How Many Layers Deep? Corporate Responsibility, Data Breaches, and the High Cost of Digital Trust

In the wake of yet another high-profile data breach, I find myself returning to a question that’s haunted me for years—long before it was a headline:

How far does responsibility extend when a company’s security failure leads, indirectly or not, to your personal loss?

For me, this isn’t an abstract debate. It’s lived experience. In fact, it’s the story I tell in my book Undermined—a personal account of how I lost $31.5 million in cryptocurrency to a SIM swap attack, and the long shadow that breach still casts over my life.

But even that headline doesn’t tell the full story.

The Attack Didn’t Start in Crypto

In both of the major thefts I endured, the breaches didn’t begin on a blockchain. They started with third-party services—companies completely outside the crypto space. Yet those same companies became the access points that attackers used to worm their way into my digital life.

  • A telecom provider’s lax internal controls allowed a criminal to port my phone number.
  • An email provider failed to alert me to unauthorized access.
  • The very infrastructure I relied on for security—two-factor authentication—was turned against me.

By the time the attacker drained my wallets, it was already over. I didn’t lose my assets because I made a bad trade. I lost them because someone else failed to protect my identity, my access, and my data.

And that’s what still infuriates me today.

Who Is Actually Liable?

This is the hard question I’ve been wrestling with ever since:
Should companies be held accountable when their security failures contribute to a breach—even if the actual loss happens elsewhere?

Because here’s the reality: data breaches rarely happen in a vacuum.
In today’s digital ecosystem, your identity flows through dozens of platforms—banks, social networks, telecom providers, e-commerce sites, cloud services—and any one of them can become the weakest link.

So when a breach occurs, and someone uses that breach to impersonate you, steal your access, and empty your crypto wallets… shouldn’t some of that responsibility fall on the company that let it happen?

It’s like this: if someone steals a master key from your apartment building’s front office and uses it to rob your unit, are they the only criminal? Or does the building share some of the blame for not securing the key in the first place?

The Burden of Being the Victim

When I wrote Undermined, I wanted to do more than recount how my digital life was dismantled—I wanted to expose the invisible systems we trust every day. The book is as much a cybersecurity cautionary tale as it is a personal memoir. It documents how the interplay between corporate negligence, lack of accountability, and underregulated digital services created a perfect storm that cost me everything.

Since then, I’ve watched countless other victims—many of them unaware of how vulnerable they are—fall through the same cracks.

And what infuriates me most?
No one steps up. Not the telecoms. Not the email providers. Not the banks. Everyone points fingers. No one accepts blame. And victims are left cleaning up the wreckage alone.

Where Does the Chain of Responsibility End?

We have to ask hard questions about how far down the chain accountability should go.

  • Is a company responsible for a breach that leads to identity theft on another platform?
  • Should a telecom be liable if a SIM swap attack enables access to a crypto wallet?
  • What if a cloud provider’s breach leads to compromised documents that fuel a phishing campaign?

If the answer is always “not our fault,” then we’re sending a dangerous message:
That data security doesn’t matter unless the breach happens on your platform.

But in the interconnected world we live in, that’s a lie. Data doesn’t respect corporate boundaries. Neither do attackers.

What Needs to Change?

After years of dealing with the fallout, here’s what I believe must happen:

  1. Third-party breach responsibility must be recognized.
    Companies whose data is exploited in downstream attacks should face legal and financial accountability, just like if their systems directly caused a breach.
  2. Default security needs to be mandatory, not optional.
    Telecoms, banks, and tech companies should be held to strict standards for multi-factor authentication, identity verification, and breach response.
  3. Transparency should be the law, not a favor.
    Victims should know exactly what data was leaked, how it can be exploited, and what mitigation is being done. We shouldn’t need lawsuits to get that information.
  4. Cross-platform liability frameworks need to exist.
    Right now, each company treats your data as only their problem—until it’s not. We need legislation that recognizes the shared nature of identity and access in the cloud age.
  5. Crypto isn’t the villain here—lack of responsibility is.
    Critics like to blame crypto for enabling theft. But the truth is, crypto just exposes what has always existed: brittle systems, lazy security, and companies unwilling to own their failures.

