MoreRSS

site iconChristian HeilmannModify

A Principal Program Manager living and working in Berlin, Germany. Author of The Developer Advocacy Handbook.
Please copy the RSS to your reader, or quickly subscribe to:

Inoreader Feedly Follow Feedbin Local Reader

Rss preview of Blog of Christian Heilmann

Talking on the “We love open source” podcasts about the threats of AI to open source and free software.

2026-03-13 00:38:12

I was on the We l❤ Open Source podcast and talked about the threats to open source and software.
Trading openness for convenience: From app stores to AI assistants

LinkedIn should punish the “comment X to get access” bait spam

2026-03-02 21:50:08

A part of a post highlighted asking people that in order to get access, they should like the post and comment with the word 'banana'

I liked social media. I love learning and showing people how things are done there. I’m a LinkedIn and Skillshare trainer and wrote a few books. I also published tons of information on various social media channels.

I also like that creators get benefits from publishing information. A social media platform should reward great contributions and they did that in the past.

From views to interaction bait

The problem began when lots of views weren’t enough. Either because it was too easy to automate them with bots or because the real worth of a social platform started to get measured in “time in app” rather than “quality of information”. Advertisers reward those that make people the most addicted and lock them in. And the platforms themselves started measuring quality of contribution as causing as much conversation and interaction with other users as possible. Which is a race to the bottom in terms of quality as the most engaged pieces of content are not those that educate or delight, but those that cause controversy and rage. Some platforms excel at that. Others do encourage their contributors to play the system by forcing interaction, no matter how inane.

The “comment to get access” bait

Lately I’ve seen a pattern emerge across social media by growth hackers, tech influencers and other chancers that annoys the hell out of me because of its utter uselessness. The “Comment to get access” bait.

  • Someone posts and impressive thing as a screencast
  • They don’t provide a link to the resource (or sign-up)
  • Instead, they ask people to comment with a certain word to get access via direct messages

Behold it in all its glory :

Now, my question is who benefits from that?

  • Not the people commenting “banana” as they sound like idiotic minions
  • Not the original poster, as they still need to follow all posts and then send direct messages
  • Not the platform, as hundreds of posts stating “banana” are not content to mine and re-use, but just noise
  • Not other readers, as finding interesting comments in this noise is a drag

All in all, this feels seedy, unprofessional and superfluous. If LinkedIn wants to be an educational, professional platform, it probably should punish rather than promote posts like these.

Quick tip: hosting HTML/CSS/JS demos from source code on GitHub Pages

2026-02-28 19:36:47

Did you know that you can host HTML/CSS/JS demos with execution and source code display on GitHub? All you need is a few include commands in a markdown file and your html/css/js files in a folder.

The source code of the index.md file and the folder with the files open in Visual Studio Code

Try it out here: https://codepo8.github.io/code-hosting-demo/example/
See the source here: https://codepo8.github.io/code-hosting-demo/example/index.md

	
  1. My Code Demo

## Try it out

{% include_relative demo.html %}

## HTML

`​``html
{% include_relative demo.html %}
`​``

## JavaScript

`​``javascript
{% include_relative script.js %}
​`​``

## CSS

`​``css
{% include_relative styles.css %}
`​``

How to do it

You can start by forking this example repo.

In order to see the demos being rendered, you need to turn on GitHub pages and the build process:

1. Go to the settings of the repository and go to pages in the secondary navigation:

the settings of the repository link in the main navigation and the pages link in the secondary navigation

2. Select `Deploy from a branch` under `Build and deployment`, choose the `main` branch and the `root` folder and press save.

The Github pages screen with the sections highlighted you should interact with

This triggers the build of the page.

3. Check the `Actions` tab of the main navigation to see the page being built.

Actions tab showing a running build of GitHub pages

Whilst building this shows a yellow animated dot. When it is done it turns into a green check mark. If there are some issues it will show an error icon and explain what went wrong. Once it is in the green, your changes are live.

