<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Matt Kollander]]></title><description><![CDATA[An eternally curious nerd obsessed with the invisible world. It's way more exciting and knowable than you'd think]]></description><link>https://writing.mattkollander.com</link><image><url>https://substackcdn.com/image/fetch/$s_!jSla!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf1e44d2-5a33-4eea-adee-2c4f9b8591fe_1280x1280.png</url><title>Matt Kollander</title><link>https://writing.mattkollander.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 13 Apr 2026 03:13:38 GMT</lastBuildDate><atom:link href="https://writing.mattkollander.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Matt Kollander]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[mattkollander@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[mattkollander@substack.com]]></itunes:email><itunes:name><![CDATA[Matt Kollander]]></itunes:name></itunes:owner><itunes:author><![CDATA[Matt Kollander]]></itunes:author><googleplay:owner><![CDATA[mattkollander@substack.com]]></googleplay:owner><googleplay:email><![CDATA[mattkollander@substack.com]]></googleplay:email><googleplay:author><![CDATA[Matt Kollander]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[COOKIE COOKIE GIVE ME A COOKIE]]></title><description><![CDATA[A trail of internet crumbs you can sweep up in five minutes]]></description><link>https://writing.mattkollander.com/p/cookie-cookie-give-me-a-cookie</link><guid isPermaLink="false">https://writing.mattkollander.com/p/cookie-cookie-give-me-a-cookie</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Wed, 08 Apr 2026 16:30:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/nFiLzbk1iqY" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-nFiLzbk1iqY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;nFiLzbk1iqY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/nFiLzbk1iqY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p>My father, Mikhael Kollander, was a massive polymath. Musician, inventor, contractor, songwriter. He reinvented himself nine times. But at his core he was a guitarist and a composer. Before he built houses in Los Angeles, before he became a general contractor, he was a musician. Capitol Records. The Fifth Dimension. Bobby Darin&#8217;s world tour. Session work across the LA studio circuit in the late 1960s.</p><p>One of the acts he played guitar for was Andy Williams. The &#8220;It&#8217;s the Most Wonderful Time of the Year&#8221; guy. The guy who defined American Christmas, before Mariah Carey rightfully ascended the throne. In the 1960s, <em>The Andy Williams Show</em> was one of the biggest variety programs on television. NBC. Prime time. Tens of millions of viewers every week.</p><p>In 1969, the show introduced a recurring character called Cookie Bear. A guy in a bear costume who walked onstage, begged for cookies, and never got any. Poor Cookie Bear. Fans loved him so much they started mailing mountains of baked goods to the actor. Meanwhile every week, Andy screamed at him: &#8220;NO COOKIES! NOT NOW, NOT EVER!&#8221; And slammed the door in his face.</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;efd97674-b8ee-43b3-9370-2ab1e5f7d9ca&quot;,&quot;duration&quot;:null}"></div><p>If only we had that level of agency in our privacy choices today.</p><p>That same year, students at Brown University started manually sending messages to other people&#8217;s computer terminals, freezing them and demanding cookies. The idea spread to MIT, where a programmer named C.D. Tavares decided to automate it. He wrote a program for Multics, an early operating system that ran on machines that filled entire rooms. The terminals were electric typewriters. No screen. Just paper rolling through a carriage. Characters printed at about 15 per second. Chunka chunka chunk.</p><p>His program printed the word <em>COOKIE</em> on your terminal. Then faster: <em>COOKIE COOKIE GIVE ME A COOKIE.</em> The only way to make it stop was to type &#8220;cookie.&#8221; What made it particularly nasty was a trick with the operating system&#8217;s alarm timer: the program could put itself to sleep and wake back up later. When you searched for it, it wasn&#8217;t running. It was hiding. Waiting. Then it came back. He named it after Cookie Bear from <em>The Andy Williams Show</em>.</p><p>Not <em>Sesame Street</em>.</p><p>Sesame Street had barely aired its first episode. But over the decades, <em>Sesame Street</em>&#8217;s Cookie Monster became the cultural reference that stuck with my fellow developer and cybersecurity nerds. But it actually started with a bear costume and my dad&#8217;s guitar :)</p><p>Tavares&#8217;s program spread to every computer running that system in the world. Including a classified installation in the Pentagon. The Pentagon knew about it. They couldn&#8217;t stop it either. It was the world&#8217;s first malware.</p><p>Today, the word &#8220;cookie&#8221; still lives in computing. Different meaning, same appetite. Except now the things that want your cookies aren&#8217;t wearing bear costumes. They&#8217;re services that auction your data to advertisers in less than a second, and criminal operations that steal it at industrial scale. Both businesses. Both profiting off you. One is legal. One isn&#8217;t. Neither asked.</p><div><hr></div><p>Imagine you&#8217;re five years old. There&#8217;s a kid at school. Not your friend. The annoying one. The one who follows you around writing everything in a little notebook. <em>Swings: three minutes. Slide: the twisty one&#8230; twice. Apple juice (not the orange). Farted during circle time and tried to pretend it didn&#8217;t happen.</em> All in the notebook.</p><p>Now imagine fifty of those kids. Following you everywhere. Every playground. Every day. For two years. And they all share notebooks.</p><p>And then you go to the other place. The one you don&#8217;t tell anyone about. Everyone has one. Even grown-ups. <em>Especially </em>grown-ups. ;)</p><p>The fifty kids follow you there too. That&#8217;s what happens when you click &#8220;Accept All Cookies.&#8221; And even when you click &#8220;Reject All,&#8221; nearly half of them keep following you anyway.</p><p>But it gets worse. The playground itself has cameras. Built into the swings. Built into the slide. Already recording before anyone asked. You agreed to them when your parents signed you up. It was in the tiny writing nobody reads. That&#8217;s what your phone apps do. Instagram. TikTok. They don&#8217;t ask about cookies. They don&#8217;t need to. The whole playground is theirs. And those cameras see everything the kids with notebooks see, plus a whole lot more.</p><div><hr></div><p>The cookie banner on almost every website releases dozens of tracking programs the moment you click it. Behind the banner is a company called a consent management platform. OneTrust and Cookiebot are the biggest ones. They handle the banner for the website. On CNN it says &#8220;Agree.&#8221; On Delta Airlines, &#8220;I understand.&#8221; The language is vague. The machinery isn&#8217;t.</p><p>When you click, the platform generates something called a TC String under the advertising industry&#8217;s consent framework. It looks like random characters. It&#8217;s a compressed permission slip that encodes your &#8220;yes&#8221; for over 1,200 individual advertising companies, one bit per company. One click. A thousand companies you&#8217;ve never heard of now have permission to follow you around.</p><p>Within about half a second, Google places a tracking file on your device that identifies you for 400 days. Meta (the company that owns Instagram and Facebook) places one through a tracking pixel. That&#8217;s a tiny invisible image embedded in the page&#8217;s code. One pixel by one pixel. Invisible without developer tools. Meta&#8217;s pixel sits on roughly half the websites in the S&amp;P 500 and a third of healthcare websites. These pixels start collecting before you even touch the banner.</p><p>Then an auction starts. Before the page finishes loading, an ad exchange packages your data and broadcasts it to dozens of companies bidding on the right to show you an ad. Google&#8217;s DV360, The Trade Desk, Amazon Advertising, and hundreds of smaller data brokers all receive your IP address, your GPS coordinates, what you&#8217;re reading, and your browsing history sliced into advertising labels: health conditions you&#8217;ve researched, financial stress signals, dating activity, and yes, those late-night searches you&#8217;d rather not explain to your boyfriend, wife, parents, or boss. ;) The auction completes in 40 to 120 milliseconds. Even the companies that lost the auction still received your data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p513!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p513!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!p513!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!p513!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!p513!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p513!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2427914,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://writing.mattkollander.com/i/192692725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p513!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!p513!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!p513!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!p513!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c28e3cb-db81-4f26-b26e-e02a9d597f52_2752x1536.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That&#8217;s what happens on a website. But the cookie banner only covers part of your day.