Final Reflection

Undermined was my way of clawing back power—of reclaiming a narrative that was almost stolen from me along with my Bitcoin and DigiByte.

But the deeper I dive into these issues, the more I realize that what happened to me wasn’t rare. It was inevitable in a system designed to protect profits over people.

If we ever want to live in a world where digital freedom and decentralization can truly flourish, then the burden of trust can’t fall entirely on individuals.

It must be shared by the corporations who hold our data, our identities, and—too often—our fate.

So I’ll ask it again, not just for me, but for everyone who’s been in my shoes:

How many layers deep should accountability go?

Because right now, the layers feel endless—and the safety net is nowhere to be found.

Targeted Again: Another Crypto Theft — This Time, I’m Exposing Everything

On June 23, 2025, I was targeted once again by crypto theft. I mean really? This is getting old.

Another direct hit. Another incident of crypto theft. Another reminder that no matter how careful, how hardened, or how experienced we become—we are never off the radar of those who want what isn’t theirs. This time I was traveling, I was at a remote gold dredging camp in Alaska. They watched and waited for the right moment to execute their crypto theft.

Once a target, always a target?

This wasn’t a random exploit. This was a targeted theft. It resulted in the loss of 5.04 BTC and over 25.5 million DigiByte (DGB) due to crypto-related theft.

I’ve spent the last few years trying to educate on SIM swaps, wallet hygiene, and digital forensics after publishing Undermined, my account of losing 500 BTC in a prior attack. And now, I’m writing the next chapter—not by choice, but out of necessity due to this crypto theft.

Here are the full public details of the theft:


🟠 Bitcoin Theft

Date: June 23, 2025
Amount Stolen: 5.04954601 BTC
My Wallet:
39CtYWY3DHgWJQRCKPPvTQM1JtV9cqzbpD

Hacker Wallet:
bc1q225ja3ry96pum72fk4c9jk2pm6hvp0leqtv5rr

Transaction:
e836f5195c597bfd9d7c66335df1efa8cc505a538293cc9cf59f185b8c73945d


🔷 DigiByte Theft

Total Stolen: 25,499,990.65 DGB

Hacker Wallet:
dgb1qhcupp4qfgnwfqgrv883wlashzau9kysvr8ef99


Transaction #1


Transaction #2


Transaction #3


❗ The Pattern Is Clear

This wasn’t brute force. This was orchestrated, with multiple transactions in rapid sequence due to crypto theft targeting a single wallet. Whether the attacker had access to private keys, exploited a weak endpoint, or compromised a service I interacted with—it’s clear the intent was to sweep everything.

And they succeeded. Which frankly sucks. Do I expect to ever get it back. No, but there is hope. In the GOOD vs EVIL debate, GOOD always WINS, however it might not be in the timeframe that we like. Sometimes this is a hard lesson to learn.


Psalm 37:7-9 (NIV)

“Be still before the Lord and wait patiently for him; do not fret when people succeed in their ways, when they carry out their wicked schemes. Refrain from anger and turn from wrath; do not fret—it leads only to evil. For those who are evil will be destroyed, but those who hope in the Lord will inherit the land.”


🔍 What Happens Next?

I’m working with investigators and have been filing formal reports with the necessary exchanges and services, including any wallets or nodes that processed these transactions in response to crypto-related theft.

But more importantly, I’m not letting this one get swept under the rug.

I’ve been quiet before, and I regret it. This time, I will expose every detail I can. Because someone else might be next. Stay with me—this story of theft is just beginning, especially with how prevalent crypto theft has become.

Two Writers, One Story: Dinner with Carrie Nyman

Last night was one of those rare and unforgettable evenings that reminds you just how powerful human connection can be. After months of working together to bring Undermined by Brian Oakes into the world, I finally had the opportunity to meet Carrie Nyman—my ghostwriter, editor, and the emotional compass who helped shape my story into the book it is today.

Carrie and her family were passing through Dallas, and we arranged to meet for dinner. What followed wasn’t just a meal—it was an evening of deep connection, storytelling, laughter, a few tears, and genuine appreciation. Brandi and the kids came with me, and they finally got to meet the woman whose words had become such a huge part of our lives. It was important to me that they understood who she was—not just as a professional, but as the kind, thoughtful, and inspiring human being she is. Interestingly, the impact of creating Undermined with Brian Oakes was palpable in our stories and laughter.