4. When the page is done building you can see in the `Pages` section that it has been deployed.

Github pages section with successfully deployed page information

Your page is now available on the web as an HTML/CSS/JS capable environment. For example, this one is at https://codepo8.github.io/code-hosting-demo/.

The structure is `https://{​{user}​}.github.io/{​{repository_name}​}/` and comes from the repository URL at `https://github.com/{​{user}​}/{​{repository_name}​}`.

The next step will be to style the paged differently to what GitHub shows them as. Stay tuned for part 2.

I fell for a phishing attack and lost access to my X account. Here are five mistakes I did that you need to avoid!

2026-02-22 19:57:36

After 20 years of using Twitter, I just lost access to my X account. The reason is that I fell for a phishing attack. As someone who helps a lot of people with their security issues, this is embarassing, but I want to make it a learning experience, so I will share my mistakes with you so you can avoid them.

First Mistake: doing any security things in a rush.

It was the end of the week, I sent out a few last social media updates and already contacted my partner that I will soon be home and we go to drive to our weekend place. So I felt obligated to wrap things up quickly. I wanted to pick up my company iPhone and it had run out of juice. So I rebooted it and it asked for a Sim Pin which of course I don’t know by heart. It also asked for my iCloud password which I forgot as I just updated my computers to the latest MacOS. So I was in the middle of the reset-your-password dance with verification across different devices when the phishing mail came in.

Things I should have done instead:

  • I should have just ignored the mail and finish my other tasks so I have full attention on the mail and not be in a rush.

Second Mistake: falling for a pretty good phishing mail.

The mail looked like this:

The phishing email

The content was the following:

Case Update: Status Notification

Hi Chris Heilmann codepo8.bsky.social,
We are notifying you regarding a recent flag on your profile content. A preliminary check suggests it might not be aligned with our community standards.

The notification indicates that the post may contain intellectual property or restricted media.

Chris Heilmann codepo8.bsky.social
@codepo8
Getting my life on track…

Tweet Media
A support case has been opened for this matter. If you believe this flag is incorrect, you may request a re-evaluation. Deleting the post does not automatically close this case — if the issue persists, your account status may be affected.

Submit appeal

Notification sent to @codepo8

If this is not your account, you can unsubscribe or manage email preferences.

X Corp. 6428 Market Street, Suite 900 San Francisco, CA 94441

I had opened the mail on my second monitor as I was still wrapping up work on the main one and thought immediately that this is silly, why would they flag this tweet as a copyright issue? I even took a screenshot as I wanted to complain about this nonsense on other social media platforms. But I also wanted this issue to be resolved quickly, so I clicked the “Submit appeal” button.

What I should have done instead:

  • Verify that this is really a legit mail by checking the sender and the URL of the link.

Third Mistake: not checking the URL of the link or the sender of the mail.

In my rush and glancing on the second monitor I only saw the “Submit appeal” button and clicked it. I didn’t check the URL of the link, which was not an X domain, but `https://cdn.ampproject.org/c/s/velitoya.com/codepo8`. I also didn’t check the sender of the mail, which was not an X email address, but `X Notices `. It is interesting to see that they use a secondary obfuscation by going through AMP

The interface it showed me looked pretty legit and redirected to `https://noticedirect-x.com/copyright/codepo8`.

copyright notice screen

The text on the page was the following:

Copyright Violation Notice
Your content contains copyrighted material. This violates X’s Community Guidelines.

Notice Date: February 22, 2026
Violation Type: Copyright Infringement
Status: Objection in Progress
Violated Content:

Chris Heilmann codepo8.bsky.social
@codepo8
1:18 PM · Feb 20, 2026
Getting my life on track…

Tweet Image
Continue

I thought this looked pretty legit, so I clicked the “Continue” button and it took me to a page that asked for my X login details.

The verification modal

Verification
You need to verify that you are the account holder to proceed with your appeal.
Chris Heilmann
codepo8.bsky.social
@codepo8
Password
Login

Notice that It showed my account with the correct image and all details. Well done, you bastards.