</p><div><hr></div><p>About 62% of all web traffic is on phones and tablets. And 88% of the time people spend on their phones is in apps, not browsers. Instagram. TikTok. YouTube. Those apps don&#8217;t show you a cookie banner. They don&#8217;t need to. Cookies are a browser technology. Apps track you through something different and worse.</p><p>Each app contains roughly 18 embedded tracking programs from third-party companies, baked directly into the app&#8217;s code. Google&#8217;s Firebase is embedded in virtually every Android app that tracks user behavior. Meta&#8217;s tracking code is in roughly 20% of iOS apps. These programs access things cookies never could: your precise GPS coordinates, your accelerometer data (how you hold and move your phone), your battery level, which other apps you have installed, your network operator. Dancing. Cooking. Pooping. &#8220;Working out.&#8221; Your phone is always in your pocket. The accelerometer data alone tells a fascinating story of your life. That&#8217;s how Instagram seems to know what you talked about at dinner. It doesn&#8217;t need to listen through your microphone. It has enough data about your behavior and your device to figure it out.</p><p>Every video you watch, how long you watch, whether you pause, how fast you scroll past. The apps are free because you&#8217;re not the customer. You&#8217;re the product. The advertisers are the customers. Your identity, your habits, your browsing patterns are what&#8217;s being sold. Not the cute cat videos you fall asleep to. And not the other videos you watch when you can&#8217;t sleep, either ;)</p><p>And when you tap a link inside Instagram or TikTok, the page doesn&#8217;t open in Safari or Chrome. It opens inside the app&#8217;s own built-in browser. In 2022, a former Google engineer turned privacy researcher named Felix Krause published what he found when he looked inside those browsers. Instagram&#8217;s browser injects Meta&#8217;s tracking script into every website you visit through it, monitoring every tap on buttons, links, and images. TikTok&#8217;s browser was worse. It subscribed to every keystroke using JavaScript commands that record every key you press. Krause called it the equivalent of installing a keylogger on third-party websites. If you&#8217;ve ever entered a credit card number, a password, or your address on a page that opened inside TikTok or Instagram, the app had the technical ability to see it and record it.</p><p>If a hacker did this, they&#8217;d go to prison. TikTok does it legally because you agreed to their Terms of Service when you installed the app. <a href="https://writing.mattkollander.com/p/she-knew-exactly-what-was-wrong">You did read those, right?</a></p><p>Krause caught them. But Apple provides a tool that lets apps run injected code in a way that external analysis tools can&#8217;t see. If TikTok stopped monitoring keystrokes, we&#8217;d have no way to verify it. If they didn&#8217;t stop, we&#8217;d have no way to detect it. Whether these practices continue in 2026 is unverifiable by design.</p><p>Your phone&#8217;s privacy settings? Your ad blockers? None of them work inside that built-in browser. The app controls it completely.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tsA8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tsA8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tsA8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2127155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://writing.mattkollander.com/i/192692725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tsA8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tsA8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb57e14d-4339-4f0e-a986-6771916bff9b_2750x1536.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>You might think cookies are evil and useless. But some of those tracking files do something more important and useful than following you around. They keep you logged in.</p><p>That&#8217;s why you can close your laptop, open it tomorrow, go to Gmail, and you&#8217;re already signed in. A cookie did that. +100 for convenience.</p><p>The downside is that anyone who has a copy of that file can get into your account. No password needed. No two-factor authentication challenge. The cookie is the key.</p><p>There&#8217;s a growing industry built on stealing those files from hundreds of thousands of computers at once. The tool is called an infostealer, a virus that runs silently in the background, rummaging through your browser&#8217;s cookie storage and sending everything to a server. The virus is sold as a subscription. About $200 a month. One version called Lumma infected 394,000 computers in two months. Each victim&#8217;s stolen data sells for five to twenty-five dollars on underground marketplaces. Do the math: 394,000 victims at ten dollars each is $3.9 million with minimal effort.</p><p>They buy your stolen login, load it into their browser, and they&#8217;re in. Your email. Your bank. Your browsing history. Everything.</p><p>In 2021, someone bought a stolen cookie for $10 on an underground marketplace called Genesis. That cookie belonged to an employee at Electronic Arts, the company that makes <em>FIFA</em>, <em>Madden NFL</em>, <em>The Sims</em>, and <em>Star Wars</em> games. They imported the cookie, got into EA&#8217;s internal Slack, talked their way deeper, and stole 780 gigabytes of data including the source code for <em>FIFA 21</em>. Ten dollars. No password. No hacking. Just a cookie.</p><p>The FBI shut down Genesis in April 2023. They called it &#8220;Operation Cookie Monster.&#8221;</p><p>The 2025 Verizon Data Breach Investigations Report found that 54% of ransomware victims (ransomware is an attack that locks your files and demands payment) had their stolen credentials sitting on underground marketplaces before the attack even hit. The cookie was already stolen. The attacker was already inside.</p><div><hr></div><p>The system isn&#8217;t broken. It&#8217;s working exactly the way it was set up to work. Just not for you.</p><p>The confusion is deliberate. The five-click &#8220;Reject All&#8221; process, the tiny gray text, the in-app browser that ignores your settings. All designed to make you give up. So here&#8217;s how to fight back.</p><p>Five things. Most of them take less than a minute.</p><p><strong>1. On your iPhone:</strong> Go to Settings, then Privacy &amp; Security, then Tracking. Turn off &#8220;Allow Apps to Request to Track.&#8221; This is the single most effective privacy setting on any device. About two-thirds of people who see the prompt say no. Don&#8217;t be part of the other third. If you have a Google phone or Samsung, this setting doesn&#8217;t exist. Google doesn&#8217;t require apps to ask. So go buy yourself an iPhone. Message not sponsored by Mr. Tim Cook.</p><p><strong>2. When you tap a link inside Instagram, TikTok, or Facebook:</strong> Don&#8217;t browse inside the app. Look for the small button that says &#8220;Open in Safari&#8221; or &#8220;Open in Browser.&#8221; Tap it every time. One tap gets you out of the app&#8217;s surveillance browser.</p><p><strong>3. On a computer:</strong> Switch from Chrome to Firefox or Safari. Chrome is the last major browser that allows tracking by default. Google made $265 billion from advertising in 2024. Those trackers are what the advertising runs on. If you use Firefox, install a free extension called uBlock Origin. If you use Safari, install uBlock Origin Lite from the App Store. Same developer. Same idea.</p><p><strong>4. Use passkeys when offered.</strong> When a website lets you log in with your fingerprint or face instead of a password, say yes. A passkey is a login locked to your specific device and the specific website. It can&#8217;t be stolen, guessed, or reused. About half the top 100 websites now support them.</p><p><strong>5. Know the system.</strong> In Europe, the law requires websites to ask before tracking you. In the United States, there is no federal law that does the same thing. That banner isn&#8217;t designed to protect you. It&#8217;s designed to make you feel like you had a choice.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H9jZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H9jZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H9jZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg" width="1456" height="1807" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1807,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2725673,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://writing.mattkollander.com/i/192692725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H9jZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!H9jZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b584267-cfa8-4235-8a63-f5bd281cf633_1856x2304.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>My dad had no idea that playing guitar for a guy in a bear costume would have anything to do with your browser history. But here we are.</p><p>Every week, same bit. The bear asks nicely for a cookie. Andy screams NO. Door slam. Audience laughs.</p><p>Fifty-seven years later, the bear won. There are thousands of them now. They don&#8217;t wear costumes. They don&#8217;t ask nicely. They sit inside your apps, your browser, your phone, quietly collecting everything. And unlike Cookie Bear, they don&#8217;t take no for an answer.</p><p>But Andy Williams understood something Silicon Valley doesn&#8217;t: sometimes the right answer to &#8220;Can I have a cookie?&#8221; is to slam the door in a bear&#8217;s face.