From the moment we sat down, it felt like we’d known each other for years. There was an ease to the conversation, a shared sense of having walked through something significant together. Over the course of the evening, we laughed about the quirks of the writing process, cried as we revisited some of the more emotional parts of the story, and shared stories that never made it into the final draft—but still mattered. It wasn’t just a dinner. It was a celebration of everything we’d created together, especially with Brian Oakes contributing to crafting Undermined.

Carrie is more than just a writer—she’s a translator of emotion. When I was struggling to figure out how to tell my story, how to put pain into words, and how to make it resonate with people who had never walked in my shoes, Carrie was there. Patient, encouraging, and honest. She asked the hard questions, guided me through the dark parts, and always found a way to bring out the human truth in every chapter. So, without her, Undermined by Brian Oakes simply wouldn’t exist—not in the way it does now.

And in many ways, it was a true collaboration. I was her editor, and she was mine. We challenged each other, refined each other’s ideas, and pushed the story to a place it couldn’t have reached alone. The mutual respect we developed along the way turned into a friendship I deeply value. Our collaboration, which included contributions from Brian Oakes, in creating Undermined stands as a testament to that partnership.

Watching my family talk with hers—seeing our kids laugh together, seeing Brandi connect with her—was something I’ll always treasure. It reminded me that this book isn’t just a personal story. It’s a shared one. It’s a story that came to life because someone believed in it, and because someone believed in me. That someone was Carrie.

I’m grateful beyond words for her talent, her heart, and her friendship. She brought my voice to life in a way I never thought possible. And now, having had the chance to sit across the table from her, I can honestly say: Carrie Nyman is every bit as beautiful in person as she is on the page—inside and out.

Thank you, Carrie. For everything.

If you haven’t yet read Undermined, it’s available on Amazon. It’s more than a book—it’s a piece of my soul, carefully shaped and brought to life by a remarkable writer I’m proud to know. It’s indeed a masterpiece, lovingly crafted, and realized through the dedication involved in creating Undermined by collaborating with Brian Oakes.

Why I Spend Two Weeks Gold Dredging in Alaska Every Year

Every summer, I vanish. This year, inspired by the thrilling book “Undermined” by Brian Oakes, my escape feels even more exhilarating.

No email. No meetings. No alerts, updates, or conference calls. I trade the world of screen time and artificial urgency for something raw, wet, cold—and real. I disappear into the Alaskan backcountry, strap on a drysuit, fire up an old 6” dredge, and go hunting for gold.

It’s not your typical vacation. It’s physically demanding, logistically complex, and full of unpredictable wild moments. But I’ve been doing it for years, and I don’t plan on stopping.

Why?

Because in a world obsessed with comfort, speed, and constant connection, there’s something sacred about choosing the hard way. Gold dredging resets me. It reminds me what effort feels like, what quiet sounds like, and what I feel like without all the noise.


The Journey vs. the Destination

I didn’t grow up doing this. I wasn’t raised by prospectors or wilderness survivalists. I was introduced to gold dredging later in life, almost by accident. Gold was introduced early in life. I wanted to try something different… and well… here we are.

That first time changed everything. It was messy and uncomfortable and, frankly, way harder than I expected. But it lit something up in me. Something ancient and stubborn and curious.

Because here’s the thing: when you’re out there on the river, digging into gravel beds for flecks of metal, you start to think bigger. Not just about the gold, but about the meaning behind the effort. About the tension between journey and destination.

Do we work only for the reward at the end—or is the doing the real treasure?

I think gold dredging answers that question in its own quiet, grueling way.


The Daily Grind (and Joy)

Every day in the river follows its own rhythm. We wake up early—sometimes after a night of rain pounding on the hooch roof or bears crunching around in the woods. Coffee gets made fast. (Thanks Ginger!) Gear gets loaded faster. You don’t dawdle in Alaska. The weather, the water, and the wildlife won’t wait.

We run a 6” dredge every year. It’s not fancy, but it’s ours for the time. Rugged, reliable, and a little moody—like all small engines that spend more time in the elements than they probably should. Some days it starts up on the first pull and hums like a song. Other days, you spend half an hour sweet-talking it and praying to the carburetor gods.