Fourth Mistake: not realising a fake form despite using autofill.

I store my passwords in my browser and I use the autofill function to log in to sites. So when I got to the login page, it should have triggered the autofill feature, but it didn’t. I should have realised that this is a sign that this is not a legit login page. Instead, I thought maybe the phishing site is just not well made and doesn’t trigger the autofill, so I entered my login details manually.

What I should have done instead:

  • I should have realised that the lack of autofill is a sign that this is not a form hosted on the correct domain.

Fifth Mistake: allowing myself to be kept busy while the phishing attack is happening.

After I entered my login details, I was taken to a page that said that my appeal is processed and – get this – it asked for me to verify my identity further by asking for a scan of my passport, credit card and other personal details. This is where I was out and knew that I had been phished. Luckily for me, as a different person might have been tempted to enter these details, losing even more control over their account and personal information.

In the meantime, I got a notification on my phone that there was a login attempt from an unrecognized device:

Login attempt email

New login
Location*İstanbul, Türkiye
DeviceChromeDesktop on Windows

*Location is approximate based on the login’s IP address.

I immediately went to my X account and try to my password, but the damage was already done. Instead of being able to change my password, I got a message that my account is locked and I need to use my authentication app to unlock it. I don’t have an authentication app set up for my X account, so I was locked out of my account and had to go through the account recovery process.

Meanwhile, a second email came in from X that stated that the email of my accoungt has been changed to `[email protected]`.

Your email address has been changed
The email address on your account codepo8 has been changed to ashleyhaviliigmail.com. Based on this change, please be aware that additional changes to your account may be restricted temporarily.
If you did not make this change, please secure your account.

Any attempt to access the account ended in a message that the account is locked and I need to use my authentication app to unlock it. I filed a complaint with X support.

What I should have done instead:

  • I should have immediately tried to change my password and enable two-factor authentication on my account
  • Use an authentication app to secure my account instead of SMS-based two-factor authentication, which is less secure and X doesn’t even support it anymore.

Where I am now…

So, this is where I am now. I have lost access to my X account and I am going through the account recovery process. I have also contacted X support to try to get my account back. The first attempt was not successful and currently I should wait seven days before I can try again. Seven days in which the attackers have full control over my account and can do whatever they want with it. I understand that I made a stupid mistake entering my login details on a phishing site, but I hope that X support will be able to help me recover my account. After all, I am a long-time user of twitter and I have been using it for 20 years, so I hope that they will be able to help me recover my account which had the same email since 2006 and a backup phone number that I have access to.

The biggest issue is that I have a lot of followers on X and I use it for my work, so losing access to my account is a big deal for me. I also have a lot of personal memories on my account, so I really hope that I will be able to get it back. I have used X as “write only” for long time – I post there, but I don’t really interact with other users, which is also why I didn’t care enough for it to keep all the security measures up to date. I didn’t have an authentication app set up, which is another mistake. I thought that SMS-based two-factor authentication would be enough, but I was wrong.

I will keep you updated on the situation and I hope that my experience can help others to avoid falling for phishing attacks and to secure their accounts better.

Conclusion

Here are the things I did you should not do:

1. Don’t do any security things in a rush.
2. Not question emails that look legit but seem very urgent.
3. Not check the URL of the link or the sender of the mail.
4. Not realising a fake form despite using autofill.
5. Not allowing yourself to be kept busy while the phishing attack is happening.

Stay safe out there and always double-check before you click on any links or enter your login details on any site. And if you do fall for a phishing attack, don’t panic, but immediately try to secure your account and contact support.

I fell for a phishing mail and lost access to Twitter/X

2026-02-21 04:08:24

If you are following me there nothing that might be posted now is from me. DO NOT CLICK ANY links.

A phishing email claiming one of my posts was copyright infringement

I keep you posted when and if I got access again and will talk about it on the live show this coming Wednesday

This will be a good opportunity to re-assess my social media presence in general…