</p><p>&#128406;</p><div><hr></div><h2>Sources</h2><ol><li><p>&#8220;The Andy Williams Show,&#8221; Wikipedia. Cookie Bear played by Janos Prohaska, 1969 season. <a href="https://en.wikipedia.org/wiki/The_Andy_Williams_Show">https://en.wikipedia.org/wiki/The_Andy_Williams_Show</a></p></li><li><p>C.D. Tavares, &#8220;Origin of the Cookie Monster,&#8221; Multicians.org. IBM 2741 Selectric terminals at 134.5 baud. <a href="https://multicians.org/cookie.html">https://multicians.org/cookie.html</a></p></li><li><p>ScienceDirect (2025), &#8220;Large-scale web tracking and cookie compliance.&#8221; 43% non-compliance post-rejection. <a href="https://www.sciencedirect.com/science/article/pii/S1084804525001195">https://www.sciencedirect.com/science/article/pii/S1084804525001195</a></p></li><li><p>Infosecurity Magazine, &#8220;800% Rise in Infostealer Credential Theft.&#8221; <a href="https://www.infosecurity-magazine.com/news/staggering-800-rise-infostealer/">https://www.infosecurity-magazine.com/news/staggering-800-rise-infostealer/</a></p></li><li><p>Microsoft Security Blog, &#8220;Lumma Stealer.&#8221; 394,000+ infections, 2,300 domains seized. <a href="https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/">https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/</a></p></li><li><p>Intelligence Security, &#8220;What Are Stealer Logs?&#8221; $5-$25 per log. <a href="https://intelligencesecurity.io/en/blog/what-are-stealer-logs-infostealer-malware-guide/">https://intelligencesecurity.io/en/blog/what-are-stealer-logs-infostealer-malware-guide/</a></p></li><li><p>HTTP Archive Web Almanac 2025, Cookies chapter. <a href="https://almanac.httparchive.org/en/2025/cookies">https://almanac.httparchive.org/en/2025/cookies</a></p></li><li><p>Google, &#8220;How Google uses cookies.&#8221; <a href="https://policies.google.com/technologies/cookies">https://policies.google.com/technologies/cookies</a></p></li><li><p>ACM WWW 2023, &#8220;Facebook Web Tracking.&#8221; Meta Pixel on 18.4% of websites. <a href="https://dl.acm.org/doi/fullHtml/10.1145/3543507.3583311">https://dl.acm.org/doi/fullHtml/10.1145/3543507.3583311</a></p></li><li><p>Felix Krause, &#8220;Instagram and Facebook in-app browser tracking.&#8221; Aug 2022. <a href="https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser">https://krausefx.com/blog/ios-privacy-instagram-and-facebook-can-track-anything-you-do-on-any-website-in-their-in-app-browser</a></p></li><li><p>Felix Krause, &#8220;InAppBrowser.com.&#8221; Aug 2022. <a href="https://krausefx.com/blog/announcing-inappbrowsercom-see-what-javascript-commands-get-executed-in-an-in-app-browser">https://krausefx.com/blog/announcing-inappbrowsercom-see-what-javascript-commands-get-executed-in-an-in-app-browser</a></p></li><li><p>TechCrunch, &#8220;FBI seizes Genesis Market.&#8221; <a href="https://techcrunch.com/2023/04/05/fbi-genesis-market-seized-stolen-logins/">https://techcrunch.com/2023/04/05/fbi-genesis-market-seized-stolen-logins/</a></p></li><li><p>Adjust, &#8220;ATT opt-in rates 2025.&#8221; <a href="https://www.adjust.com/blog/att-opt-in-rates-2025/">https://www.adjust.com/blog/att-opt-in-rates-2025/</a></p></li><li><p>IAB Europe, Transparency and Consent Framework v2.3. <a href="https://iabeurope.eu/transparency-consent-framework/">https://iabeurope.eu/transparency-consent-framework/</a></p></li><li><p>Mobiloud, mobile traffic 60.5%. <a href="https://www.mobiloud.com/blog/what-percentage-of-internet-traffic-is-mobile">https://www.mobiloud.com/blog/what-percentage-of-internet-traffic-is-mobile</a></p></li><li><p>Mobiloud, 88% app time. <a href="https://www.mobiloud.com/blog/mobile-apps-vs-mobile-websites">https://www.mobiloud.com/blog/mobile-apps-vs-mobile-websites</a></p></li><li><p>UPenn / Big Data &amp; Society. ~18 SDKs per app. <a href="https://pricelab.sas.upenn.edu/events/super-sdks">https://pricelab.sas.upenn.edu/events/super-sdks</a></p></li><li><p>HP Wolf Security, EA breach via Genesis Market cookie. <a href="https://threatresearch.ext.hp.com/tracing-the-rise-of-breaches-involving-session-cookie-theft/">https://threatresearch.ext.hp.com/tracing-the-rise-of-breaches-involving-session-cookie-theft/</a></p></li><li><p>Verizon 2025 DBIR. 54% pre-attack credential exposure. <a href="https://www.verizon.com/business/resources/reports/dbir/">https://www.verizon.com/business/resources/reports/dbir/</a></p></li><li><p>Descope, &#8220;2025 FIDO Report.&#8221; 48% passkey support among top 100 sites. <a href="https://www.descope.com/blog/post/2025-fido-report">https://www.descope.com/blog/post/2025-fido-report</a></p></li><li><p>Alphabet Inc., Q4 2024 Earnings (SEC Form 8-K). Google advertising revenue $264.6B in fiscal year 2024. <a href="https://www.sec.gov/Archives/edgar/data/1652044/000165204425000010/googexhibit991q42024.htm">https://www.sec.gov/Archives/edgar/data/1652044/000165204425000010/googexhibit991q42024.htm</a></p></li></ol>]]></content:encoded></item><item><title><![CDATA[She Knew Exactly What Was Wrong. She Couldn't Say a Word]]></title><description><![CDATA[Incentives, dying in line, and pizza that tastes like cardboard]]></description><link>https://writing.mattkollander.com/p/she-knew-exactly-what-was-wrong</link><guid isPermaLink="false">https://writing.mattkollander.com/p/she-knew-exactly-what-was-wrong</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Thu, 19 Mar 2026 23:36:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/W0f1RsoOS18" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-W0f1RsoOS18" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;W0f1RsoOS18&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/W0f1RsoOS18?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><p><em>&#8220;It is difficult to get a man to understand something, when his salary depends upon his not understanding it.&#8221;</em></p><p>&#8212; Upton Sinclair</p><p>A doctor friend told me over dinner that a colleague she works closely with was struggling with something that was creating risk of injury for patients. She&#8217;d been quietly stepping in. Covering. Handling it, because handling it was the right thing for the patient in the moment.</p><p>What left her deeply unsettled was that every option for what to do next would punish her for trying. She could go to HR, but HR exists to manage the institution&#8217;s liability, not to help two professionals figure out a patient safety problem. She could say something directly, but the colleague&#8217;s employment structure has its own protections, and the person who reports a colleague becomes the difficult one. Now your name&#8217;s on a file. Now your next review has an asterisk that could get you fired. So she&#8217;s likely to continue covering. It&#8217;s the best she can do under the circumstances, despite the risk to the patient and to herself. The institution that pays her isn&#8217;t set up to do what all doctors literally swear to: protect patients. It&#8217;s set up to protect itself. The practitioners, and the system that pays them, have conflicting goals.</p><p>That night, I stayed up until 4am doing research.</p><p>The federal Agency for Healthcare Research and Quality has tracked hospital safety culture across thousands of U.S. hospitals for over two decades. Their finding is consistent: hospitals where staff fear blame for raising problems have measurably worse patient outcomes [1].</p><p>In one controlled trial, hospital units that trained staff to speak up about safety concerns saw adverse outcomes drop 37%. Units that didn&#8217;t saw them rise 43%. More medication errors. More hospital-acquired infections. More patients dying [1].</p><p>Not because the doctors and nurses don&#8217;t care. Because the unavoidable math my friend did at our dinner table is the same math being done in every hospital in the country. And when that math runs at institutional scale, the consequence is loss of life.</p><p>At the Carl T. Hayden VA Medical Center in Phoenix, administrators kept two sets of books. When veterans called to request primary care, their names went on unofficial paper lists held in desk drawers. Only when a slot opened within the VA&#8217;s 14-day performance target did the name get moved to the official electronic system. The facility reported average wait times of 24 days. The VA Inspector General found veterans actually waited nearly 115 days [2].</p><p>The structural motivation wasn&#8217;t complicated. Wait-time performance was tied directly to bonuses and evaluations at every level, from the schedulers entering data to the senior leaders reviewing it. The VA paid $2.8 million in bonuses to senior executives that year. Every single one of the facility&#8217;s 470 senior managers received a &#8220;fully successful&#8221; performance review. The institution had figured out what it was being measured on, and gamed it. Not for the veterans on the other end of the phone. For the metric. Investigators found 1,700 veterans at Phoenix alone who had requested care and were never placed on any official list at all. Some of them died waiting.</p><p>Thomas Breen was 71. Navy veteran. He arrived at the Phoenix VA in September 2013 with blood in his urine and a history of cancer. He was told there was a seven-month waiting list. He died of bladder cancer two months later. The VA called on December 6th to schedule his appointment. He had been dead for six days [2].</p><p>The VA kept the real wait times in desk drawers. Clean numbers went into the official system. My industry has its own version of that drawer.</p><div><hr></div><h3>Accepted Exceptions, Security Be Damned</h3><p>There&#8217;s something most people in corporate cybersecurity understand and almost nobody will admit to, because it can get you fired: the job isn&#8217;t protection. The job is liability management.