A new connections app, Sonder, has a deliberately tedious sign-up process (and it’s working)
image via techcrunch.com“With the format of existing dating apps, the intention is lowering the barrier to entry and improving access, allowing for introverts to meet a bunch of people easily,” co-founder Helen Sun told TechCrunch. “Those intentions were really good at the beginning, but based on the way those apps have evolved, I think it’s become a very monotonous thing, and people are suffering from burnout because there’s a loss of authenticity.”
https://techcrunch.com/2026/04/01/a-new-dating-app-sonder-has-a-deliberately-annoying-sign-up-process-and-its-working #app #connections #dating #signUp #sonderWhen I see something remarkable, I practice thinking about the "hidden" version that we don't see.
Like, I know I meet _plenty_ of cool people but don't get to know them deeply enough to appreciate them. #Sonder
The codebase of the most popular LLM product was released by accident, so we get to audit it ourselves. And it's pretty bad.
So I think about how Microslop's GCC High system _isn't_ publicly known (nor is it to FedRAMP). I have to assume it's much worse...
re:
https://infosec.exchange/@brian_greenberg/116315152417885333
I teach cybersecurity. And I genuinely don't know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn't get it. One reviewer called the system a "pile of spaghetti pies," with data traveling from point A to point B the way you'd get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That's not a security review. That's a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable: 🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can't fully document itself 👮 "Digital escorts" often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻♂️ The scariest line in the whole ProPublica investigation isn't the "pile of shit" quote. It's this: FedRAMP determined that refusing authorization wasn't feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater. https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/ #Cybersecurity #Microsoft #FedRAMP #Leadership #RiskManagement #security #privacy #cloud #infosec
If I get an obituary and it referred to me as a "recent alum"... that's so reductive. Please remember that everyone is so much more than what text could ever say about them. #Sonder
And if it needs to be said on this topic, tbc, if I were to die anytime soon, it'd not be by my own doing, it'd be like in a "fallen off a balcony" way like https://mastodon.online/@xankarn/115938485686670041
because I've found for myself what makes this life worth living.

Attached: 1 image America has reached the “victim threw himself out the window” stage of authoritarianism. Noem has become quite the mobster.
Reading CSCW papers
Four overlapping kinds of *invisible work*:
1. work done out of view of others,
2. routine or manual work requiring judgment and skill not acknowledged,
3. work done by people who are not valued, and
4. work that is not part of anyone's job description, but critical to getting things done.
This makes me feel seen, and I try to be mindful of others' invisible work, too.