Donald Trump pardoned Andrew Paul Johnson for his role in the January 6 insurrection. Johnson then used his newly acquired freedom to sexually assault two 12-year-olds. Last week he was sentenced to life in prison as the latest of a long list of Trump insurrectionists who have used their freedom to commit new crimes.
https://www.npr.org/2026/03/05/nx-s1-5725470/trump-jan-6-pardon-sexual-abuse-prison
Reflecting on all the times in my career as a software engineer I have been told that, yes, things were a bit unfair to me as a woman, but that I was being a trailblazer, I was the one discovering and establishing the path that would enable others to follow.
But you go back to the 70s and you see the same number of women programmers, being fed that exact same line
And in the 80s
and the 90s
and so on to today. The "trailblazer" narrative is a lie told by managers to make themselves feel better
Letās get one thing straight: We are not a Christian nation. We are a nation where you are free to be a Christian.
Your religion guides you, not all of us. Itās as simple as that.
New, by me: How AI Assistants are Moving the Security Goalposts
AI-based assistants or āagentsā ā autonomous programs that have access to the userās computer, files, online services and can automate virtually any task ā are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertive new tools are rapidly shifting the security priorities for organizations, while blurring the lines between data and code, trusted co-worker and insider threat, ninja hacker and novice code jockey.
Read more (and boost please!):
https://krebsonsecurity.com/2026/03/how-ai-assistants-are-moving-the-security-goalposts/
We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists. We take this very seriously.
To be clear: Signalās encryption and infrastructure have not been compromised and remain robust. These attacks were executed via sophisticated phishing campaigns, designed to trick users into sharing information ā SMS codes and/or Signal PIN ā to gain access to usersā accounts.