isn’t just an idea — it’s a necessity. It’s the next great evolution in human liberty, built not on faith in institutions, but on verifiable trust in technology.

What happened in Undermined was a warning.
What we build next can be the solution.