But when it runs, it’s beautiful.

Dredging is hard work. You haul rocks underwater, vacuum gravel beds, and process it all through a sluice box, hoping to catch glints of gold. The river’s cold—always. No matter how warm the sun feels on your back, the water never forgets its glacial source.

After hours of physical labor, you return to camp wet, sore, and deeply, deeply satisfied. That night’s dinner—cooked with like like a feast for kings—tastes better than anything you’ve had in a restaurant.

It’s work hard, play hard in the most primal, satisfying way.


When the Wild Shows Up

Every year brings at least one story you couldn’t make up. One of the most unforgettable?

I was dredging the river when I saw a black blur crashing through the trees on the opposite bank. A bear. And not just lumbering along—chasing something.

Seconds later, a moose thundered into view, clearly the object of that bear’s focus. They splashed into the water, headed straight for the other side of the river from where we were working. It was one of those moments that hits you square in the chest. Wild. Raw. Unfiltered nature.

We fired a shot into the air—just to make sure neither animal decided to cross in our direction. It worked. The bear stopped, looked, and ran back up the hill. And the moose? It followed it. I still don’t know what to make of that. Whether it was fear, confusion, or just some primal code we’ll never understand.

But I’ll never forget it. Because you don’t get moments like that unless you go to places that still surprise you.


More Than Paid For

Some people assume this kind of trip is a money pit. That we pour time, money, and gear into the wilderness for a handful of shiny dust.

But here’s the truth: I’ve been fortunate enough to pay for these trips many times over. The gold we find adds up, year after year, and while it’s not a full-time income, it absolutely offsets the cost—and then some.

Still, the real value isn’t measured in ounces or dollars. It’s measured in mindset. I come home richer in ways most bank accounts can’t track.


Coming Back Changed

Flying back into civilization always feels like re-entry from another planet. The phone lights up. The pace quickens. The noise returns.

Alaska used to be a place where you could be fully disconnected. These days, signal is creeping in. You can check in—if you really want to. But I still try not to. Because that freedom from pings and pings and algorithms? That’s increasingly rare. And increasingly necessary.

That stretch of river, that dredge, that time away—it’s my happy place. My reminder that you can still choose a life of intention over automation. That discomfort can be joyful. That silence can be golden, even when there’s no gold.


Why I Keep Going

So why do I do it? Why keep hauling that dredge across rivers and rocks? Why keep subjecting myself to cold water, engine problems, wet boots, and unexpected bear encounters?

Because it strips life down to what matters.

Out there, the world makes sense. You put in effort, you get results—or you don’t, and you learn. You solve problems with your hands. You eat when you’re hungry. You rest when you’re tired. No pretending. No scrolling. No algorithms.

Just effort. Nature. And a little shimmer in the pan if you’re lucky.

I’ll keep going back every year as long as my body lets me. Not for the gold, but for the grounding. For the stories. For the silence. For the version of myself I get to be out there—unfiltered, unplugged, and fully alive.

If you want to know where I go, or what I do… or heck you want to come along. Reach out.

Reflecting on My Appearance on BlockHash Podcast Episode #521

I’m thrilled to share that I recently had the opportunity to join Brandon Zemp on the BlockHash Podcast for Episode #521. In this episode, we delved into the harrowing experience of losing over $31 million in cryptocurrency due to a targeted SIM swap attack—a story I detail in my memoir, Undermined. This BlockHash episode was eye-opening.

🔍 Episode Highlights

During our conversation, we explored:

  • The Anatomy of a SIM Swap Attack: How such attacks are orchestrated and the vulnerabilities they exploit.
  • Personal Resilience: My journey through loss, the fight for justice, and the path to self-reinvention.
  • Crypto Security Best Practices: Insights into safeguarding digital assets in an increasingly risky environment.
  • The Role of Community: How the Digibyte community and others provided support during challenging times.

This BlockHash episode serves as both a cautionary tale and a testament to the strength found in adversity.