</p><p>Compliance checklists. Audit trails. Certification frameworks that exist so an organization can point to documentation when something goes wrong. Not so that something doesn&#8217;t go wrong. The structure is built for the aftermath. Pass the audit. Satisfy the assessor. Get the certificate on file. The calendar turns. Do it again next year.</p><p>I&#8217;ve sat through enough security audits to know how they actually work. When an assessment finds a vulnerability, the organization has a formal process for keeping it open. It&#8217;s called an exception. Someone writes a sentence in a spreadsheet explaining why the risk is acceptable. The auditor notes the exception. The assessment passes. The vulnerability remains. It&#8217;s not a flaw in the process. It is the process. Real risks, documented in obscure cells on a spreadsheet nobody outside the security team will ever read. Clean certification on the wall. Same drawer. Different filing cabinet.</p><p>Verizon&#8217;s forensic team has been analyzing breach investigations for over a decade. The pattern they&#8217;ve found is worth sitting with: they have never once identified a breached company that was fully compliant at the time it was hit [3]. Not once.</p><p>Equifax held ISO 27001 certification, the international gold standard for information security management. Companies spend months preparing for that audit. EY, one of the Big Four accounting firms, signed off on it. Equifax also held two additional security certifications. Three of the most rigorous in the industry, all active, all current. Meanwhile, a known vulnerability in their web application software had a patch available. Nobody applied it for two months. Nobody&#8217;s bonus depended on applying it. Someone&#8217;s depended on passing the audit.</p><p>Attackers operated inside Equifax&#8217;s systems for 78 days without being detected. An expired security certificate had knocked their network monitoring tools offline for 19 months. The tools that would have caught the intrusion weren&#8217;t running. 147.9 million Americans had their Social Security numbers exposed. The House Oversight Committee called the breach &#8220;entirely preventable.&#8221; The Canadian Privacy Commissioner was more direct: it was &#8220;not reasonable,&#8221; the Commissioner wrote, to rely on the certification &#8220;as assurance of adequate security&#8221; when the company&#8217;s own internal tests had already identified the problems [4].</p><p>This pattern goes back at least to 2013, when Target was certified compliant on the payment industry&#8217;s own security standard two months before a breach that cost $200 million and ended the CEO&#8217;s career [5]. It&#8217;s still happening: in 2024, Change Healthcare, the company that processes roughly half of all medical claims in the United States, was breached through a login screen that didn&#8217;t require a second verification step beyond a password. $2.457 billion in damages so far. 192.7 million people affected [6].</p><p>My friend&#8217;s hospital, the VA, Equifax, Target, Change Healthcare. Different industries. Different stakes. Same structure. The institution claims to do one thing. It&#8217;s set up to reward another. The people it&#8217;s supposed to serve don&#8217;t know to ask which is which. And the people inside who do know have done the math on what happens if they speak up.</p><div><hr></div><h3>What Happens When the CEO Admits the Pizza Tastes Like Sh*t</h3><p>Domino&#8217;s Pizza, late 2009. Stock at $2.83 a share. Same-store sales down nearly 5%, seven times worse than the industry average. In consumer taste tests, tied for dead last with Chuck E. Cheese. The company claimed to make good pizza. It was set up to deliver the cheapest possible ingredients as fast as possible. Every customer knew it. The company knew every customer knew it [7].</p><p>What happened next is still one of the strangest things a public company has ever done. Domino&#8217;s took its own internal focus group footage, customers calling the pizza &#8220;cardboard&#8221; and &#8220;the worst I ever had,&#8221; and aired it on national television. CEO Patrick Doyle didn&#8217;t spin it. He said the product was bad. Then the company reformulated the entire recipe from scratch, changed every ingredient, and retrained 180,000 employees across 9,000 franchise locations [7].</p><p>Revenue jumped 14.3% the next quarter. The stock rose 130% in 12 months. Domino&#8217;s eventually overtook Pizza Hut to become the largest pizza chain in the world. By 2018, David Chang was featuring Domino&#8217;s on his Netflix show <em>Ugly Delicious</em> and telling Stephen Colbert it was great pizza. A two-Michelin-star chef, ordering Domino&#8217;s on camera. The stock didn&#8217;t rise because the CEO was brave. It rose because he closed the gap between what the company claimed and what it was actually set up to do [7].</p><p>To be fair, there&#8217;s a version of this story that goes the other direction. Everlane, the clothing company, trademarked the phrase &#8220;Radical Transparency&#8221; and published cost breakdowns on every product. Growth was extraordinary. The company raised money at a $250 million valuation, positioning itself as a future billion-dollar brand. But the transparency was only on the price tags. Underneath, the company was set up for the same things every fashion brand is set up for: low labor costs, fast growth, maximum margins. When employees tried to unionize in 2020, the gap became visible. Leadership discouraged the union, claiming it would &#8220;reduce transparency.&#8221; Former employees published a seven-page manifesto documenting racial discrimination. The New York Times headline: &#8220;Everlane&#8217;s Promise of &#8216;Radical Transparency&#8217; Unravels.&#8221; The company took on debt to cover inventory, cycled through CEOs, and by 2024 revenue had slid to a fraction of expectations and was still shrinking [8]. The union didn&#8217;t cause the decline. The decline happened because the brand&#8217;s promise and the company&#8217;s actual priorities were never aligned. You can&#8217;t slap a transparent label on top of business as usual and expect it to hold.</p><div><hr></div><h3>The Most Transparent Industry Nobody Trusts</h3><p>The day after dinner, I went on a dog walk with my cousin. He&#8217;s a property and casualty insurance producer. He&#8217;d been listening to me go on about all of this, and he said something like: &#8220;I mean, at least in my line of work, it&#8217;s all spelled out clearly. Here&#8217;s what&#8217;s covered. Here&#8217;s what isn&#8217;t. Here&#8217;s the number. You signed it.&#8221;</p><p>Then he dared me to go read my own homeowners policy.</p><p>I pulled it up on my phone that night, sitting on the couch with the dog asleep on my feet.</p><p>Everything covered was listed. Everything excluded was listed. The dollar limits were explicit. The conditions under which a claim pays out were written down. Just a contract that said exactly what it would do, what it wouldn&#8217;t, and what it would cost.</p><p>The policy I&#8217;d been ignoring for three years was more readable than the terms I&#8217;d agreed to that morning to update an app on my phone. That&#8217;s not a figure of speech. When researchers tested readability across 17 different types of consumer contracts, auto insurance policies scored at a 9th-grade reading level. The most readable of any category. Credit card agreements hit 12th grade. Tech terms of service required a college education [9].</p><p>Insurance got this way because nobody trusts it. Accenture surveyed 49,000 consumers across 33 countries in 2023. Only 39% believe insurance companies have their best interests at heart [10]. That deep, persistent distrust is exactly what produced fifty years of regulation requiring clarity. Of 776 plain-language laws in the United States, 209 of them, 42%, govern insurance documents. Banking has 41. Healthcare has 23 [11]. Lawmakers looked at the insurance industry and said: we don&#8217;t trust you to be clear on your own, so we&#8217;re going to make you.</p><p>The industry fought it. Industry representatives warned regulators that changing readability standards would lead to &#8220;unintended consequences&#8221; and &#8220;new litigation.&#8221; For decades, insurers resisted every layer of consumer protection regulation that was imposed on them. And then the most regulated consumer-facing industry in the country became one of the most stable and consistently profitable.</p><p>We trust our doctors. We trust &#8220;the IT guy.&#8221; Whether someone is in cybersecurity, networking, software engineering, or desktop support, they&#8217;re all &#8220;the IT guy&#8221; to most people, and we assume they&#8217;ve got it handled. That trust is what allows medicine and cybersecurity to stay opaque. Nobody&#8217;s demanding that hospital safety reports be written at a ninth-grade reading level. Nobody&#8217;s asking to read the exceptions spreadsheet from the last security audit. We just trust that the specialists are doing what they say they&#8217;re doing.</p><p>The least trusted industry produced the most transparent document. The most trusted institutions hide the truth in desk drawers and spreadsheet exceptions.</p><p>There&#8217;s a complication, though. Trusted Choice found that 86% of homeowners say they feel confident they understand their coverage. When actually tested on basic questions about their own policy, only 29% passed [12].