<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ yaso.is - pckt ]]></title>
        <link><![CDATA[ https://yaso.pckt.blog ]]></link>
        <description><![CDATA[  ]]></description>
        <language>en</language>
        <pubDate>Thu, 23 Apr 2026 23:39:56 +0000</pubDate>

                    <item>
                <title>When you&#039;re a whole on the internet</title>
                <link>https://yaso.pckt.blog/when-youre-a-whole-on-the-internet-uy5yg9n</link>
                <description><![CDATA[Most of us exist online as a jigsaw puzzle scattered across a table. A LinkedIn profile. A Bluesky account. An old Twitter handle. A forum username from 2009. The pieces are all there, but assembling them takes work, and that friction, it turns out, has been doing a lot of social work that nobody explicitly designed. The HTTP-era internet was never built with identity coherence in mind (or, identity at all). Each service captured a slice of you independently. The result was fragmentation by acci...]]></description>
                <author>yaso.is</author>
                <guid isPermaLink="false">when-youre-a-whole-on-the-internet-uy5yg9n</guid>
                <pubDate>Sun, 19 Apr 2026 14:43:02 +0000</pubDate>
                            </item>
                    <item>
                <title>Built for Access: How Brazil&#039;s Identity System Opened a Door It Wasn&#039;t Designed to Close</title>
                <link>https://yaso.pckt.blog/built-for-access-how-brazils-identity-system-opened-a-door-it-wasnt-designed-to-close-qzye9a9</link>
                <description><![CDATA[Part 1 of 2. This piece covers the history of digital identity in Brazil and the data infrastructure that made industrial scale fraud possible. Part 2 covers how fraud co-evolves with digital infrastructure, and what that means for every country building digital infrastructure for identities today. We tend to talk about digital fraud as if it were a technology problem. A bug to patch, a model to retrain, a vendor to procure. But the deeper you look at how Brazil&#039;s identity infrastructure actuall...]]></description>
                <author>yaso.is</author>
                <guid isPermaLink="false">built-for-access-how-brazils-identity-system-opened-a-door-it-wasnt-designed-to-close-qzye9a9</guid>
                <pubDate>Wed, 25 Mar 2026 18:36:00 +0000</pubDate>
                            </item>
                    <item>
                <title>Age verification, verifiable credentials, and the privacy tension rising from the debate</title>
                <link>https://yaso.pckt.blog/age-verification-verifiable-credentials-and-the-privacy-tension-rising-from-the-debate-fq33hyp</link>
                <description><![CDATA[I left a job in March 2025 after years of engineering and researching privacy and identity at the forefront of the KYC industry, more specifically with biometrics and liveness identification. KYC is the infrastructure built to verify who someone is before granting them access to a transaction. That same year, I was invited by the Ministry of Justice (by the secretary of Digital Rights, Dr. Lilian Cintra), to join the technical committee contributing to what would become Decree 12.880, which regu...]]></description>
                <author>yaso.is</author>
                <guid isPermaLink="false">age-verification-verifiable-credentials-and-the-privacy-tension-rising-from-the-debate-fq33hyp</guid>
                <pubDate>Sat, 11 Apr 2026 22:07:07 +0000</pubDate>
                            </item>
                    <item>
                <title>Build It and They&#039;ll Come: How Fraud Co-Evolves with Digital Infrastructure</title>
                <link>https://yaso.pckt.blog/build-it-and-theyll-come-how-fraud-co-evolves-with-digital-infrastructure-dcmj23r</link>
                <description><![CDATA[Part 2 of 2. Part 1 covered the history of digital identity in Brazil and the data infrastructure that made industrial-scale fraud possible. This piece examines why fraud doesn&#039;t attack weak systems, but good ones, and what that means for every country building digital public infrastructure today. There is a pattern in Brazil&#039;s fraud history that becomes visible only in retrospect. Every major expansion of digital infrastructure, for example: pix, frictionless onboarding, facial biometrics, What...]]></description>
                <author>yaso.is</author>
                <guid isPermaLink="false">build-it-and-theyll-come-how-fraud-co-evolves-with-digital-infrastructure-dcmj23r</guid>
                <pubDate>Wed, 25 Mar 2026 21:34:57 +0000</pubDate>
                            </item>
            </channel>
</rss>