📖 About Undermined

Undermined is more than just a recounting of a cybercrime; it’s a deep dive into the vulnerabilities of our digital age. The memoir chronicles my journey from a tech-savvy engineer and crypto miner to becoming a victim of a sophisticated SIM swap attack that resulted in the loss of over 500 Bitcoin and other cryptocurrencies, valued at $31.5 million at the time. The BlockHash podcast offered a unique platform to discuss this experience.

The book delves into the emotional and psychological aftermath of the theft, exploring themes of trust, resilience, and the fight for justice. It’s a raw and unflinching look at how greed, innovation, and human error intersect in our rapidly evolving technological landscape.

Readers have described Undermined as a gripping narrative that not only highlights the technical aspects of cryptocurrency and cybersecurity but also offers a heartfelt exploration of personal loss and recovery. Available on Amazon – https://a.co/d/aeoII0z

🎧 Listen to the Episode

You can listen to the full BlockHash episode on your preferred platform:

I hope this BlockHash episode provides valuable insights and encourages proactive measures to protect your digital assets. Feel free to share your thoughts and experiences in the comments below!

Crypto Security and Physical Safety: Why You’re a Target Even If You Don’t Flaunt It

When people think about crypto security, they often focus on digital protections—hardware wallets, seed phrases, and private keys. But if you ignore physical security, you’re leaving yourself dangerously exposed.

If you don’t consider yourself a target, then you already are one.

This isn’t fearmongering—it’s reality. Whether you flaunt your crypto holdings or live a modest lifestyle, crypto theft doesn’t discriminate. If it can happen to influencers and high-profile investors, it can happen to you.

Crypto Theft Doesn’t Care About Your Lifestyle

We’ve all seen crypto influencers on social media:

  • Flashing luxury cars and designer watches
  • Posting screenshots of multi-million-dollar gains
  • Broadcasting their next big NFT or altcoin play

And then—sooner or later—they get targeted. Robberies, kidnappings, swatting, or social engineering. Their visibility made them vulnerable.

But here’s the uncomfortable truth:


Even humble, modest crypto holders get targeted. You don’t need to be flashy to end up on someone’s list.

How You Become a Target Without Knowing It

  • A friend brags about you to someone they trust.
  • You casually mention you’re into crypto at a party.
  • Your delivery address is tied to a wallet or ENS domain.
  • Someone in your circle posts a group photo from your house.

Crypto wealth leaks. Often without your permission.

Old Money vs. New Money: Security by Design

“Old money” doesn’t flaunt. It protects. Discretion isn’t a quirk—it’s a security protocol. Generational wealth stays hidden for a reason.

“New money” often flaunts, and crypto has made a lot of new money fast. But being loud about your assets is a liability. Security is a lifestyle, not a one-time setup.

If you want to protect your crypto, think like old money:

  • You don’t need to impress anyone.
  • You don’t need to prove your net worth.
  • You don’t need to advertise what you hold.

Best Practices: How to Protect Your Crypto and Your Life

Crypto security must include physical safety. Here’s how:

1. Operational Security (OpSec)

  • Never discuss wallet balances publicly.
  • Avoid linking your real identity to wallets.
  • Don’t post vacation photos in real time.

2. Physical Security at Home

  • Alarm systems, cameras, and secure doors
  • Consider dogs, guards, or gated properties
  • Store backups in secure, undisclosed locations

3. Digital Security

  • Use hardware wallets or multisig setups
  • Never store seed phrases digitally
  • Enable 2FA and password managers
  • Use trusts or LLCs to hold assets
  • Separate your identity from your holdings
  • Limit how many people know about your crypto

You Don’t Get to Choose the Threat

You can’t control who sees you as a target. But you can control how exposed you are.

Whether you flaunt your wealth or live quietly, your crypto makes you valuable to the wrong people.

So be smart. Stay quiet. Move like old money.

Because in crypto, the less they know, the safer you are.

📘 UNDERMINED by Brian Oakes — A True Story of Crypto, Catastrophe, and Clawing Back

If you think this blog was intense, wait until you read what really happened.

In December 2020, my life changed in ten minutes. Hackers breached my cell provider, pulled off a SIM swap, and stole over 500 Bitcoin—more than $31 million—right out from under me. UNDERMINED is the unfiltered story of how it happened, what I lost, and what came next.