</p><p>The transparency is in the document. It always has been. It&#8217;s sitting in your email or your filing cabinet right now. It says exactly what will and won&#8217;t happen if your house floods, your roof caves in, your kitchen catches fire. But nobody sat down with you and walked you through it. The agent who sold you the policy earned a commission when you signed. After that, the incentive to make sure you actually understood what you bought disappeared.</p><p>Domino&#8217;s didn&#8217;t just admit the pizza was bad. They changed everything about how the company operated and made the honesty impossible to miss. The insurance industry was forced into writing the clearest consumer contract in America, and it became one of the most stable and profitable industries in the country. But the clarity stops at the document. Nobody, to my knowledge, has bothered to close that last gap.</p><div><hr></div><h3>The Question</h3><p>People treat medicine, cybersecurity, and insurance like dark arts. Best left to the specialists. &#8220;The IT guy has it handled.&#8221; I&#8217;ve been the IT guy for twenty years. None of these fields are actually dark arts. They all dissolve into logic once you understand them. The VA&#8217;s wait-time system is a bonus structure. A security certification is a spreadsheet full of accepted exceptions. An insurance policy is a contract written at a ninth-grade reading level that says exactly what it will and won&#8217;t do.</p><p>The difference isn&#8217;t complexity. It&#8217;s incentive. The fields that stay opaque do so because it&#8217;s useful. Nobody questions the system when they assume only the specialists can understand it. The one industry that got forced into clarity got there because nobody trusted it enough to leave it alone.</p><p>If you run a team, a department, a company: what does your last performance review actually reward? If someone on your team saw a problem tomorrow and did the math on what happens if they name it, would they say something? Or would they do what my friend did at dinner: care about three things at once and stay quiet?</p><p>&#128406;</p><div><hr></div><h4>Sources</h4><p>[1] Agency for Healthcare Research and Quality, Hospital Survey on Patient Safety Culture. AHRQ has administered this survey across thousands of U.S. hospitals since the early 2000s, tracking whether staff feel they&#8217;ll face blame for reporting errors or near misses. Hospitals with punitive cultures consistently show lower near-miss reporting rates, which the research associates with worse patient outcomes over time. The controlled trial finding (37% decrease in adverse outcomes in trained units vs. 43% increase in controls) is from Weaver et al. (Annals of Internal Medicine, 2013), a systematic review commissioned by AHRQ that included 33 studies; the specific trial was a cluster-randomized controlled study showing team training&#8217;s impact on adverse outcome scores. The association between punitive cultures and increased medication errors, hospital-acquired infections, and mortality is documented across multiple systematic reviews: Braithwaite et al. (BMJ Open, 2017) reviewed 62 studies and found 74% reported positive associations between safety culture and patient outcomes including reduced mortality, infections, and medication errors; Vikan et al. (BMC Health Services Research, 2023) found 76% of 34 studies showed reduced adverse events where safety culture scores were higher. AHRQ is a federal agency inside the U.S. Department of Health and Human Services. Not commercially sponsored. <a href="https://www.ahrq.gov/sops/surveys/hospital/index.html">AHRQ Hospital Survey</a>.</p><p>[2] VA Office of Inspector General, Interim Report (No. 14-02603-178, May 28, 2014) and Final Report (No. 14-02603-267, August 26, 2014). The Phoenix investigation found the dual record-keeping system, the 115-day actual wait time versus 24-day reported time, and 1,700 veterans never placed on official lists. Thomas Breen&#8217;s case is documented in the OIG report and corroborated by House Committee on Veterans&#8217; Affairs hearing testimony (September 17, 2014). The $2.8 million in senior executive bonuses and the 470 senior managers receiving &#8220;fully successful&#8221; ratings are from Rep. Jeff Miller&#8217;s statement at the House Committee on Veterans&#8217; Affairs (June 2014) and confirmed by CNN reporting. The VA&#8217;s own audit concluded that &#8220;some front-line, middle, and senior managers felt compelled to manipulate&#8221; records to meet performance goals. Schedulers were told by supervisors to &#8220;fix&#8221; appointments exceeding the 14-day target. Sharon Helman, the Phoenix VA director, received an $8,500 bonus that was later rescinded. A VA nationwide access audit (June 9, 2014) found 70% of VA facilities used unofficial wait lists. An important caveat on causation: the OIG used a standard requiring investigators to &#8220;conclusively assert&#8221; that delay caused death rather than underlying disease. Medical experts called this threshold &#8220;virtually impossible to meet.&#8221; The finding is that veterans died while waiting for care they never received, not that delayed care was the sole cause of death in every case. <a href="https://www.vaoig.gov/reports/audit/review-alleged-patient-deaths-patient-wait-times-and-scheduling-practices-phoenix-va">VA OIG Reports</a>.</p><p>[3] Verizon Payment Security Report, 2024. Verizon&#8217;s Qualified Security Assessor practice has analyzed PCI DSS compliance data across breach investigations for over ten years. The finding that no breached company was fully compliant at the time of breach has held across every edition. Former Visa Chief Enterprise Risk Officer Ellen Richey corroborated this independently in 2018. One important nuance: this means breached companies had drifted out of compliance by the time they were hit, not that compliance itself is useless. The annual-audit-and-drift pattern is the core observation. Verizon sells compliance assessment services, which is worth knowing. <a href="https://www.verizon.com/business/reports/payment-security-report/">Verizon Payment Security Report</a>.</p><p>[4] House Committee on Oversight and Government Reform, &#8220;The Equifax Data Breach&#8221; (December 2018, 96 pages). The &#8220;entirely preventable&#8221; finding is the Committee&#8217;s headline conclusion. The Canadian Privacy Commissioner&#8217;s finding is from PIPEDA Report of Findings 2019-001, which explicitly states that reliance on ISO 27001 certification was &#8220;not reasonable&#8221; given that the company&#8217;s own penetration tests had identified noncompliant practices. Equifax issued a statement disagreeing with &#8220;many of the factual findings&#8221; in the House report. The 300 expired certificates, including 79 on business-critical domains, is from the House report. The $575-700 million FTC/CFPB/state settlement was reached in July 2019, with total breach costs estimated around $1.38 billion. <a href="https://oversight.house.gov/report/committee-releases-report-revealing-new-information-on-equifax-data-breach/">House Oversight Equifax Report</a>. <a href="https://www.priv.gc.ca/en/opc-actions-and-decisions/investigations/investigations-into-businesses/2019/pipeda-2019-001/">Canadian Privacy Commissioner Finding</a>.</p><p>[5] Senate Committee on Commerce, Science, and Transportation, &#8220;A &#8216;Kill Chain&#8217; Analysis of the 2013 Target Data Breach&#8221; (March 26, 2014). Target CFO John Mulligan confirmed the PCI DSS certification timeline in testimony before both the Senate Judiciary Committee (February 4, 2014) and Senate Commerce Committee (March 26, 2014). The $200 million figure is from Target&#8217;s SEC filings, which also include an $18.5 million multistate attorney general settlement (May 2017). Trustwave, the assessor, disputed the scope of its engagement. The finding here is structural: the certification framework failed to catch the vulnerability that was actually exploited. <a href="https://www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883">Senate Kill Chain Report</a>.</p><p>[6] Change Healthcare breach, 2024-2025. Change Healthcare (a UnitedHealth Group subsidiary) disclosed the breach in February 2024. The attack was attributed to the ALPHV/BlackCat ransomware group. HITRUST certification status was reported by multiple cybersecurity outlets. The $2.457 billion cost through Q3 2024 is from UnitedHealth Group&#8217;s SEC filings (quarterly earnings reports). The $22 million ransom payment was confirmed by UnitedHealth CEO Andrew Witty in April 2024. The 192.7 million affected individuals figure comes from Change Healthcare&#8217;s notification to HHS Office for Civil Rights. The $6 billion in advance funding to healthcare providers is from UnitedHealth Group&#8217;s disclosures. Change Healthcare&#8217;s role in processing approximately half of U.S. medical claims is from the Congressional Research Service. <a href="https://www.congress.gov/crs-product/IN12330">CRS Report IN12330</a>. <a href="https://www.sec.gov/edgar/search">UnitedHealth Group SEC Filings</a>.</p><p>[7] Domino&#8217;s Pizza turnaround: all financial figures from Domino&#8217;s SEC filings. Stock price of $2.83 and same-store sales decline from Q4 2009 10-Q. The dead-last tie with Chuck E. Cheese in taste tests is from a 2009 consumer survey widely reported at the time, including in the company&#8217;s own turnaround documentary. The &#8220;Pizza Turnaround&#8221; campaign launched in December 2009 with a four-minute documentary posted to YouTube showing real focus group footage and CEO Patrick Doyle&#8217;s response. Revenue increase of 14.3% from 2010 annual report. The 130% stock rise within 12 months is calculated from market data. The 180,000 employees and 9,000 franchise locations are from Domino&#8217;s corporate disclosures at the time. Domino&#8217;s overtaking Pizza Hut is from industry reporting (QSR Magazine, Nation&#8217;s Restaurant News). David Chang&#8217;s Domino&#8217;s advocacy appeared in the first episode of <em>Ugly Delicious</em> (Netflix, 2018). He told Stephen Colbert on <em>The Late Show</em> (May 2018) that he grew up eating Domino&#8217;s and his taste hasn&#8217;t changed. Chang holds two Michelin stars through his Momofuku restaurant group. <a href="https://www.sec.gov/edgar/search">Domino&#8217;s SEC Filings</a>. <a href="https://www.youtube.com/results?search_query=domino%27s+pizza+turnaround+2009">Pizza Turnaround Documentary on YouTube</a>.</p><p>[8] Everlane: the $250 million valuation and billion-dollar brand trajectory are from Business of Fashion reporting. The unionization timeline, HR emails discouraging organizing, and employee manifesto were reported by The New York Times (&#8220;Everlane&#8217;s Promise of &#8216;Radical Transparency&#8217; Unravels,&#8221; 2020), Vice, and Fast Company. CEO Michael Preysman acknowledged to Business of Fashion: &#8220;The brand externally had such a lofty ambition and we didn&#8217;t live up to it internally.&#8221; The company took on debt to cover inventory in 2022 (Business of Fashion, February 2024). Revenue decline and continued contraction reported by Business of Fashion (July 2025), citing a person with direct knowledge. <a href="https://www.nytimes.com/2020/07/26/fashion/everlane-employees-ethical-clothing.html">NYT: Everlane&#8217;s Radical Transparency Unravels</a> (may require subscription). <a href="https://www.businessoffashion.com/articles/direct-to-consumer/everlanes-new-ceo-talks-about-growth-strategy/">Business of Fashion Everlane Coverage</a> (may require subscription).</p><p>[9] MoneyGeek readability analysis, approximately 2022-2023 (original article no longer available at moneygeek.com; methodology and findings corroborated by syndicated coverage and consistent with Benoliel and Becher's independent findings). Tested 17 contract types across financial services and technology using eight readability algorithms. Auto insurance scored 9.80 grade level (most readable); credit cards 10.10; health benefits summaries 10.75; tech terms of service 12.02. MoneyGeek is a commercially sponsored insurance comparison site, which is worth noting. However, the findings align with independent academic research: Benoliel and Becher (Boston College Law Review, 2019) tested 500 major website contracts and found 498 of 500 required 14+ years of education to read. Insurance, particularly auto and property, sits meaningfully below these benchmarks. Health and life insurance score worse (grade 11-13 range), which is an honest limitation of the broader claim.  <a href="https://bclawreview.bc.edu/29/volume/60/issue/2">Benoliel &amp; Becher, Boston College Law Review</a>.</p><p>[10] Accenture Global Insurance Consumer Study 2023, &#8220;People Before Policies.&#8221; Survey of 49,000 consumers across 33 global markets. The trust figure has been declining: confidence in insurers&#8217; data stewardship dropped from 40% in 2019 to 32% in 2021. Accenture consults for insurers and has a commercial interest in findings that recommend transformation. The scale of the study and the consistency of the trend across two survey cycles make it credible even accounting for that. <a href="https://www.accenture.com/us-en/insights/insurance/consumer-study-insurance-people-before-policies">Accenture Insurance Consumer Study</a>.</p><p>[11] Blasie, Michael. United States Plain Language Laws. Published in the University of Miami Law Review (2022) and expanded as a Wolters Kluwer reference (2023). First nationwide empirical survey of plain-language laws, using systematic Westlaw searches across all 50 states, DC, and federal law. Identified 776 total laws; 209 (42%) govern insurance documents. Funded by the Association of Legal Writing Directors. Not commercially sponsored. Industry resistance to readability regulation: David Snyder, VP and associate general counsel for the American Insurance Association, urged regulators to &#8220;tread carefully&#8221; and warned that changes &#8220;could lead to unintended consequences such as igniting new litigation&#8221; (InsuranceNewsNet, reporting on NAIC Consumer Connections Working Group testimony). The broader history of industry resistance to consumer protection regulation is documented in the Congressional Research Service report on insurance regulation (R44046), which describes &#8220;the largely united industry resistance to federal intervention in insurance&#8221; across multiple decades. <a href="https://lawreview.law.miami.edu/">Blasie, University of Miami Law Review</a>. <a href="https://insurancenewsnet.com/oarticle/NAIC-Takes-on-Readability-of-Insurance-Policies-a-175751">InsuranceNewsNet NAIC Readability Coverage</a>. <a href="https://www.congress.gov/crs-product/R44046">CRS Insurance Regulation Report R44046</a>.</p><p>[12] Trusted Choice / Big &#8220;I&#8221; homeowners insurance awareness survey, June 2024. 400 consumers surveyed via Mfour Data Research. 86% claimed &#8220;strong understanding&#8221; of their policies. When tested: 56% didn&#8217;t know standard homeowners policies exclude floods, 70% didn&#8217;t know renovation materials aren&#8217;t covered. Only 29% passed. Trusted Choice is the consumer brand of the Independent Insurance Agents and Brokers of America, the trade association for independent agents. Their interest in findings that demonstrate the need for agents is obvious. A Guardian Service survey (2025, 2,000 homeowners via Pollfish) found a nearly identical pattern: 85% confident, 31% failed entirely. Kaiser Family Foundation (2023, independent and nonprofit) found 65% of insured adults with denied claims reported difficulty understanding what their coverage covers. <a href="https://www.trustedchoice.com/">Trusted Choice</a>. <a href="https://www.kff.org/health-costs/issue-brief/americans-challenges-with-health-care-costs/">KFF Consumer Experience Data</a>.</p>]]></content:encoded></item><item><title><![CDATA[She Thought She’d Lose Her Job. Instead, They Promoted Her]]></title><description><![CDATA[How a quiet family acquisition opened my eyes to the $5 trillion opportunity nobody in tech is talking about]]></description><link>https://writing.mattkollander.com/p/she-thought-shed-lose-her-job</link><guid isPermaLink="false">https://writing.mattkollander.com/p/she-thought-shed-lose-her-job</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Thu, 05 Mar 2026 06:38:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a07fdd91-f050-4155-80b5-5b34154d86c0_1536x868.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-Rb5fbXRzljY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Rb5fbXRzljY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Rb5fbXRzljY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>I&#8217;ve spent twenty years in tech, building internet backbones, real-time voice and video, cybersecurity, and product leadership. For the bulk of that time, I assumed there were two career paths available to an MBAless nerd such as myself. Stay at a big company and collect a paycheck. Or go start something from scratch, raise money, get acquired, maybe get rich&#8230; or maybe go bankrupt. Those were the options. Everyone around me seemed to agree.</p><p>We had confirmation bias baked in. If you work at a large company, you watch acquisitions come in the door. Startups get bought. Founders cash out. And you sit there thinking: <em>that&#8217;s the move.</em> I should be on the other side of that deal. Build something, sell it, rinse, repeat.</p><p><strong>The numbers on that dream are not great.</strong> About half of all new businesses fail within five years, according to the Bureau of Labor Statistics. For venture-backed startups, it&#8217;s worse: three out of four never return a dollar to investors<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>. You don&#8217;t hear those stats at tech happy hours. You only hear the drumbeat of the survivors.</p><p>While I was absorbing all of this as gospel, something completely different was happening in my own family.</p><div><hr></div><h3>Christine</h3><p>My sister Christine was managing the books at a small ecommerce company. Good business, profitable, been around for years. Then the owner decided to retire. He was part of an enormous wave that&#8217;s still barely begun. McKinsey published a report last week saying six million small businesses will need new owners by 2035, collectively worth up to five trillion dollars. And right now, <strong>92% of small business exits end in the owner just... shutting it down</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a><strong>.</strong> Locking the door. Employees lose their jobs, the owner walks away with nothing after decades of work, and some buyer out there never even knew the opportunity existed<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>. Not because anything was wrong with the business. Nobody showed up.</p><p>So a family-run company bought Christine&#8217;s employer. Not a PE fund. Not a VC-backed roll-up. A family that buys and operates small businesses: service franchises, ecommerce, that kind of thing. Quiet, extremely profitable, putting all of their kids through school and beyond. Nobody&#8217;s ever heard of them.</p><p>Christine figured she&#8217;d be lucky to keep her job. She&#8217;d seen what happens in acquisitions. Most of us have.