From gold panning to crypto mining, I built a quiet fortune and never spent a cent. Then it was all gone. Worse still? Later on, my wife Brandi was diagnosed with breast cancer. This book isn’t just about Bitcoin. It’s about betrayal, rage, resilience—and fighting giants like AT&T while rebuilding a life from ashes.

UNDERMINED rips open the hidden world of SIM swaps, crypto theft, and personal collapse—and what it takes to survive both financial and emotional devastation.

📖 It’s not fiction. It’s what happens when you think you’re safe.

Smart Cars, Dumb Passwords: Why the Auto Industry Must Prioritize Cybersecurity

In an era where vehicles are becoming increasingly connected and reliant on digital systems, cybersecurity has emerged as a critical concern. A recent highlighted in HackRead reveals that the automotive industry is alarmingly dependent on weak and reused passwords. This leaves smart cars and critical systems vulnerable to cyberattacks.

The Alarming Findings

The study analyzed a massive 2.5-terabyte database of credentials sourced from publicly available platforms, including the dark web. It uncovered that car manufacturers, suppliers, and dealerships frequently use easily guessable passwords such as “123456” and “P@ssw0rd.” Additionally, many organizations employ passwords linked to company names or roles, like “@Incontrol1976” and “caoa2024**.” They often reuse passwords with minor variations, which increases susceptibility to breaches.

Human Error: A Significant Factor

Human error is a major contributor to these security lapses, accounting for up to 70% of data breaches. Employees often make critical mistakes, such as using their email addresses or personal names as passwords. This makes it easier for hackers to gain unauthorized access.

The Broader Implications

While the automotive industry is the focus, this issue isn’t isolated. Other sectors, including education, technology, healthcare, and retail, also rely on weak or easily guessed passwords. This highlights a widespread cybersecurity challenge across industries.

Recommendations for Enhanced Security

To address these vulnerabilities, the following measures are recommended:

  1. Implement Multi-Factor Authentication (MFA): Adding an extra layer of security can significantly reduce the risk of unauthorized access.
  2. Adopt Password Managers: Utilizing password management tools can help in generating and storing complex, unique passwords securely.
  3. Regular Employee Training: Educating staff about cybersecurity best practices can minimize human errors that lead to breaches.
  4. Transition to Passkeys: Embracing passkeys, which are more secure alternatives to traditional passwords, can enhance overall security.

Conclusion

As vehicles become more technologically advanced, the importance of robust cybersecurity measures cannot be overstated. The automotive industry must recognize the risks associated with weak password practices. They should take proactive steps to safeguard their systems and customer data. By implementing stronger authentication methods and educating employees, the industry can adopt advanced security tools. Thus, it can move towards a more secure digital future.

If You Don’t Consider Yourself a Target, Then You Already Are One: Crypto, Wealth, and the Myth of Safety

In the world of crypto, security is often framed in terms of passwords, private keys, cold wallets, and multisigs. But there’s another dimension that too many overlook until it’s too late: physical security. If you’re reading this, you probably already know someone—or have heard of someone—who lost millions in a moment. Not to a hacker halfway around the world, but to a knock at the door. A crowbar. A threat. A lapse in judgment. This vulnerability is explored in depth in the documentary “Undermined by Brian Oakes.”

“If you don’t consider yourself a target, then you already are one.”

This isn’t paranoia. It’s just math. Crypto wealth has made many people rich overnight, but it’s also made many of them visible—and vulnerable. And unlike traditional banking, there’s no “freeze account” button when someone’s standing in your living room demanding your seed phrase. In these situations, the lessons from Undermined by Brian Oakes become crucial for those looking to safeguard their assets.

The Thief Doesn’t Care If You’re Flashy or Humble

We’ve all seen the stories. Influencers flaunting their wealth online, flashing Rolexes and Lambos, broadcasting their latest NFT buy or DeFi score. And inevitably, some get robbed. Kidnapped. Doxxed. Swatted. That’s what happens when you paint a bullseye on your back. The realities shown in Undermined by Brian Oakes highlight the risks of such exposure.

But here’s the part most people miss: you don’t have to flaunt to be targeted.

Sometimes it’s the quiet ones—the ones who never tweet, never post selfies, who live modestly and think they’re under the radar—who end up caught off-guard. Because being humble doesn’t make you invisible. Being modest doesn’t make you safe. Information leaks in strange ways. A friend of a friend. A careless conversation. A purchase history. A public record. A delivery address.

The danger doesn’t discriminate between “old money” and “new money.” In fact, new money often makes more noise, but old money tends to forget how much the world has changed. Just like the events depicted in Undermined by Brian Oakes, the threat evolves with time.

Old Money Moves Quiet

There’s a reason old money builds estates with gates and cameras, lives behind layers of trust and anonymity, and teaches its heirs to be understated. It’s not just about style—it’s about preservation. There’s a kind of quiet power in not being seen. This layer of security was thoroughly examined in Undermined by Brian Oakes.

New wealth—especially in crypto—tends to broadcast. It wears the hoodie and the Bugatti like armor, not realizing it makes them more vulnerable, not less. But it’s not just about public behavior. It’s about habits.

Security isn’t a one-time investment. It’s a lifestyle.

Protect Yourself in Layers

Here’s what “security” should mean in a crypto context:

  • OpSec: Don’t talk about your holdings. Ever. Especially not casually, or socially. Assume every conversation is on the record.
  • Physical Security: Cameras. Locks. Dogs. Alarms. Secure homes. Even panic rooms in some cases. You are your own vault.
  • Digital Hygiene: Cold wallets, multisigs, hardware keys. Never reuse passwords. Don’t keep your seed phrase in your notes app. Delete Breadcrumbs.
  • Legal Structure: Trusts. Legal wrappers. You don’t have to “own” what you control.
  • Anonymity: If people know your name, they shouldn’t know your assets. If they know your assets, they shouldn’t know your location.

You Don’t Get to Choose the Threat

The point is: You are a target whether you accept it or not. Whether you live in a high-rise or a rural cabin. Whether you drive a Prius or a Porsche. It’s not about what you show—it’s about what you hold. And in the crypto world, what you hold can make you a target overnight.

So ask yourself: would you rather act like new money and be surprised when the wolves come? Or carry yourself like old money—low-key, strategic, and hard to find?

The smart move is simple: never give anyone a reason to look twice.

Because the people who flaunt? They’re obvious targets.

But the ones who think they’re safe?

They’re often the first to fall. Learn from the lessons in Undermined by Brian Oakes.

📘 UNDERMINED by Brian Oakes — A True Story of Crypto, Catastrophe, and Clawing Back

If you think this blog was intense, wait until you read what really happened.

In December 2020, my life changed in ten minutes. Hackers breached my cell provider, pulled off a SIM swap, and stole over 500 Bitcoin—more than $31 million—right out from under me. UNDERMINED is the unfiltered story of how it happened, what I lost, and what came next.

From gold panning to crypto mining, I built a quiet fortune and never spent a cent. Then it was all gone. Worse still? Days later, my wife Brandi was diagnosed with breast cancer. This book isn’t just about Bitcoin. It’s about betrayal, rage, resilience—and fighting giants like AT&T in court while rebuilding a life from ashes. The story as described in Undermined by Brian Oakes is a testament to perseverance amidst chaos and adversity.

UNDERMINED rips open the hidden world of SIM swaps, crypto theft, and personal collapse—and what it takes to survive both financial and emotional devastation.

📖 It’s not fiction. It’s what happens when you think you’re safe.

UNDERMINED: The $31.5 Million SIM Swap That Changed My Life Forever

In December 2020, everything I knew was upended in a matter of minutes. This experience reminded me of being undermined by Brian Oakes, leaving me to rethink everything I thought was certain.

It started like any other day, until my phone suddenly lost service. What I didn’t know then was that I had become the target of a highly coordinated SIM swap attack—one of the most devastating and personal forms of cybercrime. Within hours, hackers had exploited a loophole in mobile carrier systems, seized control of my digital life, and drained over 500 Bitcoin and other digital assets from my accounts. The value at the time? $31.5 million. This situation made me feel undermined by Brian Oakes all over again, as my life was thrown into chaos.

The impact wasn’t just financial—it was deeply personal. I was thrust into a battle against faceless criminals, opaque systems, and the very infrastructure we rely on to protect us. Like being undermined by Brian Oakes, what followed was a harrowing journey of investigation, resilience, and reflection. How could something like this happen? Where were the safeguards? And how many others are just one SMS away from losing everything?