</p><p>The buyers told her later they&#8217;d originally planned to let her go. Then they met her. They figured out who was actually making things work. And instead of cutting her, they handed her more responsibility than she&#8217;d ever had. Running finance across the organization. Managing the business she&#8217;d built from the inside. Handling purchasing across every brand in the portfolio.</p><p>She went from <em>&#8220;they were going to let me go&#8221;</em> to being the person they can&#8217;t run without.</p><div><hr></div><h3>The part of the value nobody calculates</h3><p>Here&#8217;s what stuck with me. A huge part of the value of that acquisition was Christine herself. She wasn&#8217;t a line item. There was no row on the spreadsheet that said &#8220;exceptional operations person who will run your entire finance function for the next decade.&#8221; But that&#8217;s what they got. <strong>That&#8217;s the part of the value nobody calculates.</strong></p><p>I&#8217;ve watched a few acquisitions up close in my own career. The pattern holds in tech. The ones where the acquiring company invested in the people, learned who they were, figured out where they fit, gave them a reason to stay? Those became the most profitable parts of the portfolio. The ones where they bought the technology and didn&#8217;t have a plan for the humans? Everyone walked. Growth collapsed. Hundreds of millions in value evaporated. Not because the product was bad. Because the people left.</p><div><hr></div><h3>The third path</h3><p>My sister didn&#8217;t start a company. She didn&#8217;t pitch investors. She didn&#8217;t grind through a 90-hour-week accelerator program. Neither did the family that employs her. They just bought businesses that already worked and made them better. Starting with the people inside them.</p><p>I used to think that was boring. Now I think it might be the smartest thing nobody in my world is paying attention to.</p><p>I&#8217;ve been reading everything I can find on this. Talking to people. Going down a bunch of wormholes in my free time. I don&#8217;t know exactly where they lead yet, but I haven&#8217;t been this curious about anything in a long time.</p><p></p><p>&#128406;</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>U.S. Bureau of Labor Statistics, <a href="https://www.bls.gov/bdm/entrepreneurship/entrepreneurship.htm">Business Employment Dynamics</a>. Survival rates are tracked in <a href="https://www.bls.gov/bdm/us_age_naics_00_table7.txt">Table 7</a>, which follows cohorts of new private-sector establishments year by year. Across cohorts, roughly 48-50% of establishments survive to year five. Note: BLS tracks all private-sector establishments, not &#8220;startups&#8221; specifically &#8212; a new laundromat and a VC-backed SaaS company are both in this dataset.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Research by Shikhar Ghosh, senior lecturer at Harvard Business School, based on a study of ~2,000 venture-backed companies that raised at least $1M between 2004 and 2010. Originally reported in the Wall Street Journal, September 2012 (paywalled). Accessible via <a href="https://www.hbs.edu/news/Pages/item.aspx?num=487">HBS Newsroom</a> and summarized at <a href="https://www.failory.com/blog/startup-failure-rate">Failory</a>. Ghosh&#8217;s definition of &#8220;failure&#8221; is not returning cash to investors &#8212; by that measure, 75% fail. By the stricter definition of liquidating all assets, 30-40% fail.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>McKinsey Institute for Economic Mobility. &#8220;The Great Ownership Transfer: A New Era of Business Stewardship.&#8221; Published February 26, 2026. <a href="https://www.mckinsey.com/institute-for-economic-mobility/our-insights/the-great-ownership-transfer-a-new-era-of-business-stewardship">McKinsey &#8212; The Great Ownership Transfer</a></p></div></div>]]></content:encoded></item><item><title><![CDATA[Let's Talk About the Women Behind the Build]]></title><description><![CDATA[Spotlighting the women engineers who shaped how I think about product and what they taught me.]]></description><link>https://writing.mattkollander.com/p/lwomen-behind-the-build</link><guid isPermaLink="false">https://writing.mattkollander.com/p/lwomen-behind-the-build</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Tue, 24 Feb 2026 22:42:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/WfDSgxsMjy0" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-WfDSgxsMjy0" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;WfDSgxsMjy0&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/WfDSgxsMjy0?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Hey friends, it&#8217;s Women&#8217;s History Month, and instead of talking about what I&#8217;m building, I want to spotlight some of the brilliant women I get to work with.</p><p>At HPE Aruba, I work with incredible teams, especially at Axis Security and Silver Peak. I&#8217;ve learned so much from the women around me who are already building the future.</p><p>&#127942; <strong><a href="https://www.linkedin.com/in/yaara-hirsh-2487a2b3/">Yaara Hirsh</a></strong> &#8212; Head of Product Design, Axis Security Built an intuitive cloud UI for security admins and mentored her team to collaborate across functions. She taught me the value of a scalable design system.</p><p>&#127942; <strong><a href="https://www.linkedin.com/in/adi-avigdori-9378811b8/">Adi Avigdori</a></strong> &#8212; Product Designer, Axis Security Elevated our platform&#8217;s usability and made the experience more human. She taught me how subtle, thoughtful changes can massively impact engagement.</p><p>&#127942; <strong><a href="https://www.linkedin.com/in/liat-menashe-a1b511133/">Liat Menashe</a></strong> &#8212; Product Leader, Axis Security Built a product discovery process and launched our SSE dashboard &#8212; one of our most-used features. She taught me that treating your dev leads as respected partners leads to faster and better execution for customers.</p><p>&#127942; <strong><a href="https://www.linkedin.com/in/shwethavenkatesh/">Shwetha Venkatesh</a></strong> &#8212; Engineering Leader, Silver Peak Built the API orchestration behind EdgeConnect SD-WAN&#8217;s cloud integrations that scalably support hundreds of thousands of business locations. She taught me that giving your devs the space to develop creative solutions is the key to solving complex problems.</p><p>&#127942; <strong><a href="https://www.linkedin.com/in/laura-neac%C8%99u-071a7016/">Laura Neac&#537;u</a></strong> &#8212; Principal Product Manager, HPE Aruba Helped build a scalable orchestration engine and co-created a routing protocol used by millions. She taught me that staying close to your customers is the secret to delivering solutions that users love.</p><div><hr></div><p>Here&#8217;s what I&#8217;ve learned: <strong>the best product decisions come from teams that reflect more perspectives, not fewer.</strong></p><p>If someone from an underrepresented background has inspired your work, tag them wherever you can. Shout them out. Let&#8217;s make the invisible work visible. &#128640;</p><div><hr></div><p>&#128187; find me: <a href="https://www.mattkollander.com">website</a> &#183; <a href="https://www.linkedin.com/in/mattkollander">linkedin</a></p>]]></content:encoded></item><item><title><![CDATA[Great Security Starts with Great Design]]></title><description><![CDATA[Why the most effective cybersecurity products are beautiful and what a toy design book has to do with it]]></description><link>https://writing.mattkollander.com/p/great-security-great-design</link><guid isPermaLink="false">https://writing.mattkollander.com/p/great-security-great-design</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Tue, 24 Feb 2026 22:04:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jSla!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf1e44d2-5a33-4eea-adee-2c4f9b8591fe_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;ffbccefb-514a-4a47-b5e4-70ac759ade83&quot;,&quot;duration&quot;:null}"></div><p></p><p>Cybersecurity is full of serious tools that are seriously hard to use. When something breaks, it&#8217;s usually not the tech: it&#8217;s the config. When it&#8217;s hard to understand, people get it wrong, and that&#8217;s how security fails.</p><p>Axis did it differently. One policy UI. Simple. Clean. Beautiful, even. Not just because they cared about aesthetics, but because beauty and clarity make security better. When things are simple, people get them right. That kind of clarity only happens when design leads, not follows.</p><p>One of our designers keeps toys on her desk and a book on the art of toys. Not just for fun, but because play sharpens perception, and perception shapes how we build. &#129528;</p><p>The original team did what no one else had: combined private app, internet, and SaaS security into one unified policy UI. Now others are trying to catch up.</p><p>Our earliest data centers? Named after video game characters. We bought toys for them too. Not a gimmick. Just another way to signal joy. And joy, weirdly enough, builds better tools. &#128377;&#65039;</p><p>That&#8217;s why HPE bought us for $500 million. They saw value in a different kind of culture. Now the team is growing, the product&#8217;s evolving. And I want us to keep building with that same spark.</p><p>I didn&#8217;t build this from day one. But I saw what made it different and I stayed to protect that. I almost left when the founders left. Big company politics aren&#8217;t really my thing&#8230;but I stayed because this product came from a design culture that valued beauty and function equally, and that&#8217;s still rare and valuable. That&#8217;s what I&#8217;m here to protect.