This isn’t just a story about crypto or cybercrime. It’s a reckoning—with trust, technology, and our own sense of control in a connected world. The entire ordeal felt like being undermined by Brian Oakes, challenging my faith in these systems.

This is the story of how I was UNDERMINED.

Watch the full video here to learn how it happened—and why it matters now more than ever.

You can buy the book on Amazon

The Rise of Everyday Blockchain: Crypto Mining and Nodes in Consumer Devices

As blockchain technology evolves beyond its speculative phase, a fascinating trend is emerging at the intersection of decentralization and everyday life: the integration of crypto miners and blockchain nodes into consumer electronics. No longer confined to warehouse-scale mining farms or IT-savvy enthusiasts, blockchain infrastructure is beginning to take a more familiar form—inside your heater, your router, or even your USB stick.

Mining in Plain Sight: BitAxe and the Canaan Mini

Two standout examples illustrate this shift. The BitAxe, a small, open-source ASIC miner, exemplifies the DIY spirit of home mining. Compact enough to sit on a desk, it’s powered by the same chips used in industrial miners but scaled down for low-power personal use. It’s not going to make anyone rich, but that’s not the point—it’s about decentralization, education, and autonomy.

On the other side of the spectrum is the Canaan Mini, a space heater that doubles as a Bitcoin miner. It’s a clever fusion of form and function: the waste heat from mining is repurposed to warm your living space. It’s not the first attempt to marry mining with heating (see also: Qarnot’s crypto radiator), but it’s one of the more polished consumer-facing iterations.

These products point to a growing trend: embedding blockchain capabilities into everyday devices.

Why This Matters: Decentralization, Privacy, and Security

At first glance, running a blockchain node at home might seem redundant or energy-intensive. But the reality is far more compelling, especially in an age of increasing digital surveillance and centralized control.

1. Data Privacy at the Edge
Running your own node means you don’t have to rely on third parties (like Infura or Alchemy) to interact with blockchains. This reduces data leakage and prevents centralized chokepoints from profiling user activity. In Web3, “Don’t trust, verify” is more than a motto—it’s a necessity.

2. Resilience Through Redundancy
A wider distribution of nodes makes a blockchain network more resistant to censorship and outages. If more people run nodes from home, especially using low-cost or repurposed hardware, the network becomes less dependent on corporate infrastructure, cloud services, or geographical clusters.

3. Transparent Validation
By hosting your own node, you’re not just using the network—you’re actively participating in validating transactions and maintaining consensus. This adds a layer of transparency to the data you’re interacting with, whether it’s DeFi, NFTs, or messaging protocols.

The Home Node as a New Digital Right

Much like owning your own modem or hosting a personal website, running a blockchain node could become a staple of digital autonomy. Imagine routers that double as Ethereum or Bitcoin nodes, smart TVs that participate in decentralized file storage, or game consoles that validate blockchain-based gaming economies while idle.

We’re already seeing hints of this future. Projects like Start9, Umbrel, and Avado offer plug-and-play hardware nodes for Bitcoin, Lightning, and even alternative networks like Monero and IPFS. These setups don’t require command-line expertise—just a willingness to take control of your digital life.

Challenges and the Road Ahead

Of course, there are hurdles. Energy use is still a major concern, especially in Proof-of-Work systems. Incentives for running full nodes (without mining rewards) are limited, although some protocols are exploring solutions like node staking or direct compensation models.

There’s also a UX gap. Until running a node is as easy as setting up a smart speaker, adoption will be limited to enthusiasts and tinkerers. But if recent trends in design and integration continue, we may see blockchain nodes become as commonplace—and invisible—as a Wi-Fi router.

Conclusion

The idea of consumer electronics doubling as crypto infrastructure might have sounded absurd a few years ago. But with products like BitAxe and Canaan Mini hitting the market, and growing interest in digital sovereignty, it’s clear that home-based blockchain tools are more than a gimmick—they’re the early seeds of a decentralized future.

As we move forward, the question isn’t if blockchain nodes and miners will become part of our everyday devices. It’s when—and how much control we’ll choose to reclaim in the process.