</p><p>Last time I was in Tel Aviv, I left toys around the office: bouncy balls, blinky dinosaurs. Not for nostalgia, but to remind the team and myself that the Axis spirit is still here. &#129429;</p><p>Great security starts with great design, and sometimes it&#8217;s the tiny dinosaur that gets it right.</p><div><hr></div><p>&#128187; find me: <a href="https://www.mattkollander.com">website</a> &#183; <a href="https://www.linkedin.com/in/mattkollander">linkedin</a></p>]]></content:encoded></item><item><title><![CDATA[Pattern Recognition > Mismatched Socks]]></title><description><![CDATA[On leadership, AuDHD, AR glasses, and why the DSM gets it wrong.]]></description><link>https://writing.mattkollander.com/p/pattern-recognition-mismatched-socks</link><guid isPermaLink="false">https://writing.mattkollander.com/p/pattern-recognition-mismatched-socks</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Thu, 01 May 2025 18:52:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/AnP_bnv8U14" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div id="youtube2-AnP_bnv8U14" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;AnP_bnv8U14&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/AnP_bnv8U14?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>My socks don&#8217;t match.</p><p>No, this isn&#8217;t a metaphor. I literally walked out the door wearing a green sock and a blue sock.</p><p>They were on perfectly straight, though.</p><p>Had to make sure the seams wouldn&#8217;t rub my toes the wrong way.</p><p>Because I&#8217;m Autistic. And I&#8217;m ADHD.</p><p><em><strong>Yes, you can be both.</strong></em></p><p>Which means I&#8217;ll obsess over texture alignment&#8230;</p><p>and completely miss the color mismatch because I&#8217;m still mentally reverse-engineering how diffraction gratings in AR glasses work, like teeny tiny, super precise combs trying to part light beams at just the right angles.</p><p><em>(If someone from Apple or Meta reads this, please call me out if that&#8217;s a craptacular analogy.)</em></p><p><em>(Also, it&#8217;s really cool stuff! <a href="https://patents.google.com/patent/US11966053B2/en?oq=US+11%2c966%2c053+B2">You should check it out.</a>)</em></p><p><strong>Anyways&#8230;</strong></p><p>That&#8217;s one small, mildly ridiculous example of how Autism and ADHD can show up in daily life. Not always in the ways people expect.</p><p>It might look like fidgeting with your pen or pacing around the room during a meeting to stay grounded.</p><p>Or finishing your Autism Awareness Month post a day late, while you&#8217;re on vacation.</p><p>Or needing quiet time before jumping into collaboration, because your high-octane brain won&#8217;t engage until your coolant levels are sufficient.</p><p>Or reworking the requirements for a new identity context API because the schema feels like it&#8217;s stitched together with dental floss and toothpicks.</p><p>Sure, it doesn&#8217;t look tidy.</p><p>But pattern recognition rarely is.</p><p>The DSM calls that a disorder.</p><p>But what it really describes is a brain that makes people uncomfortable, especially when it questions what they call &#8220;normal.&#8221;</p><p>Autism and ADHD aren&#8217;t modern problems.</p><p>They&#8217;re ancient neurotypes.</p><p>We&#8217;ve always been part of humanity:</p><p>the fire tenders, toolmakers, trackers, scouts.</p><p>The ones who noticed what others missed.</p><p><strong>The ones who saw the break coming and acted before anyone else could blink.</strong></p><p>Today we&#8217;re engineers, architects, founders, VPs, and so much more.</p><p>Not despite how our brains work, but because of it.</p><p>The world doesn&#8217;t need perfect socks.</p><p>It needs <strong>men and women</strong> with honest brains, clear intent, and curious hearts.</p><p>That&#8217;s how you define leadership, no matter what socks you&#8217;re wearing.</p><div><hr></div><p>&#128187; find me: <a href="https://www.mattkollander.com">website</a> &#183; <a href="https://www.linkedin.com/in/mattkollander">linkedin</a></p>]]></content:encoded></item><item><title><![CDATA[Herbs, Eggs, and a Siren]]></title><description><![CDATA[First breakfast in Tel Aviv.]]></description><link>https://writing.mattkollander.com/p/herbs-eggs-and-a-siren</link><guid isPermaLink="false">https://writing.mattkollander.com/p/herbs-eggs-and-a-siren</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Thu, 01 May 2025 06:01:39 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162551732/ef9d51fcc4c7d0fcdd6a896c045e6c7a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>First breakfast in Tel Aviv.</strong></p><p>Here for a &#127987;&#65039;&#8205;&#127752; wedding, family, and maybe a few new beginnings.</p><p>Herbs, eggs, coffee.</p><p>No music. No narration. Just (mostly) quiet sound.</p><p>I cooked simple food and cleaned as I went, a ritual I picked up from my dad on job sites. &#128119;&#127995;&#128736;&#65039;</p><p>I think a lot about him when I&#8217;m here. The people, the food, the music&#8230;it all reminds me of the best parts of him.</p><p>At 11 am, the air sirens sounded for Yom HaZikaron (Memorial Day).</p><p>Everything paused.</p><p>This was the quiet before that moment. &#128153;</p><div><hr></div><p></p><p>&#128187; find me: <a href="https://www.mattkollander.com">website</a> &#183; <a href="https://www.linkedin.com/in/mattkollander">linkedin</a></p>]]></content:encoded></item><item><title><![CDATA[Failure Isn’t the Detour, It’s the Road]]></title><description><![CDATA[Why curiosity beats control and how smart teams learn through failure]]></description><link>https://writing.mattkollander.com/p/failure-isnt-the-detourits-the-road</link><guid isPermaLink="false">https://writing.mattkollander.com/p/failure-isnt-the-detourits-the-road</guid><dc:creator><![CDATA[Matt Kollander]]></dc:creator><pubDate>Wed, 16 Apr 2025 14:03:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c3_0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I left the Collaborative Gain Spring Council with a sticky note that won&#8217;t leave my brain:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c3_0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c3_0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c3_0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg" width="322" height="322" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:322,&quot;bytes&quot;:2502599,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://kollanderhat.substack.com/i/161389949?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c3_0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 424w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 848w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!c3_0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe46416a-a500-4dc8-886d-0b1a7fdd68e2_2705x2705.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#8220;Stay curious. Failure is inevitable. But we can improve our personal reaction to it.&#8221;</em></p><p>That note came out of an exercise on failing well. Intentionally, intelligently, and without shame. I&#8217;ve been turning it over in my head ever since. Not because it&#8217;s a clever soundbite, but because it cuts to the core of what leadership needs now.</p><p>I&#8217;ve spent the last two decades in tech. From networks to cybersecurity to increasingly abstract things like &#8220;AI&#8221; and &#8220;platform strategy.&#8221; Failure has always been part of the job, but lately, we&#8217;re swimming in it.</p><p>The stakes are high. The systems are bigger. The speed of change is off the charts. In that kind of environment, failure isn&#8217;t a detour, it&#8217;s the road.</p><p>And yet most teams (and most orgs) are still terrified of it. That fear shows its face as endless compliance theater, backchanneling, micro-management, or just plain silence. We pretend we&#8217;re fine. We fake alignment. And we wonder why our products fall flat.</p><p>So here&#8217;s the idea that stuck:</p><p><strong>It&#8217;s not about avoiding failure. It&#8217;s about designing your response to it.</strong></p><p>Amy Edmondson calls this <em>intelligent failure</em>: the kind you plan for, learn from, and emerge smarter because of. Marty Cagan (paraphrasing here) says that the real job of leadership is creating an environment where empowered teams can take smart risks. I&#8217;d add that only works if the culture gives people space to <em>react to failure with curiosity instead of panic.</em></p><div><hr></div><p><strong>A Few Takeaways I&#8217;m Carrying Forward:</strong></p><ul><li><p> &#128269; <strong>Measure outcomes, not output.</strong> What are you learning if you can&#8217;t connect your work to meaningful change?</p></li><li><p>&#128257; <strong>Ritualize your learning.</strong> Make &#8220;What did we learn?&#8221; a habit that drives progress, not a post-mortem.</p></li><li><p>&#129517; <strong>Know who&#8217;s helping you move toward the work that matters to you and your team.</strong></p></li><li><p>&#129504; <strong>Curiosity over control.</strong> Especially when things get messy.</p></li></ul><div><hr></div><p>These takeaways aren&#8217;t just about product teams. They&#8217;re about how we lead, build trust, and stay human in environments that constantly ask us to optimize, ship, and smile through the mess.</p><p>I don&#8217;t have it all figured out. But I do know I want to keep building with people willing to fail out loud, and get better, together.</p><p>If you&#8217;ve got a failure ritual that&#8217;s <em>actually worked</em> for your team, I&#8217;d love to hear it.</p>]]></content:encoded></item></channel></rss>